
Stella M. Reid
Examiner (ID: 13966)
| Most Active Art Unit | 2904 |
| Art Unit(s) | 2900, 2901, 2912, 2899, 2904, 2914 |
| Total Applications | 4671 |
| Issued Applications | 4563 |
| Pending Applications | 0 |
| Abandoned Applications | 108 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13308011
[patent_doc_number] => 20180205542
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-19
[patent_title] => RESOURCE MANAGEMENT IN A CELLULAR NETWORK
[patent_app_type] => utility
[patent_app_number] => 15/314906
[patent_app_country] => US
[patent_app_date] => 2015-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8324
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -38
[patent_words_short_claim] => 14
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15314906
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/314906 | Resource management in a cellular network | May 28, 2015 | Issued |
Array
(
[id] => 11274856
[patent_doc_number] => 20160337403
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'SYSTEM AND METHOD FOR IDENTITY AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/708974
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7520
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14708974
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/708974 | System and method for identity authentication | May 10, 2015 | Issued |
Array
(
[id] => 11905121
[patent_doc_number] => 09774572
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-26
[patent_title] => 'Obfuscation of references to network resources'
[patent_app_type] => utility
[patent_app_number] => 14/708925
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 5522
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14708925
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/708925 | Obfuscation of references to network resources | May 10, 2015 | Issued |
Array
(
[id] => 11274767
[patent_doc_number] => 20160337314
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'Firewall Authentication Of Controller-Generated Internet Control Message Protocol (ICMP) Echo Requests'
[patent_app_type] => utility
[patent_app_number] => 14/709180
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7917
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709180
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/709180 | Firewall authentication of controller-generated internet control message protocol (ICMP) echo requests | May 10, 2015 | Issued |
Array
(
[id] => 11412753
[patent_doc_number] => 09560078
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-31
[patent_title] => 'Technologies for scalable security architecture of virtualized networks'
[patent_app_type] => utility
[patent_app_number] => 14/709168
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 20118
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709168
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/709168 | Technologies for scalable security architecture of virtualized networks | May 10, 2015 | Issued |
Array
(
[id] => 14254775
[patent_doc_number] => 10277601
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-04-30
[patent_title] => System and method for recursive propagating application access control
[patent_app_type] => utility
[patent_app_number] => 14/709179
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7366
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 448
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709179
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/709179 | System and method for recursive propagating application access control | May 10, 2015 | Issued |
Array
(
[id] => 11274782
[patent_doc_number] => 20160337329
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'TECHNOLOGIES FOR SECURE BOOTSTRAPPING OF VIRTUAL NETWORK FUNCTIONS'
[patent_app_type] => utility
[patent_app_number] => 14/709170
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 17275
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709170
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/709170 | Technologies for secure bootstrapping of virtual network functions | May 10, 2015 | Issued |
Array
(
[id] => 11917586
[patent_doc_number] => 09785773
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-10
[patent_title] => 'Malware data item analysis'
[patent_app_type] => utility
[patent_app_number] => 14/668833
[patent_app_country] => US
[patent_app_date] => 2015-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 15499
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 427
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14668833
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/668833 | Malware data item analysis | Mar 24, 2015 | Issued |
Array
(
[id] => 11207185
[patent_doc_number] => 09436812
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-06
[patent_title] => 'Platform-hardened digital rights management key provisioning'
[patent_app_type] => utility
[patent_app_number] => 14/641986
[patent_app_country] => US
[patent_app_date] => 2015-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3792
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14641986
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/641986 | Platform-hardened digital rights management key provisioning | Mar 8, 2015 | Issued |
Array
(
[id] => 12556743
[patent_doc_number] => 10015148
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-03
[patent_title] => Physics-based key generation
[patent_app_type] => utility
[patent_app_number] => 14/639733
[patent_app_country] => US
[patent_app_date] => 2015-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 19209
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14639733
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/639733 | Physics-based key generation | Mar 4, 2015 | Issued |
Array
(
[id] => 10605155
[patent_doc_number] => 09325730
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-26
[patent_title] => 'Collaborative phishing attack detection'
[patent_app_type] => utility
[patent_app_number] => 14/620245
[patent_app_country] => US
[patent_app_date] => 2015-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7331
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620245
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/620245 | Collaborative phishing attack detection | Feb 11, 2015 | Issued |
Array
(
[id] => 10786202
[patent_doc_number] => 20160132358
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-12
[patent_title] => 'PERIPHERAL DEVICE SHARING ACROSS VIRTUAL MACHINES RUNNING ON DIFFERENT HOST COMPUTING SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 14/602297
[patent_app_country] => US
[patent_app_date] => 2015-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4172
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602297
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/602297 | Peripheral device sharing across virtual machines running on different host computing systems | Jan 21, 2015 | Issued |
Array
(
[id] => 10320958
[patent_doc_number] => 20150205962
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-23
[patent_title] => 'BEHAVIORAL ANALYTICS DRIVEN HOST-BASED MALICIOUS BEHAVIOR AND DATA EXFILTRATION DISRUPTION'
[patent_app_type] => utility
[patent_app_number] => 14/602011
[patent_app_country] => US
[patent_app_date] => 2015-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8920
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602011
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/602011 | BEHAVIORAL ANALYTICS DRIVEN HOST-BASED MALICIOUS BEHAVIOR AND DATA EXFILTRATION DISRUPTION | Jan 20, 2015 | |
Array
(
[id] => 11234762
[patent_doc_number] => 09462006
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-04
[patent_title] => 'Network-layer application-specific trust model'
[patent_app_type] => utility
[patent_app_number] => 14/602128
[patent_app_country] => US
[patent_app_date] => 2015-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8546
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602128
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/602128 | Network-layer application-specific trust model | Jan 20, 2015 | Issued |
Array
(
[id] => 11682311
[patent_doc_number] => 09680862
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-13
[patent_title] => 'Trusted threat-aware microvisor'
[patent_app_type] => utility
[patent_app_number] => 14/602023
[patent_app_country] => US
[patent_app_date] => 2015-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 11753
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602023
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/602023 | Trusted threat-aware microvisor | Jan 20, 2015 | Issued |
Array
(
[id] => 11015215
[patent_doc_number] => 20160212168
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-21
[patent_title] => 'CREATION OF SECURITY POLICY TEMPLATES AND SECURITY POLICIES BASED ON THE TEMPLATES'
[patent_app_type] => utility
[patent_app_number] => 14/600473
[patent_app_country] => US
[patent_app_date] => 2015-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 42
[patent_figures_cnt] => 42
[patent_no_of_words] => 16006
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14600473
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/600473 | Creation of security policy templates and security policies based on the templates | Jan 19, 2015 | Issued |
Array
(
[id] => 10825045
[patent_doc_number] => 20160171211
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-16
[patent_title] => 'Return Oriented Programming (ROP) Attack Protection'
[patent_app_type] => utility
[patent_app_number] => 14/601122
[patent_app_country] => US
[patent_app_date] => 2015-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9871
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14601122
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/601122 | Return oriented programming (ROP) attack protection | Jan 19, 2015 | Issued |
Array
(
[id] => 11015156
[patent_doc_number] => 20160212109
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-21
[patent_title] => 'MANAGING DISTRIBUTION AND RETRIEVAL OF SECURITY KEY FRAGMENTS AMONG PROXY STORAGE DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/600497
[patent_app_country] => US
[patent_app_date] => 2015-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5914
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14600497
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/600497 | Managing distribution and retrieval of security key fragments among proxy storage devices | Jan 19, 2015 | Issued |
Array
(
[id] => 11015217
[patent_doc_number] => 20160212170
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-21
[patent_title] => 'GENERALIZED SECURITY POLICY USER INTERFACE'
[patent_app_type] => utility
[patent_app_number] => 14/600548
[patent_app_country] => US
[patent_app_date] => 2015-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 42
[patent_figures_cnt] => 42
[patent_no_of_words] => 15895
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14600548
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/600548 | Generalized security policy user interface | Jan 19, 2015 | Issued |
Array
(
[id] => 10632376
[patent_doc_number] => 09350537
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-24
[patent_title] => 'Enhanced key management for SRNS relocation'
[patent_app_type] => utility
[patent_app_number] => 14/546861
[patent_app_country] => US
[patent_app_date] => 2014-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 13194
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 42
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14546861
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/546861 | Enhanced key management for SRNS relocation | Nov 17, 2014 | Issued |