Search

Stella M. Reid

Examiner (ID: 13966)

Most Active Art Unit
2904
Art Unit(s)
2900, 2901, 2912, 2899, 2904, 2914
Total Applications
4671
Issued Applications
4563
Pending Applications
0
Abandoned Applications
108

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 13308011 [patent_doc_number] => 20180205542 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-07-19 [patent_title] => RESOURCE MANAGEMENT IN A CELLULAR NETWORK [patent_app_type] => utility [patent_app_number] => 15/314906 [patent_app_country] => US [patent_app_date] => 2015-05-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8324 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -38 [patent_words_short_claim] => 14 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15314906 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/314906
Resource management in a cellular network May 28, 2015 Issued
Array ( [id] => 11274856 [patent_doc_number] => 20160337403 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-11-17 [patent_title] => 'SYSTEM AND METHOD FOR IDENTITY AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 14/708974 [patent_app_country] => US [patent_app_date] => 2015-05-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7520 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14708974 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/708974
System and method for identity authentication May 10, 2015 Issued
Array ( [id] => 11905121 [patent_doc_number] => 09774572 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-09-26 [patent_title] => 'Obfuscation of references to network resources' [patent_app_type] => utility [patent_app_number] => 14/708925 [patent_app_country] => US [patent_app_date] => 2015-05-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 5522 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 246 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14708925 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/708925
Obfuscation of references to network resources May 10, 2015 Issued
Array ( [id] => 11274767 [patent_doc_number] => 20160337314 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-11-17 [patent_title] => 'Firewall Authentication Of Controller-Generated Internet Control Message Protocol (ICMP) Echo Requests' [patent_app_type] => utility [patent_app_number] => 14/709180 [patent_app_country] => US [patent_app_date] => 2015-05-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7917 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709180 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/709180
Firewall authentication of controller-generated internet control message protocol (ICMP) echo requests May 10, 2015 Issued
Array ( [id] => 11412753 [patent_doc_number] => 09560078 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-01-31 [patent_title] => 'Technologies for scalable security architecture of virtualized networks' [patent_app_type] => utility [patent_app_number] => 14/709168 [patent_app_country] => US [patent_app_date] => 2015-05-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 11 [patent_no_of_words] => 20118 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 200 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709168 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/709168
Technologies for scalable security architecture of virtualized networks May 10, 2015 Issued
Array ( [id] => 14254775 [patent_doc_number] => 10277601 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-04-30 [patent_title] => System and method for recursive propagating application access control [patent_app_type] => utility [patent_app_number] => 14/709179 [patent_app_country] => US [patent_app_date] => 2015-05-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 7366 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 448 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709179 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/709179
System and method for recursive propagating application access control May 10, 2015 Issued
Array ( [id] => 11274782 [patent_doc_number] => 20160337329 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-11-17 [patent_title] => 'TECHNOLOGIES FOR SECURE BOOTSTRAPPING OF VIRTUAL NETWORK FUNCTIONS' [patent_app_type] => utility [patent_app_number] => 14/709170 [patent_app_country] => US [patent_app_date] => 2015-05-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 17275 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709170 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/709170
Technologies for secure bootstrapping of virtual network functions May 10, 2015 Issued
Array ( [id] => 11917586 [patent_doc_number] => 09785773 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-10-10 [patent_title] => 'Malware data item analysis' [patent_app_type] => utility [patent_app_number] => 14/668833 [patent_app_country] => US [patent_app_date] => 2015-03-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 15499 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 427 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14668833 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/668833
Malware data item analysis Mar 24, 2015 Issued
Array ( [id] => 11207185 [patent_doc_number] => 09436812 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-09-06 [patent_title] => 'Platform-hardened digital rights management key provisioning' [patent_app_type] => utility [patent_app_number] => 14/641986 [patent_app_country] => US [patent_app_date] => 2015-03-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3792 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 199 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14641986 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/641986
Platform-hardened digital rights management key provisioning Mar 8, 2015 Issued
Array ( [id] => 12556743 [patent_doc_number] => 10015148 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-07-03 [patent_title] => Physics-based key generation [patent_app_type] => utility [patent_app_number] => 14/639733 [patent_app_country] => US [patent_app_date] => 2015-03-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 19209 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 217 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14639733 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/639733
Physics-based key generation Mar 4, 2015 Issued
Array ( [id] => 10605155 [patent_doc_number] => 09325730 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-04-26 [patent_title] => 'Collaborative phishing attack detection' [patent_app_type] => utility [patent_app_number] => 14/620245 [patent_app_country] => US [patent_app_date] => 2015-02-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 7331 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 180 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620245 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/620245
Collaborative phishing attack detection Feb 11, 2015 Issued
Array ( [id] => 10786202 [patent_doc_number] => 20160132358 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-05-12 [patent_title] => 'PERIPHERAL DEVICE SHARING ACROSS VIRTUAL MACHINES RUNNING ON DIFFERENT HOST COMPUTING SYSTEMS' [patent_app_type] => utility [patent_app_number] => 14/602297 [patent_app_country] => US [patent_app_date] => 2015-01-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 4172 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602297 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/602297
Peripheral device sharing across virtual machines running on different host computing systems Jan 21, 2015 Issued
Array ( [id] => 10320958 [patent_doc_number] => 20150205962 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-07-23 [patent_title] => 'BEHAVIORAL ANALYTICS DRIVEN HOST-BASED MALICIOUS BEHAVIOR AND DATA EXFILTRATION DISRUPTION' [patent_app_type] => utility [patent_app_number] => 14/602011 [patent_app_country] => US [patent_app_date] => 2015-01-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 8920 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602011 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/602011
BEHAVIORAL ANALYTICS DRIVEN HOST-BASED MALICIOUS BEHAVIOR AND DATA EXFILTRATION DISRUPTION Jan 20, 2015
Array ( [id] => 11234762 [patent_doc_number] => 09462006 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-10-04 [patent_title] => 'Network-layer application-specific trust model' [patent_app_type] => utility [patent_app_number] => 14/602128 [patent_app_country] => US [patent_app_date] => 2015-01-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8546 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 237 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602128 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/602128
Network-layer application-specific trust model Jan 20, 2015 Issued
Array ( [id] => 11682311 [patent_doc_number] => 09680862 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-06-13 [patent_title] => 'Trusted threat-aware microvisor' [patent_app_type] => utility [patent_app_number] => 14/602023 [patent_app_country] => US [patent_app_date] => 2015-01-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 11753 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 169 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602023 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/602023
Trusted threat-aware microvisor Jan 20, 2015 Issued
Array ( [id] => 11015215 [patent_doc_number] => 20160212168 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-07-21 [patent_title] => 'CREATION OF SECURITY POLICY TEMPLATES AND SECURITY POLICIES BASED ON THE TEMPLATES' [patent_app_type] => utility [patent_app_number] => 14/600473 [patent_app_country] => US [patent_app_date] => 2015-01-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 42 [patent_figures_cnt] => 42 [patent_no_of_words] => 16006 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14600473 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/600473
Creation of security policy templates and security policies based on the templates Jan 19, 2015 Issued
Array ( [id] => 10825045 [patent_doc_number] => 20160171211 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-06-16 [patent_title] => 'Return Oriented Programming (ROP) Attack Protection' [patent_app_type] => utility [patent_app_number] => 14/601122 [patent_app_country] => US [patent_app_date] => 2015-01-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 9871 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14601122 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/601122
Return oriented programming (ROP) attack protection Jan 19, 2015 Issued
Array ( [id] => 11015156 [patent_doc_number] => 20160212109 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-07-21 [patent_title] => 'MANAGING DISTRIBUTION AND RETRIEVAL OF SECURITY KEY FRAGMENTS AMONG PROXY STORAGE DEVICES' [patent_app_type] => utility [patent_app_number] => 14/600497 [patent_app_country] => US [patent_app_date] => 2015-01-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5914 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14600497 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/600497
Managing distribution and retrieval of security key fragments among proxy storage devices Jan 19, 2015 Issued
Array ( [id] => 11015217 [patent_doc_number] => 20160212170 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-07-21 [patent_title] => 'GENERALIZED SECURITY POLICY USER INTERFACE' [patent_app_type] => utility [patent_app_number] => 14/600548 [patent_app_country] => US [patent_app_date] => 2015-01-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 42 [patent_figures_cnt] => 42 [patent_no_of_words] => 15895 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14600548 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/600548
Generalized security policy user interface Jan 19, 2015 Issued
Array ( [id] => 10632376 [patent_doc_number] => 09350537 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-05-24 [patent_title] => 'Enhanced key management for SRNS relocation' [patent_app_type] => utility [patent_app_number] => 14/546861 [patent_app_country] => US [patent_app_date] => 2014-11-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 13194 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 42 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14546861 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/546861
Enhanced key management for SRNS relocation Nov 17, 2014 Issued
Menu