![](/images/general/no_picture/200_user.png)
Stephen J Ralis
Examiner (ID: 3853, Phone: (571)272-6227 , Office: P/3992 )
Most Active Art Unit | 3742 |
Art Unit(s) | 3742, 3992 |
Total Applications | 473 |
Issued Applications | 182 |
Pending Applications | 47 |
Abandoned Applications | 243 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 11818802
[patent_doc_number] => 09722774
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-01
[patent_title] => 'Non-leaky helper data: extracting unique cryptographic key from noisy F-PUF fingerprint'
[patent_app_type] => utility
[patent_app_number] => 14/699354
[patent_app_country] => US
[patent_app_date] => 2015-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7737
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14699354
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/699354 | Non-leaky helper data: extracting unique cryptographic key from noisy F-PUF fingerprint | Apr 28, 2015 | Issued |
Array
(
[id] => 13284617
[patent_doc_number] => 10153904
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-11
[patent_title] => Validating resources execution
[patent_app_type] => utility
[patent_app_number] => 14/699345
[patent_app_country] => US
[patent_app_date] => 2015-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4308
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 240
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14699345
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/699345 | Validating resources execution | Apr 28, 2015 | Issued |
Array
(
[id] => 10496619
[patent_doc_number] => 20150381642
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'ABNORMAL TRAFFIC DETECTION APPARATUS AND METHOD BASED ON MODBUS COMMUNICATION PATTERN LEARNING'
[patent_app_type] => utility
[patent_app_number] => 14/699449
[patent_app_country] => US
[patent_app_date] => 2015-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4810
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14699449
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/699449 | Abnormal traffic detection apparatus and method based on modbus communication pattern learning | Apr 28, 2015 | Issued |
Array
(
[id] => 11126290
[patent_doc_number] => 20160323265
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-03
[patent_title] => 'MULTI-FACTOR AUTHORIZATION FOR IEEE 802.1X-ENABLED NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 14/699420
[patent_app_country] => US
[patent_app_date] => 2015-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6276
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14699420
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/699420 | Multi-factor authorization for IEEE 802.1x-enabled networks | Apr 28, 2015 | Issued |
Array
(
[id] => 10447013
[patent_doc_number] => 20150332026
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-19
[patent_title] => 'REUSABLE LICENSE ACTIVATION KEY'
[patent_app_type] => utility
[patent_app_number] => 14/699457
[patent_app_country] => US
[patent_app_date] => 2015-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7158
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14699457
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/699457 | REUSABLE LICENSE ACTIVATION KEY | Apr 28, 2015 | Abandoned |
Array
(
[id] => 11308594
[patent_doc_number] => 09516011
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-12-06
[patent_title] => 'MRCP resource access control mechanism for mobile devices'
[patent_app_type] => utility
[patent_app_number] => 14/685818
[patent_app_country] => US
[patent_app_date] => 2015-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4030
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14685818
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/685818 | MRCP resource access control mechanism for mobile devices | Apr 13, 2015 | Issued |
Array
(
[id] => 11740901
[patent_doc_number] => 09705501
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-11
[patent_title] => 'Systems and methods for enhancing confidentiality via logic gate encryption'
[patent_app_type] => utility
[patent_app_number] => 14/659348
[patent_app_country] => US
[patent_app_date] => 2015-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 16
[patent_no_of_words] => 4661
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 67
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14659348
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/659348 | Systems and methods for enhancing confidentiality via logic gate encryption | Mar 15, 2015 | Issued |
Array
(
[id] => 13072513
[patent_doc_number] => 10057054
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-21
[patent_title] => Method and system for remotely keyed encrypting/decrypting data with prior checking a token
[patent_app_type] => utility
[patent_app_number] => 14/642081
[patent_app_country] => US
[patent_app_date] => 2015-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 2922
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14642081
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/642081 | Method and system for remotely keyed encrypting/decrypting data with prior checking a token | Mar 8, 2015 | Issued |
Array
(
[id] => 11062959
[patent_doc_number] => 20160259921
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-08
[patent_title] => 'METHOD FOR PACKAGING CONTENT RIGHTS'
[patent_app_type] => utility
[patent_app_number] => 14/639656
[patent_app_country] => US
[patent_app_date] => 2015-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8014
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14639656
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/639656 | METHOD FOR PACKAGING CONTENT RIGHTS | Mar 4, 2015 | Abandoned |
Array
(
[id] => 11062974
[patent_doc_number] => 20160259936
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-08
[patent_title] => 'Broker-Based Authentication System Architecture and Design'
[patent_app_type] => utility
[patent_app_number] => 14/639713
[patent_app_country] => US
[patent_app_date] => 2015-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 18655
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14639713
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/639713 | Broker-based authentication system architecture and design | Mar 4, 2015 | Issued |
Array
(
[id] => 11056550
[patent_doc_number] => 20160253512
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-01
[patent_title] => 'METHOD FOR CONTROLLING ACCESS TO ELECTRONIC DOCUMENTS USING LOCKS'
[patent_app_type] => utility
[patent_app_number] => 14/638470
[patent_app_country] => US
[patent_app_date] => 2015-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 18268
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14638470
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/638470 | Method for controlling access to electronic documents using locks | Mar 3, 2015 | Issued |
Array
(
[id] => 12251072
[patent_doc_number] => 09923868
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-20
[patent_title] => 'Working method for a system and system'
[patent_app_type] => utility
[patent_app_number] => 14/762545
[patent_app_country] => US
[patent_app_date] => 2015-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4491
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14762545
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/762545 | Working method for a system and system | Feb 11, 2015 | Issued |
Array
(
[id] => 11550785
[patent_doc_number] => 09619636
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-11
[patent_title] => 'Apparatuses and methods for secure display on secondary display device'
[patent_app_type] => utility
[patent_app_number] => 14/616353
[patent_app_country] => US
[patent_app_date] => 2015-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 11438
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14616353
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/616353 | Apparatuses and methods for secure display on secondary display device | Feb 5, 2015 | Issued |
Array
(
[id] => 11266855
[patent_doc_number] => 09491170
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-08
[patent_title] => 'Authenticating customers and managing authenticated sessions'
[patent_app_type] => utility
[patent_app_number] => 14/597399
[patent_app_country] => US
[patent_app_date] => 2015-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 37
[patent_no_of_words] => 16130
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 411
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14597399
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/597399 | Authenticating customers and managing authenticated sessions | Jan 14, 2015 | Issued |
Array
(
[id] => 11347267
[patent_doc_number] => 09531689
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-12-27
[patent_title] => 'System and method for encryption of network data'
[patent_app_type] => utility
[patent_app_number] => 14/597349
[patent_app_country] => US
[patent_app_date] => 2015-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 4384
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14597349
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/597349 | System and method for encryption of network data | Jan 14, 2015 | Issued |
Array
(
[id] => 11008183
[patent_doc_number] => 20160205135
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-14
[patent_title] => 'METHOD AND SYSTEM TO ACTIVELY DEFEND NETWORK INFRASTRUCTURE'
[patent_app_type] => utility
[patent_app_number] => 14/597210
[patent_app_country] => US
[patent_app_date] => 2015-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 3473
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14597210
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/597210 | METHOD AND SYSTEM TO ACTIVELY DEFEND NETWORK INFRASTRUCTURE | Jan 13, 2015 | Abandoned |
Array
(
[id] => 11454387
[patent_doc_number] => 09578047
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-21
[patent_title] => 'Method and system for reflectometry based communication network monitoring, intrusion detection, and message authentication'
[patent_app_type] => utility
[patent_app_number] => 14/595584
[patent_app_country] => US
[patent_app_date] => 2015-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6496
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14595584
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/595584 | Method and system for reflectometry based communication network monitoring, intrusion detection, and message authentication | Jan 12, 2015 | Issued |
Array
(
[id] => 13651969
[patent_doc_number] => 09852301
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-12-26
[patent_title] => Creating secure channels between a protected execution environment and fixed-function endpoints
[patent_app_type] => utility
[patent_app_number] => 14/582797
[patent_app_country] => US
[patent_app_date] => 2014-12-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 20
[patent_no_of_words] => 14047
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14582797
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/582797 | Creating secure channels between a protected execution environment and fixed-function endpoints | Dec 23, 2014 | Issued |
Array
(
[id] => 10030050
[patent_doc_number] => 09071969
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-30
[patent_title] => 'System, device, and method of detecting identity of a user of an electronic device'
[patent_app_type] => utility
[patent_app_number] => 14/566723
[patent_app_country] => US
[patent_app_date] => 2014-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9215
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14566723
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/566723 | System, device, and method of detecting identity of a user of an electronic device | Dec 10, 2014 | Issued |
Array
(
[id] => 10204628
[patent_doc_number] => 20150089616
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'TECHNIQUES FOR USER AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/557222
[patent_app_country] => US
[patent_app_date] => 2014-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7317
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14557222
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/557222 | Techniques for user authentication | Nov 30, 2014 | Issued |