
Stella M. Reid
Examiner (ID: 13966)
| Most Active Art Unit | 2904 |
| Art Unit(s) | 2900, 2901, 2912, 2899, 2904, 2914 |
| Total Applications | 4671 |
| Issued Applications | 4563 |
| Pending Applications | 0 |
| Abandoned Applications | 108 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17003404
[patent_doc_number] => 11082236
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-03
[patent_title] => Method for providing secure digital signatures
[patent_app_type] => utility
[patent_app_number] => 16/317215
[patent_app_country] => US
[patent_app_date] => 2017-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 7876
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16317215
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/317215 | Method for providing secure digital signatures | Jul 11, 2017 | Issued |
Array
(
[id] => 15705699
[patent_doc_number] => 10609045
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-31
[patent_title] => Autonomic incident triage prioritization by performance modifier and temporal decay parameters
[patent_app_type] => utility
[patent_app_number] => 15/741182
[patent_app_country] => US
[patent_app_date] => 2017-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8914
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 278
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15741182
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/741182 | Autonomic incident triage prioritization by performance modifier and temporal decay parameters | Jun 28, 2017 | Issued |
Array
(
[id] => 14400111
[patent_doc_number] => 10313355
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-04
[patent_title] => Client side security management for an operations, administration and maintenance system for wireless clients
[patent_app_type] => utility
[patent_app_number] => 15/630802
[patent_app_country] => US
[patent_app_date] => 2017-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3744
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15630802
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/630802 | Client side security management for an operations, administration and maintenance system for wireless clients | Jun 21, 2017 | Issued |
Array
(
[id] => 13711217
[patent_doc_number] => 20170366563
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-21
[patent_title] => Agentless ransomware detection and recovery
[patent_app_type] => utility
[patent_app_number] => 15/623401
[patent_app_country] => US
[patent_app_date] => 2017-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3904
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 51
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15623401
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/623401 | Agentless ransomware detection and recovery | Jun 14, 2017 | Abandoned |
Array
(
[id] => 13632033
[patent_doc_number] => 20180367571
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-20
[patent_title] => MOBILE USER IDENTITY AND/OR SIM-BASED IOT IDENTITY AND APPLICATION IDENTITY BASED SECURITY ENFORCEMENT IN SERVICE PROVIDER NETWORKS
[patent_app_type] => utility
[patent_app_number] => 15/624440
[patent_app_country] => US
[patent_app_date] => 2017-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18106
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 65
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15624440
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/624440 | Mobile user identity and/or SIM-based IoT identity and application identity based security enforcement in service provider networks | Jun 14, 2017 | Issued |
Array
(
[id] => 14998291
[patent_doc_number] => 20190318103
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-17
[patent_title] => SECURE INITIATION AND TRANSFER OF A CRYPTOGRAPHIC DATABASE AND/OR A CRYPTOGRAPHIC UNIT
[patent_app_type] => utility
[patent_app_number] => 16/309588
[patent_app_country] => US
[patent_app_date] => 2017-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 26442
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16309588
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/309588 | Secure initiation and transfer of a cryptographic database and/or a cryptographic unit | Jun 12, 2017 | Issued |
Array
(
[id] => 12214047
[patent_doc_number] => 09910856
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-06
[patent_title] => 'Information source agent systems and methods for distributed data storage and management using content signatures'
[patent_app_type] => utility
[patent_app_number] => 15/620559
[patent_app_country] => US
[patent_app_date] => 2017-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 34
[patent_no_of_words] => 19360
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15620559
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/620559 | Information source agent systems and methods for distributed data storage and management using content signatures | Jun 11, 2017 | Issued |
Array
(
[id] => 13083941
[patent_doc_number] => 10062038
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-08-28
[patent_title] => Generation and use of trained file classifiers for malware detection
[patent_app_type] => utility
[patent_app_number] => 15/610228
[patent_app_country] => US
[patent_app_date] => 2017-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13575
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15610228
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/610228 | Generation and use of trained file classifiers for malware detection | May 30, 2017 | Issued |
Array
(
[id] => 14365405
[patent_doc_number] => 10304010
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-28
[patent_title] => Generation and use of trained file classifiers for malware detection
[patent_app_type] => utility
[patent_app_number] => 15/610191
[patent_app_country] => US
[patent_app_date] => 2017-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13575
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15610191
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/610191 | Generation and use of trained file classifiers for malware detection | May 30, 2017 | Issued |
Array
(
[id] => 13097689
[patent_doc_number] => 10068187
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-09-04
[patent_title] => Generation and use of trained file classifiers for malware detection
[patent_app_type] => utility
[patent_app_number] => 15/610173
[patent_app_country] => US
[patent_app_date] => 2017-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13575
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15610173
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/610173 | Generation and use of trained file classifiers for malware detection | May 30, 2017 | Issued |
Array
(
[id] => 11946840
[patent_doc_number] => 20170250991
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-31
[patent_title] => 'METHOD AND SYSTEM FOR IMPLEMENTING THIRD-PARTY AUTHENTICATION BASED ON GRAY LIST'
[patent_app_type] => utility
[patent_app_number] => 15/593487
[patent_app_country] => US
[patent_app_date] => 2017-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6189
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15593487
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/593487 | METHOD AND SYSTEM FOR IMPLEMENTING THIRD-PARTY AUTHENTICATION BASED ON GRAY LIST | May 11, 2017 | Abandoned |
Array
(
[id] => 12108469
[patent_doc_number] => 09864956
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-01-09
[patent_title] => 'Generation and use of trained file classifiers for malware detection'
[patent_app_type] => utility
[patent_app_number] => 15/583565
[patent_app_country] => US
[patent_app_date] => 2017-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13990
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15583565
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/583565 | Generation and use of trained file classifiers for malware detection | Apr 30, 2017 | Issued |
Array
(
[id] => 13821237
[patent_doc_number] => 10187407
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-01-22
[patent_title] => Collaborative phishing attack detection
[patent_app_type] => utility
[patent_app_number] => 15/583970
[patent_app_country] => US
[patent_app_date] => 2017-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7160
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 473
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15583970
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/583970 | Collaborative phishing attack detection | Apr 30, 2017 | Issued |
Array
(
[id] => 14319267
[patent_doc_number] => 20190149337
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-16
[patent_title] => IMPLEMENTING LOGIC GATE FUNCTIONALITY USING A BLOCKCHAIN
[patent_app_type] => utility
[patent_app_number] => 16/097546
[patent_app_country] => US
[patent_app_date] => 2017-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17434
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -23
[patent_words_short_claim] => 42
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16097546
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/097546 | IMPLEMENTING LOGIC GATE FUNCTIONALITY USING A BLOCKCHAIN | Apr 27, 2017 | Pending |
Array
(
[id] => 17909393
[patent_doc_number] => 11463267
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-04
[patent_title] => Network function virtualization system and verifying method
[patent_app_type] => utility
[patent_app_number] => 16/331581
[patent_app_country] => US
[patent_app_date] => 2017-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 38
[patent_figures_cnt] => 38
[patent_no_of_words] => 14308
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16331581
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/331581 | Network function virtualization system and verifying method | Apr 17, 2017 | Issued |
Array
(
[id] => 13501725
[patent_doc_number] => 20180302405
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-18
[patent_title] => ORGANIZATIONAL SIGN-IN ACROSS SOVEREIGN ENVIRONMENTS
[patent_app_type] => utility
[patent_app_number] => 15/490675
[patent_app_country] => US
[patent_app_date] => 2017-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6088
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15490675
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/490675 | ORGANIZATIONAL SIGN-IN ACROSS SOVEREIGN ENVIRONMENTS | Apr 17, 2017 | Abandoned |
Array
(
[id] => 12163522
[patent_doc_number] => 20180034788
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'COOPERATION MANAGEMENT APPARATUS AND COMMUNICATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/490331
[patent_app_country] => US
[patent_app_date] => 2017-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3892
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15490331
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/490331 | COOPERATION MANAGEMENT APPARATUS AND COMMUNICATION SYSTEM | Apr 17, 2017 | Abandoned |
Array
(
[id] => 14890337
[patent_doc_number] => 10425228
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-24
[patent_title] => Receipt, data reduction, and storage of encrypted data
[patent_app_type] => utility
[patent_app_number] => 15/445174
[patent_app_country] => US
[patent_app_date] => 2017-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8356
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15445174
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/445174 | Receipt, data reduction, and storage of encrypted data | Feb 27, 2017 | Issued |
Array
(
[id] => 14601449
[patent_doc_number] => 10353917
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-16
[patent_title] => Method and apparatus for analyzing a transmission signal
[patent_app_type] => utility
[patent_app_number] => 15/443035
[patent_app_country] => US
[patent_app_date] => 2017-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 13
[patent_no_of_words] => 5430
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15443035
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/443035 | Method and apparatus for analyzing a transmission signal | Feb 26, 2017 | Issued |
Array
(
[id] => 16610441
[patent_doc_number] => 10911472
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-02
[patent_title] => Techniques for targeted botnet protection
[patent_app_type] => utility
[patent_app_number] => 15/442560
[patent_app_country] => US
[patent_app_date] => 2017-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 12798
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 566
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15442560
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/442560 | Techniques for targeted botnet protection | Feb 23, 2017 | Issued |