
Stella M. Reid
Examiner (ID: 13966)
| Most Active Art Unit | 2904 |
| Art Unit(s) | 2900, 2901, 2912, 2899, 2904, 2914 |
| Total Applications | 4671 |
| Issued Applications | 4563 |
| Pending Applications | 0 |
| Abandoned Applications | 108 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15986753
[patent_doc_number] => 10673719
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-02
[patent_title] => Techniques for botnet detection and member identification
[patent_app_type] => utility
[patent_app_number] => 15/442582
[patent_app_country] => US
[patent_app_date] => 2017-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 12800
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 488
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15442582
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/442582 | Techniques for botnet detection and member identification | Feb 23, 2017 | Issued |
Array
(
[id] => 11674964
[patent_doc_number] => 20170163688
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-08
[patent_title] => 'Segmented Networks that Implement Scanning'
[patent_app_type] => utility
[patent_app_number] => 15/441156
[patent_app_country] => US
[patent_app_date] => 2017-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9502
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15441156
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/441156 | Segmented networks that implement scanning | Feb 22, 2017 | Issued |
Array
(
[id] => 12108374
[patent_doc_number] => 09864859
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-09
[patent_title] => 'Technologies for secure bootstrapping of virtual network functions'
[patent_app_type] => utility
[patent_app_number] => 15/437754
[patent_app_country] => US
[patent_app_date] => 2017-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 17312
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15437754
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/437754 | Technologies for secure bootstrapping of virtual network functions | Feb 20, 2017 | Issued |
Array
(
[id] => 11631974
[patent_doc_number] => 20170142163
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-18
[patent_title] => 'TECHNOLOGIES FOR SCALABLE SECURITY ARCHITECTURE OF VIRTUALIZED NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 15/420858
[patent_app_country] => US
[patent_app_date] => 2017-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 20150
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15420858
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/420858 | Technologies for scalable security architecture of virtualized networks | Jan 30, 2017 | Issued |
Array
(
[id] => 11661199
[patent_doc_number] => 09674221
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-06-06
[patent_title] => 'Collaborative phishing attack detection'
[patent_app_type] => utility
[patent_app_number] => 15/418709
[patent_app_country] => US
[patent_app_date] => 2017-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7383
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 583
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15418709
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/418709 | Collaborative phishing attack detection | Jan 27, 2017 | Issued |
Array
(
[id] => 11621972
[patent_doc_number] => 20170132159
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-11
[patent_title] => 'SYSTEM AND METHOD FOR INTERCEPT OF UEFI BLOCK I/O PROTOCOL SERVICES FOR BIOS BASED HARD DRIVE ENCRYPTION SUPPORT'
[patent_app_type] => utility
[patent_app_number] => 15/414887
[patent_app_country] => US
[patent_app_date] => 2017-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7427
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15414887
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/414887 | System and method for intercept of UEFI block I/O protocol services for BIOS based hard drive encryption support | Jan 24, 2017 | Issued |
Array
(
[id] => 13322459
[patent_doc_number] => 20180212767
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-26
[patent_title] => METHOD OF GENERATING CRYPTOGRAPHIC KEY PAIRS
[patent_app_type] => utility
[patent_app_number] => 15/414391
[patent_app_country] => US
[patent_app_date] => 2017-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4358
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15414391
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/414391 | Method of generating cryptographic key pairs | Jan 23, 2017 | Issued |
Array
(
[id] => 18577910
[patent_doc_number] => 11734443
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-08-22
[patent_title] => Information control program, information control system, and information control method
[patent_app_type] => utility
[patent_app_number] => 16/479477
[patent_app_country] => US
[patent_app_date] => 2017-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 12494
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 309
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16479477
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/479477 | Information control program, information control system, and information control method | Jan 18, 2017 | Issued |
Array
(
[id] => 12899575
[patent_doc_number] => 20180191700
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-05
[patent_title] => TWO-TOKEN BASED AUTHENTICATED SESSION MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 15/395448
[patent_app_country] => US
[patent_app_date] => 2016-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10496
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15395448
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/395448 | Two-token based authenticated session management | Dec 29, 2016 | Issued |
Array
(
[id] => 14645769
[patent_doc_number] => 10367639
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-30
[patent_title] => Graphics processor with encrypted kernels
[patent_app_type] => utility
[patent_app_number] => 15/394324
[patent_app_country] => US
[patent_app_date] => 2016-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 10280
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15394324
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/394324 | Graphics processor with encrypted kernels | Dec 28, 2016 | Issued |
Array
(
[id] => 12696556
[patent_doc_number] => 20180124018
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-03
[patent_title] => COORDINATED APPLICATION FIREWALL
[patent_app_type] => utility
[patent_app_number] => 15/388934
[patent_app_country] => US
[patent_app_date] => 2016-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5856
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 59
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15388934
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/388934 | COORDINATED APPLICATION FIREWALL | Dec 21, 2016 | Abandoned |
Array
(
[id] => 11825740
[patent_doc_number] => 20170214677
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-27
[patent_title] => 'METHODS OF COLLABORATIVE HARDWARE AND SOFTWARE DNS ACCELERATION AND DDOS PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 15/382018
[patent_app_country] => US
[patent_app_date] => 2016-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 15972
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15382018
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/382018 | Methods of collaborative hardware and software DNS acceleration and DDOS protection | Dec 15, 2016 | Issued |
Array
(
[id] => 11533593
[patent_doc_number] => 20170093573
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'Shared Data Encryption and Confidentiality'
[patent_app_type] => utility
[patent_app_number] => 15/374180
[patent_app_country] => US
[patent_app_date] => 2016-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7458
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15374180
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/374180 | Shared data encryption and confidentiality | Dec 8, 2016 | Issued |
Array
(
[id] => 11761195
[patent_doc_number] => 20170208064
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-20
[patent_title] => 'METHODS AND SYSTEMS FOR TRANSFERRING SECURE DATA AND FACILITATING NEW CLIENT ACQUISITIONS'
[patent_app_type] => utility
[patent_app_number] => 15/361320
[patent_app_country] => US
[patent_app_date] => 2016-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 13088
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15361320
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/361320 | Methods and systems for transferring secure data and facilitating new client acquisitions | Nov 24, 2016 | Issued |
Array
(
[id] => 14709327
[patent_doc_number] => 10382436
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-13
[patent_title] => Network security based on device identifiers and network addresses
[patent_app_type] => utility
[patent_app_number] => 15/359542
[patent_app_country] => US
[patent_app_date] => 2016-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11344
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 403
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15359542
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/359542 | Network security based on device identifiers and network addresses | Nov 21, 2016 | Issued |
Array
(
[id] => 12719659
[patent_doc_number] => 20180131720
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-10
[patent_title] => DYNAMIC FLOW SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/346072
[patent_app_country] => US
[patent_app_date] => 2016-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6409
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15346072
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/346072 | Dynamic flow system | Nov 7, 2016 | Issued |
Array
(
[id] => 11565865
[patent_doc_number] => 09628472
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-04-18
[patent_title] => 'Distributed password verification'
[patent_app_type] => utility
[patent_app_number] => 15/344729
[patent_app_country] => US
[patent_app_date] => 2016-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 7722
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 630
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15344729
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/344729 | Distributed password verification | Nov 6, 2016 | Issued |
Array
(
[id] => 12719629
[patent_doc_number] => 20180131710
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-10
[patent_title] => NETWORK TELEPHONY ANOMALY DETECTION IMAGES
[patent_app_type] => utility
[patent_app_number] => 15/345491
[patent_app_country] => US
[patent_app_date] => 2016-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7011
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15345491
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/345491 | NETWORK TELEPHONY ANOMALY DETECTION IMAGES | Nov 6, 2016 | Abandoned |
Array
(
[id] => 13920229
[patent_doc_number] => 10204238
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-02-12
[patent_title] => Systems and methods for managing data incidents
[patent_app_type] => utility
[patent_app_number] => 15/339786
[patent_app_country] => US
[patent_app_date] => 2016-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 10405
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 326
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15339786
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/339786 | Systems and methods for managing data incidents | Oct 30, 2016 | Issued |
Array
(
[id] => 11447188
[patent_doc_number] => 20170048210
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'RE-PROGRAMMABLE SECURE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/338022
[patent_app_country] => US
[patent_app_date] => 2016-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10869
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15338022
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/338022 | Re-programmable secure device | Oct 27, 2016 | Issued |