
Stephen J. Cherry
Examiner (ID: 13877)
| Most Active Art Unit | 2863 |
| Art Unit(s) | 2863, 2857 |
| Total Applications | 649 |
| Issued Applications | 546 |
| Pending Applications | 5 |
| Abandoned Applications | 99 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16551996
[patent_doc_number] => 10885157
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-01-05
[patent_title] => Determining a database signature
[patent_app_type] => utility
[patent_app_number] => 15/477796
[patent_app_country] => US
[patent_app_date] => 2017-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8210
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15477796
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/477796 | Determining a database signature | Apr 2, 2017 | Issued |
Array
(
[id] => 16325266
[patent_doc_number] => 10785248
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-22
[patent_title] => Routing based on a vulnerability in a processing node
[patent_app_type] => utility
[patent_app_number] => 15/466632
[patent_app_country] => US
[patent_app_date] => 2017-03-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10195
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15466632
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/466632 | Routing based on a vulnerability in a processing node | Mar 21, 2017 | Issued |
Array
(
[id] => 17064182
[patent_doc_number] => 11108803
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-31
[patent_title] => Determining security vulnerabilities in application programming interfaces
[patent_app_type] => utility
[patent_app_number] => 15/447108
[patent_app_country] => US
[patent_app_date] => 2017-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5473
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 311
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15447108
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/447108 | Determining security vulnerabilities in application programming interfaces | Feb 28, 2017 | Issued |
Array
(
[id] => 11693484
[patent_doc_number] => 20170169201
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-15
[patent_title] => 'Dynamic Instruction Processing Method, Dynamic Instruction Processing Apparatus, and Terminal'
[patent_app_type] => utility
[patent_app_number] => 15/444071
[patent_app_country] => US
[patent_app_date] => 2017-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6400
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15444071
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/444071 | Dynamic Instruction Processing Method, Dynamic Instruction Processing Apparatus, and Terminal | Feb 26, 2017 | Abandoned |
Array
(
[id] => 14571499
[patent_doc_number] => 20190213356
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-07-11
[patent_title] => DATA MANAGEMENT METHOD AND REGISTRATION METHOD FOR AN ANONYMOUS DATA SHARING SYSTEM, AS WELL AS DATA MANAGER AND ANONYMOUS DATA SHARING SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/306709
[patent_app_country] => US
[patent_app_date] => 2017-02-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10597
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16306709
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/306709 | Data management method and registration method for an anonymous data sharing system, as well as data manager and anonymous data sharing system | Feb 16, 2017 | Issued |
Array
(
[id] => 11938592
[patent_doc_number] => 20170242742
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-24
[patent_title] => 'DATA PROCESSING DEVICE, CONTROL METHOD FOR DATA PROCESSING DEVICE, AND STORAGE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 15/435059
[patent_app_country] => US
[patent_app_date] => 2017-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9015
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15435059
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/435059 | DATA PROCESSING DEVICE, CONTROL METHOD FOR DATA PROCESSING DEVICE, AND STORAGE MEDIUM | Feb 15, 2017 | Abandoned |
Array
(
[id] => 12055513
[patent_doc_number] => 20170331857
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-16
[patent_title] => 'NON-TRANSITORY RECORDING MEDIUM STORING DATA PROTECTION PROGRAM, DATA PROTECTION METHOD, AND DATA PROTECTION APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 15/428225
[patent_app_country] => US
[patent_app_date] => 2017-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 5960
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15428225
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/428225 | NON-TRANSITORY RECORDING MEDIUM STORING DATA PROTECTION PROGRAM, DATA PROTECTION METHOD, AND DATA PROTECTION APPARATUS | Feb 8, 2017 | Abandoned |
Array
(
[id] => 14270603
[patent_doc_number] => 10284885
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-05-07
[patent_title] => Method and apparatus for redacting video for compression and identification of releasing party
[patent_app_type] => utility
[patent_app_number] => 15/419440
[patent_app_country] => US
[patent_app_date] => 2017-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 10
[patent_no_of_words] => 7669
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 305
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15419440
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/419440 | Method and apparatus for redacting video for compression and identification of releasing party | Jan 29, 2017 | Issued |
Array
(
[id] => 12671092
[patent_doc_number] => 20180115530
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-26
[patent_title] => FEDERATING DATA INSIDE OF A TRUSTED EXECUTION ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 15/407492
[patent_app_country] => US
[patent_app_date] => 2017-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6997
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15407492
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/407492 | Federating data inside of a trusted execution environment | Jan 16, 2017 | Issued |
Array
(
[id] => 17284839
[patent_doc_number] => 11201888
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-12-14
[patent_title] => Methods and systems for discovering network security gaps
[patent_app_type] => utility
[patent_app_number] => 15/400685
[patent_app_country] => US
[patent_app_date] => 2017-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8607
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 430
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15400685
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/400685 | Methods and systems for discovering network security gaps | Jan 5, 2017 | Issued |
Array
(
[id] => 12899611
[patent_doc_number] => 20180191712
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-05
[patent_title] => Preventing Unauthorized Access to Secured Information Systems Using Proactive Controls
[patent_app_type] => utility
[patent_app_number] => 15/396899
[patent_app_country] => US
[patent_app_date] => 2017-01-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8945
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15396899
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/396899 | Preventing Unauthorized Access to Secured Information Systems Using Proactive Controls | Jan 2, 2017 | Abandoned |
Array
(
[id] => 16418963
[patent_doc_number] => 10826876
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-11-03
[patent_title] => Obscuring network traffic characteristics
[patent_app_type] => utility
[patent_app_number] => 15/388426
[patent_app_country] => US
[patent_app_date] => 2016-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10632
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15388426
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/388426 | Obscuring network traffic characteristics | Dec 21, 2016 | Issued |
Array
(
[id] => 11733845
[patent_doc_number] => 20170195288
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-06
[patent_title] => 'SEAMLESS HANDOFF BETWEEN WIRELESS ACCESS GATEWAYS'
[patent_app_type] => utility
[patent_app_number] => 15/388321
[patent_app_country] => US
[patent_app_date] => 2016-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7252
[patent_no_of_claims] => 43
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15388321
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/388321 | SEAMLESS HANDOFF BETWEEN WIRELESS ACCESS GATEWAYS | Dec 21, 2016 | Abandoned |
Array
(
[id] => 13631913
[patent_doc_number] => 20180367511
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-20
[patent_title] => EMAIL CONTROL DEVICE, EMAIL CONTROL METHOD, AND PROGRAM STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 16/060072
[patent_app_country] => US
[patent_app_date] => 2016-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6727
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16060072
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/060072 | EMAIL CONTROL DEVICE, EMAIL CONTROL METHOD, AND PROGRAM STORAGE MEDIUM | Dec 18, 2016 | Abandoned |
Array
(
[id] => 12853054
[patent_doc_number] => 20180176192
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-21
[patent_title] => SECURE DATA EGRESS FOR SENSITIVE DATA ACROSS NETWORKS
[patent_app_type] => utility
[patent_app_number] => 15/382577
[patent_app_country] => US
[patent_app_date] => 2016-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19773
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 74
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15382577
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/382577 | SECURE DATA EGRESS FOR SENSITIVE DATA ACROSS NETWORKS | Dec 15, 2016 | Abandoned |
Array
(
[id] => 12853039
[patent_doc_number] => 20180176187
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-21
[patent_title] => SECURE DATA INGESTION FOR SENSITIVE DATA ACROSS NETWORKS
[patent_app_type] => utility
[patent_app_number] => 15/382571
[patent_app_country] => US
[patent_app_date] => 2016-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19776
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15382571
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/382571 | SECURE DATA INGESTION FOR SENSITIVE DATA ACROSS NETWORKS | Dec 15, 2016 | Abandoned |
Array
(
[id] => 11709401
[patent_doc_number] => 20170177899
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-22
[patent_title] => 'ENCRYPTED DATA DEDUPLICATION IN CLOUD STORAGE'
[patent_app_type] => utility
[patent_app_number] => 15/379839
[patent_app_country] => US
[patent_app_date] => 2016-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13388
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15379839
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/379839 | ENCRYPTED DATA DEDUPLICATION IN CLOUD STORAGE | Dec 14, 2016 | Abandoned |
Array
(
[id] => 13743047
[patent_doc_number] => 20180375994
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-27
[patent_title] => METHOD FOR MANAGING AT LEAST ONE COMMUNICATION, CORRESPONDING DEVICE AND SOFTWARE MODULE PROGRAM
[patent_app_type] => utility
[patent_app_number] => 16/063211
[patent_app_country] => US
[patent_app_date] => 2016-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6034
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16063211
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/063211 | METHOD FOR MANAGING AT LEAST ONE COMMUNICATION, CORRESPONDING DEVICE AND SOFTWARE MODULE PROGRAM | Dec 12, 2016 | Abandoned |
Array
(
[id] => 13738849
[patent_doc_number] => 20180373894
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-27
[patent_title] => DIGITAL FORENSIC IMAGE VERIFICATION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/062523
[patent_app_country] => US
[patent_app_date] => 2016-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5907
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16062523
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/062523 | DIGITAL FORENSIC IMAGE VERIFICATION SYSTEM | Dec 12, 2016 | Abandoned |
Array
(
[id] => 12826582
[patent_doc_number] => 20180167366
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-14
[patent_title] => CRYPTOGRAPHIC MODE PROGRAMMABILITY
[patent_app_type] => utility
[patent_app_number] => 15/376481
[patent_app_country] => US
[patent_app_date] => 2016-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10491
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -25
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15376481
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/376481 | CRYPTOGRAPHIC MODE PROGRAMMABILITY | Dec 11, 2016 | Abandoned |