
Samson B. Lemma
Examiner (ID: 223, Phone: (571)272-3806 , Office: P/2498 )
| Most Active Art Unit | 2498 |
| Art Unit(s) | 2132, 2432, 2498 |
| Total Applications | 1343 |
| Issued Applications | 1146 |
| Pending Applications | 68 |
| Abandoned Applications | 151 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10059364
[patent_doc_number] => 09098726
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-04
[patent_title] => 'Scalable and secure application resource management and access control for multicore operating systems'
[patent_app_type] => utility
[patent_app_number] => 13/648157
[patent_app_country] => US
[patent_app_date] => 2012-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3333
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13648157
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/648157 | Scalable and secure application resource management and access control for multicore operating systems | Oct 8, 2012 | Issued |
Array
(
[id] => 8639827
[patent_doc_number] => 20130031630
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-31
[patent_title] => 'Method and Apparatus for Identifying Phishing Websites in Network Traffic Using Generated Regular Expressions'
[patent_app_type] => utility
[patent_app_number] => 13/644055
[patent_app_country] => US
[patent_app_date] => 2012-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5543
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13644055
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/644055 | Method and apparatus for identifying phishing websites in network traffic using generated regular expressions | Oct 2, 2012 | Issued |
Array
(
[id] => 8661275
[patent_doc_number] => 20130042104
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-02-14
[patent_title] => 'Certificate-based cookie security'
[patent_app_type] => utility
[patent_app_number] => 13/633484
[patent_app_country] => US
[patent_app_date] => 2012-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6975
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13633484
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/633484 | Certificate-based cookie security | Oct 1, 2012 | Issued |
Array
(
[id] => 9871546
[patent_doc_number] => 08959338
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-17
[patent_title] => 'Remote access manager for virtual computing services'
[patent_app_type] => utility
[patent_app_number] => 13/632202
[patent_app_country] => US
[patent_app_date] => 2012-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4808
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13632202
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/632202 | Remote access manager for virtual computing services | Sep 30, 2012 | Issued |
Array
(
[id] => 8746943
[patent_doc_number] => 20130086660
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-04
[patent_title] => 'SYSTEM FOR PREVENTING ILLEGAL COPY OF SOFTWARE AND METHOD FOR PREVENTING ILLEGAL COPY OF SOFTWARE'
[patent_app_type] => utility
[patent_app_number] => 13/624768
[patent_app_country] => US
[patent_app_date] => 2012-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3350
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13624768
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/624768 | SYSTEM FOR PREVENTING ILLEGAL COPY OF SOFTWARE AND METHOD FOR PREVENTING ILLEGAL COPY OF SOFTWARE | Sep 20, 2012 | Abandoned |
Array
(
[id] => 9386591
[patent_doc_number] => 20140090074
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-27
[patent_title] => 'ENHANCED PRIVACY FOR PROVISION OF COMPUTER VISION'
[patent_app_type] => utility
[patent_app_number] => 13/624703
[patent_app_country] => US
[patent_app_date] => 2012-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4374
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13624703
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/624703 | Enhanced privacy for provision of computer vision | Sep 20, 2012 | Issued |
Array
(
[id] => 9386590
[patent_doc_number] => 20140090073
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-27
[patent_title] => 'Obscuring Sensitive Portions of Universal Resource Locator'
[patent_app_type] => utility
[patent_app_number] => 13/624692
[patent_app_country] => US
[patent_app_date] => 2012-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3751
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13624692
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/624692 | Obscuring sensitive portions of universal resource locator | Sep 20, 2012 | Issued |
Array
(
[id] => 8735564
[patent_doc_number] => 20130081133
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-28
[patent_title] => 'SYSTEM AND METHOD FOR UNLOCKING AN ELECTRONIC DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/624168
[patent_app_country] => US
[patent_app_date] => 2012-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4010
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13624168
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/624168 | SYSTEM AND METHOD FOR UNLOCKING AN ELECTRONIC DEVICE | Sep 20, 2012 | Abandoned |
Array
(
[id] => 9386191
[patent_doc_number] => 20140089674
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-27
[patent_title] => 'ENCRYPTION IN THE CLOUD WITH CUSTOMER CONTROLLED KEYS'
[patent_app_type] => utility
[patent_app_number] => 13/624069
[patent_app_country] => US
[patent_app_date] => 2012-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2257
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13624069
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/624069 | Encryption in the cloud with customer controlled keys | Sep 20, 2012 | Issued |
Array
(
[id] => 8746949
[patent_doc_number] => 20130086666
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-04
[patent_title] => 'METHOD AND COMPUTER SYSTEM FOR PROVIDING TIME RATIO-BASED PASSWORD/CHALLENGE AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 13/624127
[patent_app_country] => US
[patent_app_date] => 2012-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6071
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13624127
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/624127 | Providing time ratio-based password/challenge authentication | Sep 20, 2012 | Issued |
Array
(
[id] => 9372496
[patent_doc_number] => 20140082369
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-20
[patent_title] => 'Method and System For Object Access and Usage Control Using Location and Access Boundary Shape Information'
[patent_app_type] => utility
[patent_app_number] => 13/623457
[patent_app_country] => US
[patent_app_date] => 2012-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6348
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13623457
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/623457 | Method and System For Object Access and Usage Control Using Location and Access Boundary Shape Information | Sep 19, 2012 | Abandoned |
Array
(
[id] => 9129070
[patent_doc_number] => 08577027
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-11-05
[patent_title] => 'Advanced cryptographic method of multilayer diffusion in multidimension'
[patent_app_type] => utility
[patent_app_number] => 13/623215
[patent_app_country] => US
[patent_app_date] => 2012-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 5207
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13623215
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/623215 | Advanced cryptographic method of multilayer diffusion in multidimension | Sep 19, 2012 | Issued |
Array
(
[id] => 9282942
[patent_doc_number] => 20140032910
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-30
[patent_title] => 'STORAGE SYSTEM IN WHICH FICTITIOUS INFORMATION IS PREVENTED'
[patent_app_type] => utility
[patent_app_number] => 13/623318
[patent_app_country] => US
[patent_app_date] => 2012-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 47
[patent_figures_cnt] => 47
[patent_no_of_words] => 23004
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13623318
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/623318 | Storage system in which fictitious information is prevented | Sep 19, 2012 | Issued |
Array
(
[id] => 9096789
[patent_doc_number] => 20130276100
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-17
[patent_title] => 'METHOD AND APPARATUS FOR AUTHENTICATING PASSWORD'
[patent_app_type] => utility
[patent_app_number] => 13/623409
[patent_app_country] => US
[patent_app_date] => 2012-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2779
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13623409
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/623409 | Method and apparatus for authenticating password | Sep 19, 2012 | Issued |
Array
(
[id] => 9834753
[patent_doc_number] => 08943588
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-01-27
[patent_title] => 'Detecting unauthorized websites'
[patent_app_type] => utility
[patent_app_number] => 13/623720
[patent_app_country] => US
[patent_app_date] => 2012-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4787
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13623720
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/623720 | Detecting unauthorized websites | Sep 19, 2012 | Issued |
Array
(
[id] => 8735545
[patent_doc_number] => 20130081114
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-28
[patent_title] => 'SYSTEM AND METHOD FOR USER AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 13/623641
[patent_app_country] => US
[patent_app_date] => 2012-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4537
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13623641
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/623641 | System and method for user authentication | Sep 19, 2012 | Issued |
Array
(
[id] => 8722938
[patent_doc_number] => 20130074155
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-21
[patent_title] => 'NETWORK APPARATUS BASED ON CONTENT NAME, METHOD OF GENERATING AND AUTHENTICATING CONTENT NAME'
[patent_app_type] => utility
[patent_app_number] => 13/623573
[patent_app_country] => US
[patent_app_date] => 2012-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5759
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13623573
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/623573 | Network apparatus based on content name, method of generating and authenticating content name | Sep 19, 2012 | Issued |
Array
(
[id] => 9825137
[patent_doc_number] => 08934632
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-13
[patent_title] => 'System and method for device-to-device (D2D) assisted dynamic traffic control for cellular networks'
[patent_app_type] => utility
[patent_app_number] => 13/622245
[patent_app_country] => US
[patent_app_date] => 2012-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 4324
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13622245
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/622245 | System and method for device-to-device (D2D) assisted dynamic traffic control for cellular networks | Sep 17, 2012 | Issued |
Array
(
[id] => 9056827
[patent_doc_number] => 20130254542
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-26
[patent_title] => 'System and Method for Securing Data From a Remote Input Device'
[patent_app_type] => utility
[patent_app_number] => 13/620179
[patent_app_country] => US
[patent_app_date] => 2012-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5684
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13620179
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/620179 | System and method for securing data from a remote input device | Sep 13, 2012 | Issued |
Array
(
[id] => 9193690
[patent_doc_number] => 20130333005
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-12
[patent_title] => 'CLOUD SERVICE SYSTEM BASED ON ENHANCED SECURITY FUNCTION AND METHOD FOR SUPPORTING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 13/991054
[patent_app_country] => US
[patent_app_date] => 2012-09-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9453
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13991054
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/991054 | Cloud service system based on enhanced security function and method for supporting the same | Sep 4, 2012 | Issued |