
Samson B. Lemma
Examiner (ID: 223, Phone: (571)272-3806 , Office: P/2498 )
| Most Active Art Unit | 2498 |
| Art Unit(s) | 2132, 2432, 2498 |
| Total Applications | 1343 |
| Issued Applications | 1146 |
| Pending Applications | 68 |
| Abandoned Applications | 151 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11577969
[patent_doc_number] => 09633233
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-25
[patent_title] => 'Method and computing device for encrypting data stored in swap memory'
[patent_app_type] => utility
[patent_app_number] => 14/272255
[patent_app_country] => US
[patent_app_date] => 2014-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 31
[patent_no_of_words] => 11279
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14272255
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/272255 | Method and computing device for encrypting data stored in swap memory | May 6, 2014 | Issued |
Array
(
[id] => 10513306
[patent_doc_number] => 09240887
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-19
[patent_title] => 'Off-host authentication system'
[patent_app_type] => utility
[patent_app_number] => 14/268863
[patent_app_country] => US
[patent_app_date] => 2014-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6626
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14268863
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/268863 | Off-host authentication system | May 1, 2014 | Issued |
Array
(
[id] => 10578006
[patent_doc_number] => 09300664
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-29
[patent_title] => 'Off-host authentication system'
[patent_app_type] => utility
[patent_app_number] => 14/268871
[patent_app_country] => US
[patent_app_date] => 2014-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7854
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14268871
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/268871 | Off-host authentication system | May 1, 2014 | Issued |
Array
(
[id] => 9808202
[patent_doc_number] => 20150020148
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-15
[patent_title] => 'Identity Based Connected Services'
[patent_app_type] => utility
[patent_app_number] => 14/268934
[patent_app_country] => US
[patent_app_date] => 2014-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6193
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14268934
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/268934 | Identity based connected services | May 1, 2014 | Issued |
Array
(
[id] => 10145871
[patent_doc_number] => 09178694
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-03
[patent_title] => 'Securing backing storage data passed through a network'
[patent_app_type] => utility
[patent_app_number] => 14/256616
[patent_app_country] => US
[patent_app_date] => 2014-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6760
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14256616
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/256616 | Securing backing storage data passed through a network | Apr 17, 2014 | Issued |
Array
(
[id] => 9645454
[patent_doc_number] => 20140223567
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-07
[patent_title] => 'INCIDENT TRIAGE ENGINE'
[patent_app_type] => utility
[patent_app_number] => 14/247322
[patent_app_country] => US
[patent_app_date] => 2014-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8771
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14247322
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/247322 | Incident triage engine | Apr 7, 2014 | Issued |
Array
(
[id] => 9618249
[patent_doc_number] => 20140208107
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-24
[patent_title] => 'SYSTEMS AND METHODS FOR IMPLEMENTING APPLICATION CONTROL SECURITY'
[patent_app_type] => utility
[patent_app_number] => 14/226294
[patent_app_country] => US
[patent_app_date] => 2014-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6200
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14226294
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/226294 | SYSTEMS AND METHODS FOR IMPLEMENTING APPLICATION CONTROL SECURITY | Mar 25, 2014 | Abandoned |
Array
(
[id] => 11682101
[patent_doc_number] => 09680647
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-13
[patent_title] => 'Method of using a token in cryptography'
[patent_app_type] => utility
[patent_app_number] => 14/223308
[patent_app_country] => US
[patent_app_date] => 2014-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 11188
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14223308
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/223308 | Method of using a token in cryptography | Mar 23, 2014 | Issued |
Array
(
[id] => 11917581
[patent_doc_number] => 09785769
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-10
[patent_title] => 'Countering attacks on a cache'
[patent_app_type] => utility
[patent_app_number] => 14/438517
[patent_app_country] => US
[patent_app_date] => 2014-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7450
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14438517
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/438517 | Countering attacks on a cache | Mar 17, 2014 | Issued |
Array
(
[id] => 10674925
[patent_doc_number] => 20160021070
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-21
[patent_title] => 'SYSTEM AND METHOD FOR DATA-PROTECTION-COMPLIANT CAPTURE AND FORWARDING OF TELEMETRY DATA'
[patent_app_type] => utility
[patent_app_number] => 14/772904
[patent_app_country] => US
[patent_app_date] => 2014-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4324
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14772904
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/772904 | SYSTEM AND METHOD FOR DATA-PROTECTION-COMPLIANT CAPTURE AND FORWARDING OF TELEMETRY DATA | Mar 5, 2014 | Abandoned |
Array
(
[id] => 10577811
[patent_doc_number] => 09300468
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-29
[patent_title] => 'Secure node admission in a communication network'
[patent_app_type] => utility
[patent_app_number] => 14/188328
[patent_app_country] => US
[patent_app_date] => 2014-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7954
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14188328
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/188328 | Secure node admission in a communication network | Feb 23, 2014 | Issued |
Array
(
[id] => 9967850
[patent_doc_number] => 09015485
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-04-21
[patent_title] => 'Risk-based authentication duration'
[patent_app_type] => utility
[patent_app_number] => 14/176544
[patent_app_country] => US
[patent_app_date] => 2014-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6917
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14176544
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/176544 | Risk-based authentication duration | Feb 9, 2014 | Issued |
Array
(
[id] => 10337595
[patent_doc_number] => 20150222600
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-06
[patent_title] => 'METHOD AND APPARATUS FOR TRANSMITTING NETWORK TRAFFIC VIA A PROXY DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/169989
[patent_app_country] => US
[patent_app_date] => 2014-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5600
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14169989
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/169989 | Method and apparatus for transmitting network traffic via a proxy device | Jan 30, 2014 | Issued |
Array
(
[id] => 10029510
[patent_doc_number] => 09071427
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-30
[patent_title] => 'Method and apparatus for establishing a key agreement protocol'
[patent_app_type] => utility
[patent_app_number] => 14/168169
[patent_app_country] => US
[patent_app_date] => 2014-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7952
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 19
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14168169
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/168169 | Method and apparatus for establishing a key agreement protocol | Jan 29, 2014 | Issued |
Array
(
[id] => 9637490
[patent_doc_number] => 20140215599
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-31
[patent_title] => 'METHOD AND SYSTEM FOR DEFEATING DENIAL OF SERVICE ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 14/165900
[patent_app_country] => US
[patent_app_date] => 2014-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2372
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14165900
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/165900 | Method and system for defeating denial of service attacks | Jan 27, 2014 | Issued |
Array
(
[id] => 10320949
[patent_doc_number] => 20150205953
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-23
[patent_title] => 'METHODS AND SYSTEMS FOR PREVENTING MALICIOUS USE OF PHISHING SIMULATION RECORDS'
[patent_app_type] => utility
[patent_app_number] => 14/160443
[patent_app_country] => US
[patent_app_date] => 2014-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4610
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14160443
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/160443 | Methods and systems for preventing malicious use of phishing simulation records | Jan 20, 2014 | Issued |
Array
(
[id] => 10322621
[patent_doc_number] => 20150207625
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-23
[patent_title] => 'METHOD AND SYSTEM FOR SHIELDING DATA IN UNTRUSTED ENVIRONMENTS'
[patent_app_type] => utility
[patent_app_number] => 14/160531
[patent_app_country] => US
[patent_app_date] => 2014-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 13462
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14160531
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/160531 | Method and system for shielding data in untrusted environments | Jan 20, 2014 | Issued |
Array
(
[id] => 10172900
[patent_doc_number] => 09203619
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-01
[patent_title] => 'Online data transformation'
[patent_app_type] => utility
[patent_app_number] => 14/160482
[patent_app_country] => US
[patent_app_date] => 2014-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7336
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14160482
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/160482 | Online data transformation | Jan 20, 2014 | Issued |
Array
(
[id] => 10196811
[patent_doc_number] => 09225729
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-12-29
[patent_title] => 'Blind hash compression'
[patent_app_type] => utility
[patent_app_number] => 14/160107
[patent_app_country] => US
[patent_app_date] => 2014-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 14285
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14160107
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/160107 | Blind hash compression | Jan 20, 2014 | Issued |
Array
(
[id] => 10625479
[patent_doc_number] => 09344439
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-17
[patent_title] => 'Executing unprotected mode services in a protected mode environment'
[patent_app_type] => utility
[patent_app_number] => 14/159127
[patent_app_country] => US
[patent_app_date] => 2014-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8138
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14159127
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/159127 | Executing unprotected mode services in a protected mode environment | Jan 19, 2014 | Issued |