Search

Sally Anne Merkling

Examiner (ID: 13869)

Most Active Art Unit
1798
Art Unit(s)
1798, 1773, 1738, 1797, 1634
Total Applications
773
Issued Applications
412
Pending Applications
100
Abandoned Applications
271

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 12224788 [patent_doc_number] => 20180063147 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-01 [patent_title] => 'NETWORK CONTENT RATING BASED ON PUBLIC RATING DATABASE' [patent_app_type] => utility [patent_app_number] => 15/246114 [patent_app_country] => US [patent_app_date] => 2016-08-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8846 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15246114 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/246114
NETWORK CONTENT RATING BASED ON PUBLIC RATING DATABASE Aug 23, 2016 Abandoned
Array ( [id] => 11556960 [patent_doc_number] => 20170103206 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-04-13 [patent_title] => 'METHOD AND APPARATUS FOR CAPTURING OPERATION IN A CONTAINER-BASED VIRTUALIZATION SYSTEM' [patent_app_type] => utility [patent_app_number] => 15/237940 [patent_app_country] => US [patent_app_date] => 2016-08-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5833 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15237940 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/237940
Method and apparatus for capturing operation in a container-based virtualization system Aug 15, 2016 Issued
Array ( [id] => 14400169 [patent_doc_number] => 10313384 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-06-04 [patent_title] => Mitigation of security risk vulnerabilities in an enterprise network [patent_app_type] => utility [patent_app_number] => 15/234980 [patent_app_country] => US [patent_app_date] => 2016-08-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 14 [patent_no_of_words] => 10326 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 146 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15234980 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/234980
Mitigation of security risk vulnerabilities in an enterprise network Aug 10, 2016 Issued
Array ( [id] => 14601737 [patent_doc_number] => 10354061 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-16 [patent_title] => Methods and systems for authenticating a headset for a transportation vehicle [patent_app_type] => utility [patent_app_number] => 15/218889 [patent_app_country] => US [patent_app_date] => 2016-07-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4901 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15218889 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/218889
Methods and systems for authenticating a headset for a transportation vehicle Jul 24, 2016 Issued
Array ( [id] => 11405847 [patent_doc_number] => 20170026385 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-26 [patent_title] => 'METHOD AND SYSTEM FOR PROXIMITY-BASED ACCESS CONTROL' [patent_app_type] => utility [patent_app_number] => 15/217171 [patent_app_country] => US [patent_app_date] => 2016-07-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5495 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15217171 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/217171
METHOD AND SYSTEM FOR PROXIMITY-BASED ACCESS CONTROL Jul 21, 2016 Abandoned
Array ( [id] => 15377703 [patent_doc_number] => 10530587 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-01-07 [patent_title] => Web scale authentication [patent_app_type] => utility [patent_app_number] => 15/199097 [patent_app_country] => US [patent_app_date] => 2016-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 1 [patent_no_of_words] => 1961 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15199097 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/199097
Web scale authentication Jun 29, 2016 Issued
Array ( [id] => 17038931 [patent_doc_number] => 11096048 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-08-17 [patent_title] => Identity authentication method and communications terminal [patent_app_type] => utility [patent_app_number] => 16/313036 [patent_app_country] => US [patent_app_date] => 2016-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 11382 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 265 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16313036 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/313036
Identity authentication method and communications terminal Jun 29, 2016 Issued
Array ( [id] => 11352749 [patent_doc_number] => 20160371489 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-22 [patent_title] => 'EVENT ANOMALY ANALYSIS AND PREDICTION' [patent_app_type] => utility [patent_app_number] => 15/184607 [patent_app_country] => US [patent_app_date] => 2016-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 12045 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15184607 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/184607
Event anomaly analysis and prediction Jun 15, 2016 Issued
Array ( [id] => 11110012 [patent_doc_number] => 20160306982 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-20 [patent_title] => 'SYSTEM AND METHOD FOR PROVIDING A CRYPTOGRAPHIC PLATFORM FOR EXCHANGING INFORMATION' [patent_app_type] => utility [patent_app_number] => 15/183708 [patent_app_country] => US [patent_app_date] => 2016-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 8315 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15183708 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/183708
System and method for providing a cryptographic platform for exchanging information Jun 14, 2016 Issued
Array ( [id] => 11338810 [patent_doc_number] => 20160364565 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-15 [patent_title] => 'AUTHENTICATION AND SECURE COMMUNICATION WITH APPLICATION EXTENSIONS' [patent_app_type] => utility [patent_app_number] => 15/179423 [patent_app_country] => US [patent_app_date] => 2016-06-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3303 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15179423 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/179423
Authentication and secure communication with application extensions Jun 9, 2016 Issued
Array ( [id] => 11825590 [patent_doc_number] => 20170214527 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-07-27 [patent_title] => 'CRYPTOGRAPHY ON A SIMPLIFIED ELLIPTICAL CURVE' [patent_app_type] => utility [patent_app_number] => 15/178478 [patent_app_country] => US [patent_app_date] => 2016-06-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4822 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178478 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/178478
Cryptography on a simplified elliptical curve Jun 8, 2016 Issued
Array ( [id] => 11761049 [patent_doc_number] => 20170207918 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-07-20 [patent_title] => 'CRYPTOGRAPHY ON AN ELLIPTICAL CURVE' [patent_app_type] => utility [patent_app_number] => 15/178528 [patent_app_country] => US [patent_app_date] => 2016-06-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6905 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178528 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/178528
CRYPTOGRAPHY ON AN ELLIPTICAL CURVE Jun 8, 2016 Abandoned
Array ( [id] => 13693709 [patent_doc_number] => 20170357809 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-12-14 [patent_title] => SYSTEMS AND METHODS FOR FLAW ATTRIBUTION AND CORRELATION [patent_app_type] => utility [patent_app_number] => 15/176911 [patent_app_country] => US [patent_app_date] => 2016-06-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5346 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -28 [patent_words_short_claim] => 84 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15176911 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/176911
Flaw attribution and correlation Jun 7, 2016 Issued
Array ( [id] => 14302901 [patent_doc_number] => 10291591 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-05-14 [patent_title] => Anti-eavesdropping system for mobile phone communication [patent_app_type] => utility [patent_app_number] => 15/166263 [patent_app_country] => US [patent_app_date] => 2016-05-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 7384 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 435 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15166263 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/166263
Anti-eavesdropping system for mobile phone communication May 26, 2016 Issued
Array ( [id] => 11709393 [patent_doc_number] => 20170177892 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-06-22 [patent_title] => 'MULTI-DOMAIN APPLICATION EXECUTION MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 15/164673 [patent_app_country] => US [patent_app_date] => 2016-05-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 11131 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15164673 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/164673
Multi-domain application execution management May 24, 2016 Issued
Array ( [id] => 12062831 [patent_doc_number] => 20170339175 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-11-23 [patent_title] => 'USING NATURAL LANGUAGE PROCESSING FOR DETECTION OF INTENDED OR UNEXPECTED APPLICATION BEHAVIOR' [patent_app_type] => utility [patent_app_number] => 15/159526 [patent_app_country] => US [patent_app_date] => 2016-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3693 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15159526 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/159526
Using natural language processing for detection of intended or unexpected application behavior May 18, 2016 Issued
Array ( [id] => 11426064 [patent_doc_number] => 20170034210 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-02-02 [patent_title] => 'CLIENT SIDE HUMAN USER INDICATOR' [patent_app_type] => utility [patent_app_number] => 15/147577 [patent_app_country] => US [patent_app_date] => 2016-05-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 7167 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15147577 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/147577
CLIENT SIDE HUMAN USER INDICATOR May 4, 2016 Abandoned
Array ( [id] => 11051824 [patent_doc_number] => 20160248784 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-08-25 [patent_title] => 'AUTHENTICATING APPARATUS, AUTHENTICATING SYSTEM AND STORAGE MEDIUM' [patent_app_type] => utility [patent_app_number] => 15/145113 [patent_app_country] => US [patent_app_date] => 2016-05-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 15340 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15145113 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/145113
Authenticating apparatus, authenticating system and storage medium May 2, 2016 Issued
Array ( [id] => 13272701 [patent_doc_number] => 10148442 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-12-04 [patent_title] => End-to-end security for hardware running verified software [patent_app_type] => utility [patent_app_number] => 15/144200 [patent_app_country] => US [patent_app_date] => 2016-05-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 14498 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15144200 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/144200
End-to-end security for hardware running verified software May 1, 2016 Issued
Array ( [id] => 11052248 [patent_doc_number] => 20160249209 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-08-25 [patent_title] => 'Negotiation Processing Method for Security Algorithm, Control Network Element, and Control System' [patent_app_type] => utility [patent_app_number] => 15/143095 [patent_app_country] => US [patent_app_date] => 2016-04-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 10669 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15143095 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/143095
Negotiation processing method for security algorithm, control network element, and control system Apr 28, 2016 Issued
Menu