Search

Sally Anne Merkling

Examiner (ID: 13869)

Most Active Art Unit
1798
Art Unit(s)
1798, 1773, 1738, 1797, 1634
Total Applications
773
Issued Applications
412
Pending Applications
100
Abandoned Applications
271

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11240844 [patent_doc_number] => 09467507 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-10-11 [patent_title] => 'Wireless network cloud computing resource management' [patent_app_type] => utility [patent_app_number] => 12/983672 [patent_app_country] => US [patent_app_date] => 2011-01-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 13 [patent_no_of_words] => 9711 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 255 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12983672 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/983672
Wireless network cloud computing resource management Jan 2, 2011 Issued
Array ( [id] => 8504848 [patent_doc_number] => 20120304256 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-11-29 [patent_title] => 'ELECTRONIC MAIL SYSTEM AND METHOD' [patent_app_type] => utility [patent_app_number] => 13/502761 [patent_app_country] => US [patent_app_date] => 2010-10-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 2971 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13502761 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/502761
ELECTRONIC MAIL SYSTEM AND METHOD Oct 20, 2010 Abandoned
Array ( [id] => 6131246 [patent_doc_number] => 20110087872 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-04-14 [patent_title] => 'Firmware Verified Boot' [patent_app_type] => utility [patent_app_number] => 12/903202 [patent_app_country] => US [patent_app_date] => 2010-10-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 12676 [patent_no_of_claims] => 38 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0087/20110087872.pdf [firstpage_image] =>[orig_patent_app_number] => 12903202 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/903202
Firmware verified boot Oct 11, 2010 Issued
Array ( [id] => 8323019 [patent_doc_number] => 20120195431 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-08-02 [patent_title] => 'METHOD FOR OPERATING A NODE IN A WIRELESS SENSOR NETWORK' [patent_app_type] => utility [patent_app_number] => 13/499930 [patent_app_country] => US [patent_app_date] => 2010-10-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5820 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13499930 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/499930
METHOD FOR OPERATING A NODE IN A WIRELESS SENSOR NETWORK Oct 6, 2010 Abandoned
Array ( [id] => 9378912 [patent_doc_number] => 08683194 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-03-25 [patent_title] => 'Method and devices for secure communications in a telecommunications network' [patent_app_type] => utility [patent_app_number] => 13/497571 [patent_app_country] => US [patent_app_date] => 2010-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 11822 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13497571 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/497571
Method and devices for secure communications in a telecommunications network Sep 27, 2010 Issued
Array ( [id] => 9326208 [patent_doc_number] => 08661245 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-02-25 [patent_title] => 'Systems and methods for empowering IP practitioners' [patent_app_type] => utility [patent_app_number] => 12/891782 [patent_app_country] => US [patent_app_date] => 2010-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 4637 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 214 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12891782 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/891782
Systems and methods for empowering IP practitioners Sep 26, 2010 Issued
Array ( [id] => 8315249 [patent_doc_number] => 20120192269 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-07-26 [patent_title] => 'METHOD FOR REMOTELY CONTROLLING THE EXECUTION OF AT LEAST ONE FUNCTION OF A COMPUTER SYSTEM' [patent_app_type] => utility [patent_app_number] => 13/497679 [patent_app_country] => US [patent_app_date] => 2010-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3557 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13497679 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/497679
METHOD FOR REMOTELY CONTROLLING THE EXECUTION OF AT LEAST ONE FUNCTION OF A COMPUTER SYSTEM Sep 20, 2010 Abandoned
Array ( [id] => 8291579 [patent_doc_number] => 20120179918 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-07-12 [patent_title] => 'METHOD AND A SYSTEM FOR PROVIDING A DEPLOYMENT LIFECYCLE MANAGEMENT OF CRYPTOGRAPHIC OBJECTS' [patent_app_type] => utility [patent_app_number] => 13/497002 [patent_app_country] => US [patent_app_date] => 2010-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4055 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13497002 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/497002
METHOD AND A SYSTEM FOR PROVIDING A DEPLOYMENT LIFECYCLE MANAGEMENT OF CRYPTOGRAPHIC OBJECTS Sep 16, 2010 Abandoned
Array ( [id] => 10074470 [patent_doc_number] => 09112843 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-08-18 [patent_title] => 'Method and system for subscriber to log in internet content provider (ICP) website in identity/location separation network and login device thereof' [patent_app_type] => utility [patent_app_number] => 13/496720 [patent_app_country] => US [patent_app_date] => 2010-09-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 3 [patent_no_of_words] => 4801 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 413 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13496720 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/496720
Method and system for subscriber to log in internet content provider (ICP) website in identity/location separation network and login device thereof Sep 8, 2010 Issued
Array ( [id] => 6008870 [patent_doc_number] => 20110060901 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-10 [patent_title] => 'Cryptographic System for Performing Secure Iterative Matrix Inversions and Solving Systems of Linear Equations' [patent_app_type] => utility [patent_app_number] => 12/876229 [patent_app_country] => US [patent_app_date] => 2010-09-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4907 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0060/20110060901.pdf [firstpage_image] =>[orig_patent_app_number] => 12876229 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/876229
Cryptographic System for Performing Secure Iterative Matrix Inversions and Solving Systems of Linear Equations Sep 5, 2010 Abandoned
Array ( [id] => 6006573 [patent_doc_number] => 20110058671 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-10 [patent_title] => 'SECURE PROTOCOL TERMINAL ADAPTER' [patent_app_type] => utility [patent_app_number] => 12/873885 [patent_app_country] => US [patent_app_date] => 2010-09-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3436 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0058/20110058671.pdf [firstpage_image] =>[orig_patent_app_number] => 12873885 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/873885
SECURE PROTOCOL TERMINAL ADAPTER Aug 31, 2010 Abandoned
Array ( [id] => 6032649 [patent_doc_number] => 20110055929 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-03 [patent_title] => 'METHOD FOR PRODUCING AN IMAGE INTENDED FOR AN OPERATING SYSTEM CALLED OS IMAGE AND CORRESPONDING DEVICE' [patent_app_type] => utility [patent_app_number] => 12/873066 [patent_app_country] => US [patent_app_date] => 2010-08-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 1976 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0055/20110055929.pdf [firstpage_image] =>[orig_patent_app_number] => 12873066 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/873066
METHOD FOR PRODUCING AN IMAGE INTENDED FOR AN OPERATING SYSTEM CALLED OS IMAGE AND CORRESPONDING DEVICE Aug 30, 2010 Abandoned
Array ( [id] => 7786015 [patent_doc_number] => 20120047571 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-02-23 [patent_title] => 'SYSTEMS AND METHODS FOR DETECTING PRESELECTED QUERY TYPE WITHIN A DNS QUERY' [patent_app_type] => utility [patent_app_number] => 12/857742 [patent_app_country] => US [patent_app_date] => 2010-08-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9922 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0047/20120047571.pdf [firstpage_image] =>[orig_patent_app_number] => 12857742 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/857742
SYSTEMS AND METHODS FOR DETECTING PRESELECTED QUERY TYPE WITHIN A DNS QUERY Aug 16, 2010 Abandoned
Array ( [id] => 8093423 [patent_doc_number] => 20120082307 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-05 [patent_title] => 'CRYPTOGRAPHY ON A ELLIPTICAL CURVE' [patent_app_type] => utility [patent_app_number] => 13/377404 [patent_app_country] => US [patent_app_date] => 2010-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6829 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0082/20120082307.pdf [firstpage_image] =>[orig_patent_app_number] => 13377404 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/377404
Cryptography on a elliptical curve Jun 14, 2010 Issued
Array ( [id] => 8137533 [patent_doc_number] => 20120093309 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-19 [patent_title] => 'CRYPTOGRAPHY ON A SIMPLIFIED ELLIPTICAL CURVE' [patent_app_type] => utility [patent_app_number] => 13/377381 [patent_app_country] => US [patent_app_date] => 2010-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 4497 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0093/20120093309.pdf [firstpage_image] =>[orig_patent_app_number] => 13377381 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/377381
Cryptography on a simplified elliptical curve Jun 14, 2010 Issued
Array ( [id] => 8098501 [patent_doc_number] => 20120084865 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-05 [patent_title] => 'False Alarm Detection For Malware Scanning' [patent_app_type] => utility [patent_app_number] => 13/376862 [patent_app_country] => US [patent_app_date] => 2010-05-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 2566 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0084/20120084865.pdf [firstpage_image] =>[orig_patent_app_number] => 13376862 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/376862
False alarm detection for malware scanning May 27, 2010 Issued
Array ( [id] => 6647141 [patent_doc_number] => 20100174950 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-08 [patent_title] => 'METHOD AND SECURE MODULE FOR COMMUNICATION WITH HOST, METHOD AND APPARATUS FOR COMMUNICATION WITH SECURE MODULE, METHOD AND APPARATUS FOR CONTROLLING SECURE MODULE' [patent_app_type] => utility [patent_app_number] => 12/727859 [patent_app_country] => US [patent_app_date] => 2010-03-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5596 [patent_no_of_claims] => 34 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0174/20100174950.pdf [firstpage_image] =>[orig_patent_app_number] => 12727859 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/727859
METHOD AND SECURE MODULE FOR COMMUNICATION WITH HOST, METHOD AND APPARATUS FOR COMMUNICATION WITH SECURE MODULE, METHOD AND APPARATUS FOR CONTROLLING SECURE MODULE Mar 18, 2010 Abandoned
Array ( [id] => 7816974 [patent_doc_number] => 20120063594 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-03-15 [patent_title] => 'METHOD FOR CREATING ASYMMETRICAL CRYPTOGRAPHIC KEY PAIRS' [patent_app_type] => utility [patent_app_number] => 13/256364 [patent_app_country] => US [patent_app_date] => 2010-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10139 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0063/20120063594.pdf [firstpage_image] =>[orig_patent_app_number] => 13256364 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/256364
Method for creating asymmetrical cryptographic key pairs Mar 3, 2010 Issued
Array ( [id] => 9458870 [patent_doc_number] => 08719897 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-05-06 [patent_title] => 'Access control method for tri-element peer authentication credible network connection structure' [patent_app_type] => utility [patent_app_number] => 13/377098 [patent_app_country] => US [patent_app_date] => 2009-12-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 4 [patent_no_of_words] => 3050 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 330 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13377098 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/377098
Access control method for tri-element peer authentication credible network connection structure Dec 8, 2009 Issued
Array ( [id] => 8337533 [patent_doc_number] => 20120204239 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-08-09 [patent_title] => 'TERMINAL MANAGEMENT SYSTEM AND TERMINAL MANAGEMENT METHOD' [patent_app_type] => utility [patent_app_number] => 13/502472 [patent_app_country] => US [patent_app_date] => 2009-10-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 10685 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13502472 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/502472
TERMINAL MANAGEMENT SYSTEM AND TERMINAL MANAGEMENT METHOD Oct 18, 2009 Abandoned
Menu