Search

Stella M. Reid

Examiner (ID: 13966)

Most Active Art Unit
2904
Art Unit(s)
2900, 2901, 2912, 2899, 2904, 2914
Total Applications
4671
Issued Applications
4563
Pending Applications
0
Abandoned Applications
108

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 15986753 [patent_doc_number] => 10673719 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-06-02 [patent_title] => Techniques for botnet detection and member identification [patent_app_type] => utility [patent_app_number] => 15/442582 [patent_app_country] => US [patent_app_date] => 2017-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 12800 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 488 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15442582 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/442582
Techniques for botnet detection and member identification Feb 23, 2017 Issued
Array ( [id] => 11674964 [patent_doc_number] => 20170163688 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-06-08 [patent_title] => 'Segmented Networks that Implement Scanning' [patent_app_type] => utility [patent_app_number] => 15/441156 [patent_app_country] => US [patent_app_date] => 2017-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 9502 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15441156 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/441156
Segmented networks that implement scanning Feb 22, 2017 Issued
Array ( [id] => 12108374 [patent_doc_number] => 09864859 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-01-09 [patent_title] => 'Technologies for secure bootstrapping of virtual network functions' [patent_app_type] => utility [patent_app_number] => 15/437754 [patent_app_country] => US [patent_app_date] => 2017-02-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 11 [patent_no_of_words] => 17312 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 274 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15437754 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/437754
Technologies for secure bootstrapping of virtual network functions Feb 20, 2017 Issued
Array ( [id] => 11631974 [patent_doc_number] => 20170142163 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-05-18 [patent_title] => 'TECHNOLOGIES FOR SCALABLE SECURITY ARCHITECTURE OF VIRTUALIZED NETWORKS' [patent_app_type] => utility [patent_app_number] => 15/420858 [patent_app_country] => US [patent_app_date] => 2017-01-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 20150 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15420858 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/420858
Technologies for scalable security architecture of virtualized networks Jan 30, 2017 Issued
Array ( [id] => 11661199 [patent_doc_number] => 09674221 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-06-06 [patent_title] => 'Collaborative phishing attack detection' [patent_app_type] => utility [patent_app_number] => 15/418709 [patent_app_country] => US [patent_app_date] => 2017-01-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 7383 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 583 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15418709 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/418709
Collaborative phishing attack detection Jan 27, 2017 Issued
Array ( [id] => 11621972 [patent_doc_number] => 20170132159 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-05-11 [patent_title] => 'SYSTEM AND METHOD FOR INTERCEPT OF UEFI BLOCK I/O PROTOCOL SERVICES FOR BIOS BASED HARD DRIVE ENCRYPTION SUPPORT' [patent_app_type] => utility [patent_app_number] => 15/414887 [patent_app_country] => US [patent_app_date] => 2017-01-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7427 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15414887 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/414887
System and method for intercept of UEFI block I/O protocol services for BIOS based hard drive encryption support Jan 24, 2017 Issued
Array ( [id] => 13322459 [patent_doc_number] => 20180212767 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-07-26 [patent_title] => METHOD OF GENERATING CRYPTOGRAPHIC KEY PAIRS [patent_app_type] => utility [patent_app_number] => 15/414391 [patent_app_country] => US [patent_app_date] => 2017-01-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4358 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 164 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15414391 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/414391
Method of generating cryptographic key pairs Jan 23, 2017 Issued
Array ( [id] => 18577910 [patent_doc_number] => 11734443 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-08-22 [patent_title] => Information control program, information control system, and information control method [patent_app_type] => utility [patent_app_number] => 16/479477 [patent_app_country] => US [patent_app_date] => 2017-01-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 12494 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 309 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16479477 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/479477
Information control program, information control system, and information control method Jan 18, 2017 Issued
Array ( [id] => 12899575 [patent_doc_number] => 20180191700 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-07-05 [patent_title] => TWO-TOKEN BASED AUTHENTICATED SESSION MANAGEMENT [patent_app_type] => utility [patent_app_number] => 15/395448 [patent_app_country] => US [patent_app_date] => 2016-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10496 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 220 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15395448 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/395448
Two-token based authenticated session management Dec 29, 2016 Issued
Array ( [id] => 14645769 [patent_doc_number] => 10367639 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-30 [patent_title] => Graphics processor with encrypted kernels [patent_app_type] => utility [patent_app_number] => 15/394324 [patent_app_country] => US [patent_app_date] => 2016-12-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 15 [patent_no_of_words] => 10280 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 152 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15394324 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/394324
Graphics processor with encrypted kernels Dec 28, 2016 Issued
Array ( [id] => 12696556 [patent_doc_number] => 20180124018 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-05-03 [patent_title] => COORDINATED APPLICATION FIREWALL [patent_app_type] => utility [patent_app_number] => 15/388934 [patent_app_country] => US [patent_app_date] => 2016-12-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5856 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -26 [patent_words_short_claim] => 59 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15388934 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/388934
COORDINATED APPLICATION FIREWALL Dec 21, 2016 Abandoned
Array ( [id] => 11825740 [patent_doc_number] => 20170214677 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-07-27 [patent_title] => 'METHODS OF COLLABORATIVE HARDWARE AND SOFTWARE DNS ACCELERATION AND DDOS PROTECTION' [patent_app_type] => utility [patent_app_number] => 15/382018 [patent_app_country] => US [patent_app_date] => 2016-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 15972 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15382018 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/382018
Methods of collaborative hardware and software DNS acceleration and DDOS protection Dec 15, 2016 Issued
Array ( [id] => 11533593 [patent_doc_number] => 20170093573 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-03-30 [patent_title] => 'Shared Data Encryption and Confidentiality' [patent_app_type] => utility [patent_app_number] => 15/374180 [patent_app_country] => US [patent_app_date] => 2016-12-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7458 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15374180 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/374180
Shared data encryption and confidentiality Dec 8, 2016 Issued
Array ( [id] => 11761195 [patent_doc_number] => 20170208064 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-07-20 [patent_title] => 'METHODS AND SYSTEMS FOR TRANSFERRING SECURE DATA AND FACILITATING NEW CLIENT ACQUISITIONS' [patent_app_type] => utility [patent_app_number] => 15/361320 [patent_app_country] => US [patent_app_date] => 2016-11-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 21 [patent_no_of_words] => 13088 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15361320 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/361320
Methods and systems for transferring secure data and facilitating new client acquisitions Nov 24, 2016 Issued
Array ( [id] => 14709327 [patent_doc_number] => 10382436 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-08-13 [patent_title] => Network security based on device identifiers and network addresses [patent_app_type] => utility [patent_app_number] => 15/359542 [patent_app_country] => US [patent_app_date] => 2016-11-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 11344 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 403 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15359542 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/359542
Network security based on device identifiers and network addresses Nov 21, 2016 Issued
Array ( [id] => 12719659 [patent_doc_number] => 20180131720 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-05-10 [patent_title] => DYNAMIC FLOW SYSTEM [patent_app_type] => utility [patent_app_number] => 15/346072 [patent_app_country] => US [patent_app_date] => 2016-11-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6409 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -21 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15346072 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/346072
Dynamic flow system Nov 7, 2016 Issued
Array ( [id] => 11565865 [patent_doc_number] => 09628472 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-04-18 [patent_title] => 'Distributed password verification' [patent_app_type] => utility [patent_app_number] => 15/344729 [patent_app_country] => US [patent_app_date] => 2016-11-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 7722 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 630 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15344729 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/344729
Distributed password verification Nov 6, 2016 Issued
Array ( [id] => 12719629 [patent_doc_number] => 20180131710 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-05-10 [patent_title] => NETWORK TELEPHONY ANOMALY DETECTION IMAGES [patent_app_type] => utility [patent_app_number] => 15/345491 [patent_app_country] => US [patent_app_date] => 2016-11-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7011 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 76 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15345491 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/345491
NETWORK TELEPHONY ANOMALY DETECTION IMAGES Nov 6, 2016 Abandoned
Array ( [id] => 13920229 [patent_doc_number] => 10204238 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-02-12 [patent_title] => Systems and methods for managing data incidents [patent_app_type] => utility [patent_app_number] => 15/339786 [patent_app_country] => US [patent_app_date] => 2016-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 10405 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 326 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15339786 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/339786
Systems and methods for managing data incidents Oct 30, 2016 Issued
Array ( [id] => 11447188 [patent_doc_number] => 20170048210 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-02-16 [patent_title] => 'RE-PROGRAMMABLE SECURE DEVICE' [patent_app_type] => utility [patent_app_number] => 15/338022 [patent_app_country] => US [patent_app_date] => 2016-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10869 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15338022 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/338022
Re-programmable secure device Oct 27, 2016 Issued
Menu