Search

Samson B. Lemma

Examiner (ID: 223, Phone: (571)272-3806 , Office: P/2498 )

Most Active Art Unit
2498
Art Unit(s)
2132, 2432, 2498
Total Applications
1343
Issued Applications
1146
Pending Applications
68
Abandoned Applications
151

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10059364 [patent_doc_number] => 09098726 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-08-04 [patent_title] => 'Scalable and secure application resource management and access control for multicore operating systems' [patent_app_type] => utility [patent_app_number] => 13/648157 [patent_app_country] => US [patent_app_date] => 2012-10-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3333 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 94 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13648157 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/648157
Scalable and secure application resource management and access control for multicore operating systems Oct 8, 2012 Issued
Array ( [id] => 8639827 [patent_doc_number] => 20130031630 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-01-31 [patent_title] => 'Method and Apparatus for Identifying Phishing Websites in Network Traffic Using Generated Regular Expressions' [patent_app_type] => utility [patent_app_number] => 13/644055 [patent_app_country] => US [patent_app_date] => 2012-10-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5543 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13644055 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/644055
Method and apparatus for identifying phishing websites in network traffic using generated regular expressions Oct 2, 2012 Issued
Array ( [id] => 8661275 [patent_doc_number] => 20130042104 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-02-14 [patent_title] => 'Certificate-based cookie security' [patent_app_type] => utility [patent_app_number] => 13/633484 [patent_app_country] => US [patent_app_date] => 2012-10-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6975 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13633484 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/633484
Certificate-based cookie security Oct 1, 2012 Issued
Array ( [id] => 9871546 [patent_doc_number] => 08959338 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-02-17 [patent_title] => 'Remote access manager for virtual computing services' [patent_app_type] => utility [patent_app_number] => 13/632202 [patent_app_country] => US [patent_app_date] => 2012-10-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4808 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 109 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13632202 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/632202
Remote access manager for virtual computing services Sep 30, 2012 Issued
Array ( [id] => 8746943 [patent_doc_number] => 20130086660 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-04-04 [patent_title] => 'SYSTEM FOR PREVENTING ILLEGAL COPY OF SOFTWARE AND METHOD FOR PREVENTING ILLEGAL COPY OF SOFTWARE' [patent_app_type] => utility [patent_app_number] => 13/624768 [patent_app_country] => US [patent_app_date] => 2012-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3350 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13624768 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/624768
SYSTEM FOR PREVENTING ILLEGAL COPY OF SOFTWARE AND METHOD FOR PREVENTING ILLEGAL COPY OF SOFTWARE Sep 20, 2012 Abandoned
Array ( [id] => 9386591 [patent_doc_number] => 20140090074 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-03-27 [patent_title] => 'ENHANCED PRIVACY FOR PROVISION OF COMPUTER VISION' [patent_app_type] => utility [patent_app_number] => 13/624703 [patent_app_country] => US [patent_app_date] => 2012-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4374 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13624703 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/624703
Enhanced privacy for provision of computer vision Sep 20, 2012 Issued
Array ( [id] => 9386590 [patent_doc_number] => 20140090073 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-03-27 [patent_title] => 'Obscuring Sensitive Portions of Universal Resource Locator' [patent_app_type] => utility [patent_app_number] => 13/624692 [patent_app_country] => US [patent_app_date] => 2012-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3751 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13624692 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/624692
Obscuring sensitive portions of universal resource locator Sep 20, 2012 Issued
Array ( [id] => 8735564 [patent_doc_number] => 20130081133 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-03-28 [patent_title] => 'SYSTEM AND METHOD FOR UNLOCKING AN ELECTRONIC DEVICE' [patent_app_type] => utility [patent_app_number] => 13/624168 [patent_app_country] => US [patent_app_date] => 2012-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4010 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13624168 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/624168
SYSTEM AND METHOD FOR UNLOCKING AN ELECTRONIC DEVICE Sep 20, 2012 Abandoned
Array ( [id] => 9386191 [patent_doc_number] => 20140089674 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-03-27 [patent_title] => 'ENCRYPTION IN THE CLOUD WITH CUSTOMER CONTROLLED KEYS' [patent_app_type] => utility [patent_app_number] => 13/624069 [patent_app_country] => US [patent_app_date] => 2012-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2257 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13624069 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/624069
Encryption in the cloud with customer controlled keys Sep 20, 2012 Issued
Array ( [id] => 8746949 [patent_doc_number] => 20130086666 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-04-04 [patent_title] => 'METHOD AND COMPUTER SYSTEM FOR PROVIDING TIME RATIO-BASED PASSWORD/CHALLENGE AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 13/624127 [patent_app_country] => US [patent_app_date] => 2012-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6071 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13624127 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/624127
Providing time ratio-based password/challenge authentication Sep 20, 2012 Issued
Array ( [id] => 9372496 [patent_doc_number] => 20140082369 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-03-20 [patent_title] => 'Method and System For Object Access and Usage Control Using Location and Access Boundary Shape Information' [patent_app_type] => utility [patent_app_number] => 13/623457 [patent_app_country] => US [patent_app_date] => 2012-09-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6348 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13623457 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/623457
Method and System For Object Access and Usage Control Using Location and Access Boundary Shape Information Sep 19, 2012 Abandoned
Array ( [id] => 9129070 [patent_doc_number] => 08577027 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-11-05 [patent_title] => 'Advanced cryptographic method of multilayer diffusion in multidimension' [patent_app_type] => utility [patent_app_number] => 13/623215 [patent_app_country] => US [patent_app_date] => 2012-09-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 8 [patent_no_of_words] => 5207 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 71 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13623215 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/623215
Advanced cryptographic method of multilayer diffusion in multidimension Sep 19, 2012 Issued
Array ( [id] => 9282942 [patent_doc_number] => 20140032910 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-01-30 [patent_title] => 'STORAGE SYSTEM IN WHICH FICTITIOUS INFORMATION IS PREVENTED' [patent_app_type] => utility [patent_app_number] => 13/623318 [patent_app_country] => US [patent_app_date] => 2012-09-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 47 [patent_figures_cnt] => 47 [patent_no_of_words] => 23004 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13623318 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/623318
Storage system in which fictitious information is prevented Sep 19, 2012 Issued
Array ( [id] => 9096789 [patent_doc_number] => 20130276100 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-10-17 [patent_title] => 'METHOD AND APPARATUS FOR AUTHENTICATING PASSWORD' [patent_app_type] => utility [patent_app_number] => 13/623409 [patent_app_country] => US [patent_app_date] => 2012-09-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2779 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13623409 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/623409
Method and apparatus for authenticating password Sep 19, 2012 Issued
Array ( [id] => 9834753 [patent_doc_number] => 08943588 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-01-27 [patent_title] => 'Detecting unauthorized websites' [patent_app_type] => utility [patent_app_number] => 13/623720 [patent_app_country] => US [patent_app_date] => 2012-09-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4787 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 172 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13623720 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/623720
Detecting unauthorized websites Sep 19, 2012 Issued
Array ( [id] => 8735545 [patent_doc_number] => 20130081114 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-03-28 [patent_title] => 'SYSTEM AND METHOD FOR USER AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 13/623641 [patent_app_country] => US [patent_app_date] => 2012-09-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4537 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13623641 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/623641
System and method for user authentication Sep 19, 2012 Issued
Array ( [id] => 8722938 [patent_doc_number] => 20130074155 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-03-21 [patent_title] => 'NETWORK APPARATUS BASED ON CONTENT NAME, METHOD OF GENERATING AND AUTHENTICATING CONTENT NAME' [patent_app_type] => utility [patent_app_number] => 13/623573 [patent_app_country] => US [patent_app_date] => 2012-09-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5759 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13623573 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/623573
Network apparatus based on content name, method of generating and authenticating content name Sep 19, 2012 Issued
Array ( [id] => 9825137 [patent_doc_number] => 08934632 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-01-13 [patent_title] => 'System and method for device-to-device (D2D) assisted dynamic traffic control for cellular networks' [patent_app_type] => utility [patent_app_number] => 13/622245 [patent_app_country] => US [patent_app_date] => 2012-09-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 4324 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13622245 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/622245
System and method for device-to-device (D2D) assisted dynamic traffic control for cellular networks Sep 17, 2012 Issued
Array ( [id] => 9056827 [patent_doc_number] => 20130254542 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-09-26 [patent_title] => 'System and Method for Securing Data From a Remote Input Device' [patent_app_type] => utility [patent_app_number] => 13/620179 [patent_app_country] => US [patent_app_date] => 2012-09-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5684 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13620179 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/620179
System and method for securing data from a remote input device Sep 13, 2012 Issued
Array ( [id] => 9193690 [patent_doc_number] => 20130333005 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-12-12 [patent_title] => 'CLOUD SERVICE SYSTEM BASED ON ENHANCED SECURITY FUNCTION AND METHOD FOR SUPPORTING THE SAME' [patent_app_type] => utility [patent_app_number] => 13/991054 [patent_app_country] => US [patent_app_date] => 2012-09-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9453 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13991054 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/991054
Cloud service system based on enhanced security function and method for supporting the same Sep 4, 2012 Issued
Menu