Search

Sally Anne Merkling

Examiner (ID: 13869)

Most Active Art Unit
1798
Art Unit(s)
1798, 1773, 1738, 1797, 1634
Total Applications
773
Issued Applications
412
Pending Applications
100
Abandoned Applications
271

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11788538 [patent_doc_number] => 09398042 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-07-19 [patent_title] => 'Systems and methods for capturing input from users to prevent data loss' [patent_app_type] => utility [patent_app_number] => 14/644230 [patent_app_country] => US [patent_app_date] => 2015-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 11186 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 236 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644230 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/644230
Systems and methods for capturing input from users to prevent data loss Mar 10, 2015 Issued
Array ( [id] => 10410902 [patent_doc_number] => 20150295911 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-15 [patent_title] => 'APPARATUS AND METHOD FOR CONTROLLING AUTHORIZATION TO ACCESS RESOURCES IN A COMMUNICATION NETWORK' [patent_app_type] => utility [patent_app_number] => 14/644659 [patent_app_country] => US [patent_app_date] => 2015-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 10227 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644659 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/644659
APPARATUS AND METHOD FOR CONTROLLING AUTHORIZATION TO ACCESS RESOURCES IN A COMMUNICATION NETWORK Mar 10, 2015 Abandoned
Array ( [id] => 11072409 [patent_doc_number] => 20160269374 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-09-15 [patent_title] => 'INTERNET OF THINGS GROUP FORMATION USING A KEY-BASED JOIN PROTOCOL' [patent_app_type] => utility [patent_app_number] => 14/643964 [patent_app_country] => US [patent_app_date] => 2015-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8724 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14643964 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/643964
Internet of things group formation using a key-based join protocol Mar 9, 2015 Issued
Array ( [id] => 11565906 [patent_doc_number] => 09628512 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-04-18 [patent_title] => 'Malicious relay detection on networks' [patent_app_type] => utility [patent_app_number] => 14/644186 [patent_app_country] => US [patent_app_date] => 2015-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 8069 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 160 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644186 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/644186
Malicious relay detection on networks Mar 9, 2015 Issued
Array ( [id] => 10379063 [patent_doc_number] => 20150264070 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'METHOD AND SYSTEM FOR DETECTING ALGORITHM-GENERATED DOMAINS' [patent_app_type] => utility [patent_app_number] => 14/644194 [patent_app_country] => US [patent_app_date] => 2015-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 5920 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644194 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/644194
Method and system for detecting algorithm-generated domains Mar 9, 2015 Issued
Array ( [id] => 10379062 [patent_doc_number] => 20150264069 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'METHOD AND SYSTEM FOR DETECTING EXTERNAL CONTROL OF COMPROMISED HOSTS' [patent_app_type] => utility [patent_app_number] => 14/644177 [patent_app_country] => US [patent_app_date] => 2015-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 7545 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644177 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/644177
Method and system for detecting external control of compromised hosts Mar 9, 2015 Issued
Array ( [id] => 10379071 [patent_doc_number] => 20150264078 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'DETECTING NETWORK RECONNAISSANCE BY TRACKING INTRANET DARK-NET COMMUNICATIONS' [patent_app_type] => utility [patent_app_number] => 14/644182 [patent_app_country] => US [patent_app_date] => 2015-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 7264 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644182 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/644182
Detecting network reconnaissance by tracking intranet dark-net communications Mar 9, 2015 Issued
Array ( [id] => 11803371 [patent_doc_number] => 09544302 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-01-10 [patent_title] => 'Systems and methods for empowering IP practitioners' [patent_app_type] => utility [patent_app_number] => 14/629038 [patent_app_country] => US [patent_app_date] => 2015-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 4737 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 188 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14629038 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/629038
Systems and methods for empowering IP practitioners Feb 22, 2015 Issued
Array ( [id] => 11398882 [patent_doc_number] => 20170019420 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-19 [patent_title] => 'DEVICE AND METHOD FOR DETECTING MANIPULATION OF A PROGRAM CODE' [patent_app_type] => utility [patent_app_number] => 15/124758 [patent_app_country] => US [patent_app_date] => 2015-02-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4035 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15124758 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/124758
Device and method for detecting manipulation of a program code Feb 8, 2015 Issued
Array ( [id] => 11717293 [patent_doc_number] => 20170185792 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-06-29 [patent_title] => 'MOBILE TERMINAL, DISPLAYING SYSTEM, DISPLAY CONTROLLING METHOD, AND RECORDING MEDIUM' [patent_app_type] => utility [patent_app_number] => 15/129343 [patent_app_country] => US [patent_app_date] => 2015-01-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5132 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15129343 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/129343
MOBILE TERMINAL, DISPLAYING SYSTEM, DISPLAY CONTROLLING METHOD, AND RECORDING MEDIUM Jan 20, 2015 Abandoned
Array ( [id] => 13122987 [patent_doc_number] => 10079857 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-09-18 [patent_title] => Method of slowing down a communication in a network [patent_app_type] => utility [patent_app_number] => 15/107759 [patent_app_country] => US [patent_app_date] => 2014-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 6324 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 157 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15107759 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/107759
Method of slowing down a communication in a network Dec 15, 2014 Issued
Array ( [id] => 15137523 [patent_doc_number] => 10482234 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-11-19 [patent_title] => Controlling authorization within computer systems [patent_app_type] => utility [patent_app_number] => 15/107828 [patent_app_country] => US [patent_app_date] => 2014-12-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 15 [patent_no_of_words] => 8428 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 236 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15107828 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/107828
Controlling authorization within computer systems Dec 9, 2014 Issued
Array ( [id] => 15612671 [patent_doc_number] => 10587417 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-03-10 [patent_title] => Document encryption prompt method and system [patent_app_type] => utility [patent_app_number] => 15/108180 [patent_app_country] => US [patent_app_date] => 2014-11-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 6 [patent_no_of_words] => 3626 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 229 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15108180 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/108180
Document encryption prompt method and system Nov 24, 2014 Issued
Array ( [id] => 10742320 [patent_doc_number] => 20160088471 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-24 [patent_title] => 'SYSTEM FOR SECURELY ENTERING PARTICULAR INFORMATION AND METHOD THEREOF' [patent_app_type] => utility [patent_app_number] => 14/527755 [patent_app_country] => US [patent_app_date] => 2014-10-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8325 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14527755 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/527755
System for securely entering particular information and method thereof Oct 28, 2014 Issued
Array ( [id] => 11905180 [patent_doc_number] => 09774631 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-09-26 [patent_title] => 'TLS connection abandoning' [patent_app_type] => utility [patent_app_number] => 14/527475 [patent_app_country] => US [patent_app_date] => 2014-10-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 8258 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 231 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14527475 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/527475
TLS connection abandoning Oct 28, 2014 Issued
Array ( [id] => 10771341 [patent_doc_number] => 20160117498 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-04-28 [patent_title] => 'COMPUTING PLATFORM SECURITY METHODS AND APPARATUS' [patent_app_type] => utility [patent_app_number] => 14/523886 [patent_app_country] => US [patent_app_date] => 2014-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 31126 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14523886 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/523886
Computing platform security methods and apparatus Oct 24, 2014 Issued
Array ( [id] => 10771342 [patent_doc_number] => 20160117497 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-04-28 [patent_title] => 'COMPUTING PLATFORM SECURITY METHODS AND APPARATUS' [patent_app_type] => utility [patent_app_number] => 14/523884 [patent_app_country] => US [patent_app_date] => 2014-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 31126 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14523884 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/523884
Computing platform security methods and apparatus Oct 24, 2014 Issued
Array ( [id] => 10646202 [patent_doc_number] => 09363087 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-06-07 [patent_title] => 'End-to-end security for hardware running verified software' [patent_app_type] => utility [patent_app_number] => 14/505236 [patent_app_country] => US [patent_app_date] => 2014-10-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 15968 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 150 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14505236 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/505236
End-to-end security for hardware running verified software Oct 1, 2014 Issued
Array ( [id] => 10748389 [patent_doc_number] => 20160094539 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-31 [patent_title] => 'SYSTEMS AND METHODS FOR PERFORMING SINGLE SIGN-ON BY AN INTERMEDIARY DEVICE FOR A REMOTE DESKTOP SESSION OF A CLIENT' [patent_app_type] => utility [patent_app_number] => 14/502598 [patent_app_country] => US [patent_app_date] => 2014-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 22 [patent_figures_cnt] => 22 [patent_no_of_words] => 40188 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14502598 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/502598
Systems and methods for performing single sign-on by an intermediary device for a remote desktop session of a client Sep 29, 2014 Issued
Array ( [id] => 10717189 [patent_doc_number] => 20160063336 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-03 [patent_title] => 'Generating Weights for Biometric Tokens in Probabilistic Matching Systems' [patent_app_type] => utility [patent_app_number] => 14/485667 [patent_app_country] => US [patent_app_date] => 2014-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5838 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14485667 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/485667
Generating weights for biometric tokens in probabilistic matching systems Sep 12, 2014 Issued
Menu