Search

Stephen J. Cherry

Examiner (ID: 13877)

Most Active Art Unit
2863
Art Unit(s)
2863, 2857
Total Applications
649
Issued Applications
546
Pending Applications
5
Abandoned Applications
99

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 16551996 [patent_doc_number] => 10885157 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-01-05 [patent_title] => Determining a database signature [patent_app_type] => utility [patent_app_number] => 15/477796 [patent_app_country] => US [patent_app_date] => 2017-04-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8210 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 211 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15477796 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/477796
Determining a database signature Apr 2, 2017 Issued
Array ( [id] => 16325266 [patent_doc_number] => 10785248 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-09-22 [patent_title] => Routing based on a vulnerability in a processing node [patent_app_type] => utility [patent_app_number] => 15/466632 [patent_app_country] => US [patent_app_date] => 2017-03-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 10195 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15466632 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/466632
Routing based on a vulnerability in a processing node Mar 21, 2017 Issued
Array ( [id] => 17064182 [patent_doc_number] => 11108803 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-08-31 [patent_title] => Determining security vulnerabilities in application programming interfaces [patent_app_type] => utility [patent_app_number] => 15/447108 [patent_app_country] => US [patent_app_date] => 2017-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5473 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 311 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15447108 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/447108
Determining security vulnerabilities in application programming interfaces Feb 28, 2017 Issued
Array ( [id] => 11693484 [patent_doc_number] => 20170169201 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-06-15 [patent_title] => 'Dynamic Instruction Processing Method, Dynamic Instruction Processing Apparatus, and Terminal' [patent_app_type] => utility [patent_app_number] => 15/444071 [patent_app_country] => US [patent_app_date] => 2017-02-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6400 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15444071 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/444071
Dynamic Instruction Processing Method, Dynamic Instruction Processing Apparatus, and Terminal Feb 26, 2017 Abandoned
Array ( [id] => 14571499 [patent_doc_number] => 20190213356 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-07-11 [patent_title] => DATA MANAGEMENT METHOD AND REGISTRATION METHOD FOR AN ANONYMOUS DATA SHARING SYSTEM, AS WELL AS DATA MANAGER AND ANONYMOUS DATA SHARING SYSTEM [patent_app_type] => utility [patent_app_number] => 16/306709 [patent_app_country] => US [patent_app_date] => 2017-02-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10597 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16306709 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/306709
Data management method and registration method for an anonymous data sharing system, as well as data manager and anonymous data sharing system Feb 16, 2017 Issued
Array ( [id] => 11938592 [patent_doc_number] => 20170242742 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-08-24 [patent_title] => 'DATA PROCESSING DEVICE, CONTROL METHOD FOR DATA PROCESSING DEVICE, AND STORAGE MEDIUM' [patent_app_type] => utility [patent_app_number] => 15/435059 [patent_app_country] => US [patent_app_date] => 2017-02-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9015 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15435059 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/435059
DATA PROCESSING DEVICE, CONTROL METHOD FOR DATA PROCESSING DEVICE, AND STORAGE MEDIUM Feb 15, 2017 Abandoned
Array ( [id] => 12055513 [patent_doc_number] => 20170331857 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-11-16 [patent_title] => 'NON-TRANSITORY RECORDING MEDIUM STORING DATA PROTECTION PROGRAM, DATA PROTECTION METHOD, AND DATA PROTECTION APPARATUS' [patent_app_type] => utility [patent_app_number] => 15/428225 [patent_app_country] => US [patent_app_date] => 2017-02-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 5960 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15428225 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/428225
NON-TRANSITORY RECORDING MEDIUM STORING DATA PROTECTION PROGRAM, DATA PROTECTION METHOD, AND DATA PROTECTION APPARATUS Feb 8, 2017 Abandoned
Array ( [id] => 14270603 [patent_doc_number] => 10284885 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-05-07 [patent_title] => Method and apparatus for redacting video for compression and identification of releasing party [patent_app_type] => utility [patent_app_number] => 15/419440 [patent_app_country] => US [patent_app_date] => 2017-01-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 10 [patent_no_of_words] => 7669 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 305 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15419440 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/419440
Method and apparatus for redacting video for compression and identification of releasing party Jan 29, 2017 Issued
Array ( [id] => 12671092 [patent_doc_number] => 20180115530 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-04-26 [patent_title] => FEDERATING DATA INSIDE OF A TRUSTED EXECUTION ENVIRONMENT [patent_app_type] => utility [patent_app_number] => 15/407492 [patent_app_country] => US [patent_app_date] => 2017-01-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6997 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 174 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15407492 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/407492
Federating data inside of a trusted execution environment Jan 16, 2017 Issued
Array ( [id] => 17284839 [patent_doc_number] => 11201888 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-12-14 [patent_title] => Methods and systems for discovering network security gaps [patent_app_type] => utility [patent_app_number] => 15/400685 [patent_app_country] => US [patent_app_date] => 2017-01-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8607 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 430 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15400685 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/400685
Methods and systems for discovering network security gaps Jan 5, 2017 Issued
Array ( [id] => 12899611 [patent_doc_number] => 20180191712 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-07-05 [patent_title] => Preventing Unauthorized Access to Secured Information Systems Using Proactive Controls [patent_app_type] => utility [patent_app_number] => 15/396899 [patent_app_country] => US [patent_app_date] => 2017-01-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8945 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -24 [patent_words_short_claim] => 251 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15396899 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/396899
Preventing Unauthorized Access to Secured Information Systems Using Proactive Controls Jan 2, 2017 Abandoned
Array ( [id] => 16418963 [patent_doc_number] => 10826876 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-11-03 [patent_title] => Obscuring network traffic characteristics [patent_app_type] => utility [patent_app_number] => 15/388426 [patent_app_country] => US [patent_app_date] => 2016-12-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 10632 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15388426 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/388426
Obscuring network traffic characteristics Dec 21, 2016 Issued
Array ( [id] => 11733845 [patent_doc_number] => 20170195288 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-07-06 [patent_title] => 'SEAMLESS HANDOFF BETWEEN WIRELESS ACCESS GATEWAYS' [patent_app_type] => utility [patent_app_number] => 15/388321 [patent_app_country] => US [patent_app_date] => 2016-12-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7252 [patent_no_of_claims] => 43 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15388321 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/388321
SEAMLESS HANDOFF BETWEEN WIRELESS ACCESS GATEWAYS Dec 21, 2016 Abandoned
Array ( [id] => 13631913 [patent_doc_number] => 20180367511 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-12-20 [patent_title] => EMAIL CONTROL DEVICE, EMAIL CONTROL METHOD, AND PROGRAM STORAGE MEDIUM [patent_app_type] => utility [patent_app_number] => 16/060072 [patent_app_country] => US [patent_app_date] => 2016-12-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6727 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -6 [patent_words_short_claim] => 99 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16060072 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/060072
EMAIL CONTROL DEVICE, EMAIL CONTROL METHOD, AND PROGRAM STORAGE MEDIUM Dec 18, 2016 Abandoned
Array ( [id] => 12853054 [patent_doc_number] => 20180176192 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-06-21 [patent_title] => SECURE DATA EGRESS FOR SENSITIVE DATA ACROSS NETWORKS [patent_app_type] => utility [patent_app_number] => 15/382577 [patent_app_country] => US [patent_app_date] => 2016-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 19773 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 74 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15382577 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/382577
SECURE DATA EGRESS FOR SENSITIVE DATA ACROSS NETWORKS Dec 15, 2016 Abandoned
Array ( [id] => 12853039 [patent_doc_number] => 20180176187 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-06-21 [patent_title] => SECURE DATA INGESTION FOR SENSITIVE DATA ACROSS NETWORKS [patent_app_type] => utility [patent_app_number] => 15/382571 [patent_app_country] => US [patent_app_date] => 2016-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 19776 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -19 [patent_words_short_claim] => 126 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15382571 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/382571
SECURE DATA INGESTION FOR SENSITIVE DATA ACROSS NETWORKS Dec 15, 2016 Abandoned
Array ( [id] => 11709401 [patent_doc_number] => 20170177899 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-06-22 [patent_title] => 'ENCRYPTED DATA DEDUPLICATION IN CLOUD STORAGE' [patent_app_type] => utility [patent_app_number] => 15/379839 [patent_app_country] => US [patent_app_date] => 2016-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 13388 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15379839 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/379839
ENCRYPTED DATA DEDUPLICATION IN CLOUD STORAGE Dec 14, 2016 Abandoned
Array ( [id] => 13743047 [patent_doc_number] => 20180375994 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-12-27 [patent_title] => METHOD FOR MANAGING AT LEAST ONE COMMUNICATION, CORRESPONDING DEVICE AND SOFTWARE MODULE PROGRAM [patent_app_type] => utility [patent_app_number] => 16/063211 [patent_app_country] => US [patent_app_date] => 2016-12-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6034 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 81 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16063211 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/063211
METHOD FOR MANAGING AT LEAST ONE COMMUNICATION, CORRESPONDING DEVICE AND SOFTWARE MODULE PROGRAM Dec 12, 2016 Abandoned
Array ( [id] => 13738849 [patent_doc_number] => 20180373894 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-12-27 [patent_title] => DIGITAL FORENSIC IMAGE VERIFICATION SYSTEM [patent_app_type] => utility [patent_app_number] => 16/062523 [patent_app_country] => US [patent_app_date] => 2016-12-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5907 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -14 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16062523 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/062523
DIGITAL FORENSIC IMAGE VERIFICATION SYSTEM Dec 12, 2016 Abandoned
Array ( [id] => 12826582 [patent_doc_number] => 20180167366 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-06-14 [patent_title] => CRYPTOGRAPHIC MODE PROGRAMMABILITY [patent_app_type] => utility [patent_app_number] => 15/376481 [patent_app_country] => US [patent_app_date] => 2016-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10491 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -25 [patent_words_short_claim] => 82 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15376481 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/376481
CRYPTOGRAPHIC MODE PROGRAMMABILITY Dec 11, 2016 Abandoned
Menu