
Ryan C. Jager
Examiner (ID: 7849, Phone: (571)272-7016 , Office: P/2842 )
| Most Active Art Unit | 2842 |
| Art Unit(s) | 2842, 2816 |
| Total Applications | 1380 |
| Issued Applications | 1226 |
| Pending Applications | 58 |
| Abandoned Applications | 123 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11316655
[patent_doc_number] => 20160352765
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-01
[patent_title] => 'FINGERPRINT MERGING AND RISK LEVEL EVALUATION FOR NETWORK ANOMALY DETECTION'
[patent_app_type] => utility
[patent_app_number] => 15/072526
[patent_app_country] => US
[patent_app_date] => 2016-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11895
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15072526
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/072526 | Fingerprint merging and risk level evaluation for network anomaly detection | Mar 16, 2016 | Issued |
Array
(
[id] => 16804282
[patent_doc_number] => 10999245
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-04
[patent_title] => Communication path control method, communication path control device, and communication path control program that divide a path leading to a network that accommodates a specific device into a path that passes through a filter device and a path that does not pass through a filter device
[patent_app_type] => utility
[patent_app_number] => 15/578095
[patent_app_country] => US
[patent_app_date] => 2016-02-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13085
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15578095
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/578095 | Communication path control method, communication path control device, and communication path control program that divide a path leading to a network that accommodates a specific device into a path that passes through a filter device and a path that does not pass through a filter device | Feb 28, 2016 | Issued |
Array
(
[id] => 15017495
[patent_doc_number] => 10454922
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => System and method for recognizing malicious credential guessing attacks
[patent_app_type] => utility
[patent_app_number] => 15/052789
[patent_app_country] => US
[patent_app_date] => 2016-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 17281
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15052789
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/052789 | System and method for recognizing malicious credential guessing attacks | Feb 23, 2016 | Issued |
Array
(
[id] => 12551448
[patent_doc_number] => 10013365
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-03
[patent_title] => Method for programming a control unit of a motor vehicle
[patent_app_type] => utility
[patent_app_number] => 15/052750
[patent_app_country] => US
[patent_app_date] => 2016-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4065
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15052750
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/052750 | Method for programming a control unit of a motor vehicle | Feb 23, 2016 | Issued |
Array
(
[id] => 11940541
[patent_doc_number] => 20170244692
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-24
[patent_title] => 'AUTHENTICATION OF A USER USING A SECURITY DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/052700
[patent_app_country] => US
[patent_app_date] => 2016-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6480
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15052700
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/052700 | AUTHENTICATION OF A USER USING A SECURITY DEVICE | Feb 23, 2016 | Abandoned |
Array
(
[id] => 14092591
[patent_doc_number] => 10242203
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-26
[patent_title] => Format preservation based masking system and method
[patent_app_type] => utility
[patent_app_number] => 15/019743
[patent_app_country] => US
[patent_app_date] => 2016-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7361
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15019743
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/019743 | Format preservation based masking system and method | Feb 8, 2016 | Issued |
Array
(
[id] => 11854048
[patent_doc_number] => 20170228540
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-10
[patent_title] => 'Method and a system for detecting malicious code activity by generating software traps per application'
[patent_app_type] => utility
[patent_app_number] => 15/018930
[patent_app_country] => US
[patent_app_date] => 2016-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 966
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15018930
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/018930 | Method and a system for detecting malicious code activity by generating software traps per application | Feb 8, 2016 | Abandoned |
Array
(
[id] => 10803555
[patent_doc_number] => 20160149712
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'APPLYING CIRCUIT DELAY-BASED PHYSICALLY UNCLONABLE FUNCTIONS (PUFS) FOR MASKING OPERATION OF MEMORY-BASED PUFS TO RESIST INVASIVE AND CLONE ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 15/011255
[patent_app_country] => US
[patent_app_date] => 2016-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8951
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15011255
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/011255 | Applying circuit delay-based physically unclonable functions (PUFs) for masking operation of memory-based PUFs to resist invasive and clone attacks | Jan 28, 2016 | Issued |
Array
(
[id] => 15317427
[patent_doc_number] => 10523436
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-31
[patent_title] => Security locking device of computers
[patent_app_type] => utility
[patent_app_number] => 15/520838
[patent_app_country] => US
[patent_app_date] => 2015-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7652
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 612
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15520838
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/520838 | Security locking device of computers | Dec 17, 2015 | Issued |
Array
(
[id] => 10752404
[patent_doc_number] => 20160098556
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-07
[patent_title] => 'Preventing stack buffer overflow attacks'
[patent_app_type] => utility
[patent_app_number] => 14/970397
[patent_app_country] => US
[patent_app_date] => 2015-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4884
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14970397
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/970397 | Preventing stack buffer overflow attacks | Dec 14, 2015 | Abandoned |
Array
(
[id] => 10741824
[patent_doc_number] => 20160087975
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'METHOD AND APPARATUS OF CONSTRUCTING SECURE INFRA-STRUCTURE FOR USING EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD'
[patent_app_type] => utility
[patent_app_number] => 14/958194
[patent_app_country] => US
[patent_app_date] => 2015-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8338
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14958194
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/958194 | METHOD AND APPARATUS OF CONSTRUCTING SECURE INFRA-STRUCTURE FOR USING EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD | Dec 2, 2015 | Abandoned |
Array
(
[id] => 12229223
[patent_doc_number] => 09916468
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-13
[patent_title] => 'System and method for detecting fraud and misuse of protected data by an authorized user using event logs'
[patent_app_type] => utility
[patent_app_number] => 14/954470
[patent_app_country] => US
[patent_app_date] => 2015-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 9328
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 359
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14954470
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/954470 | System and method for detecting fraud and misuse of protected data by an authorized user using event logs | Nov 29, 2015 | Issued |
Array
(
[id] => 14605721
[patent_doc_number] => 10356062
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-16
[patent_title] => Data access control utilizing key restriction
[patent_app_type] => utility
[patent_app_number] => 14/938403
[patent_app_country] => US
[patent_app_date] => 2015-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 34
[patent_no_of_words] => 26890
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14938403
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/938403 | Data access control utilizing key restriction | Nov 10, 2015 | Issued |
Array
(
[id] => 10766362
[patent_doc_number] => 20160112518
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-21
[patent_title] => 'SYSTEMS AND METHODS FOR SMART DEVICE NETWORKING'
[patent_app_type] => utility
[patent_app_number] => 14/919664
[patent_app_country] => US
[patent_app_date] => 2015-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8791
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14919664
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/919664 | Systems and methods for smart device networking with an endpoint and a bridge | Oct 20, 2015 | Issued |
Array
(
[id] => 12026099
[patent_doc_number] => 20170316198
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-02
[patent_title] => 'METHOD FOR AUTHENTICATING A USER DEVICE DURING THE PROCESS OF LOGGING INTO A SERVER'
[patent_app_type] => utility
[patent_app_number] => 15/520778
[patent_app_country] => US
[patent_app_date] => 2015-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3202
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15520778
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/520778 | Method for authenticating a user device during the process of logging into a server | Oct 14, 2015 | Issued |
Array
(
[id] => 15063555
[patent_doc_number] => 10462102
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-29
[patent_title] => Electronic message address aliasing
[patent_app_type] => utility
[patent_app_number] => 14/866968
[patent_app_country] => US
[patent_app_date] => 2015-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 7412
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866968
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/866968 | Electronic message address aliasing | Sep 26, 2015 | Issued |
Array
(
[id] => 15063555
[patent_doc_number] => 10462102
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-29
[patent_title] => Electronic message address aliasing
[patent_app_type] => utility
[patent_app_number] => 14/866968
[patent_app_country] => US
[patent_app_date] => 2015-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 7412
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866968
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/866968 | Electronic message address aliasing | Sep 26, 2015 | Issued |
Array
(
[id] => 15063555
[patent_doc_number] => 10462102
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-29
[patent_title] => Electronic message address aliasing
[patent_app_type] => utility
[patent_app_number] => 14/866968
[patent_app_country] => US
[patent_app_date] => 2015-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 7412
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866968
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/866968 | Electronic message address aliasing | Sep 26, 2015 | Issued |
Array
(
[id] => 15063555
[patent_doc_number] => 10462102
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-29
[patent_title] => Electronic message address aliasing
[patent_app_type] => utility
[patent_app_number] => 14/866968
[patent_app_country] => US
[patent_app_date] => 2015-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 7412
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866968
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/866968 | Electronic message address aliasing | Sep 26, 2015 | Issued |
Array
(
[id] => 11460845
[patent_doc_number] => 20170054751
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-23
[patent_title] => 'METHOD FOR MITIGATION OF CYBER ATTACKS ON INDUSTRIAL CONTROL SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 14/830776
[patent_app_country] => US
[patent_app_date] => 2015-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7079
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14830776
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/830776 | Method for mitigation of cyber attacks on industrial control systems | Aug 19, 2015 | Issued |