Stephen J Ralis
Examiner (ID: 3853, Phone: (571)272-6227 , Office: P/3992 )
Most Active Art Unit | 3742 |
Art Unit(s) | 3742, 3992 |
Total Applications | 473 |
Issued Applications | 182 |
Pending Applications | 47 |
Abandoned Applications | 243 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 13203375
[patent_doc_number] => 10116617
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-30
[patent_title] => System architecture for DMZ external IP addresses
[patent_app_type] => utility
[patent_app_number] => 13/298811
[patent_app_country] => US
[patent_app_date] => 2011-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 4793
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 384
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13298811
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/298811 | System architecture for DMZ external IP addresses | Nov 16, 2011 | Issued |
Array
(
[id] => 7765407
[patent_doc_number] => 20120033808
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-09
[patent_title] => 'Method and Apparatus for Generating a Public Key in a Manner That Counters Power Analysis Attacks'
[patent_app_type] => utility
[patent_app_number] => 13/277434
[patent_app_country] => US
[patent_app_date] => 2011-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5304
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0033/20120033808.pdf
[firstpage_image] =>[orig_patent_app_number] => 13277434
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/277434 | Method and apparatus for generating a public key in a manner that counters power analysis attacks | Oct 19, 2011 | Issued |
Array
(
[id] => 8952748
[patent_doc_number] => 20130198529
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-01
[patent_title] => 'SAMPLE CARRIER UNIT HAVING SAMPLE DATA ENCRYPTION AND METHOD FOR USE THEREOF'
[patent_app_type] => utility
[patent_app_number] => 13/878218
[patent_app_country] => US
[patent_app_date] => 2011-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9207
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13878218
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/878218 | SAMPLE CARRIER UNIT HAVING SAMPLE DATA ENCRYPTION AND METHOD FOR USE THEREOF | Oct 9, 2011 | Abandoned |
Array
(
[id] => 8979284
[patent_doc_number] => 20130212714
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-15
[patent_title] => 'Information Management System And Device'
[patent_app_type] => utility
[patent_app_number] => 13/878227
[patent_app_country] => US
[patent_app_date] => 2011-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3221
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13878227
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/878227 | Information Management System And Device | Oct 9, 2011 | Abandoned |
Array
(
[id] => 7820150
[patent_doc_number] => 20120066770
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-03-15
[patent_title] => 'INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/197417
[patent_app_country] => US
[patent_app_date] => 2011-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 31
[patent_no_of_words] => 22160
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0066/20120066770.pdf
[firstpage_image] =>[orig_patent_app_number] => 13197417
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/197417 | Information processing apparatus and information processing program | Aug 2, 2011 | Issued |
Array
(
[id] => 11322401
[patent_doc_number] => 09521154
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-12-13
[patent_title] => 'Detecting suspicious network activity using flow sampling'
[patent_app_type] => utility
[patent_app_number] => 13/197402
[patent_app_country] => US
[patent_app_date] => 2011-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5501
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13197402
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/197402 | Detecting suspicious network activity using flow sampling | Aug 2, 2011 | Issued |
Array
(
[id] => 8230288
[patent_doc_number] => 20120144496
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-07
[patent_title] => 'ELECTRONIC DEVICE WITH DATA PROTECTION FUNCTION AND METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 13/196906
[patent_app_country] => US
[patent_app_date] => 2011-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 1248
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13196906
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/196906 | ELECTRONIC DEVICE WITH DATA PROTECTION FUNCTION AND METHOD THEREOF | Aug 2, 2011 | Abandoned |
Array
(
[id] => 9218656
[patent_doc_number] => 08631466
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-01-14
[patent_title] => 'Machine to-machine (M2M) call flow security'
[patent_app_type] => utility
[patent_app_number] => 13/197007
[patent_app_country] => US
[patent_app_date] => 2011-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 15755
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13197007
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/197007 | Machine to-machine (M2M) call flow security | Aug 2, 2011 | Issued |
Array
(
[id] => 7760341
[patent_doc_number] => 20120030761
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-02
[patent_title] => 'IMPROPER COMMUNICATION DETECTION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/195987
[patent_app_country] => US
[patent_app_date] => 2011-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8420
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0030/20120030761.pdf
[firstpage_image] =>[orig_patent_app_number] => 13195987
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/195987 | Improper communication detection system | Aug 1, 2011 | Issued |
Array
(
[id] => 9707711
[patent_doc_number] => 08832807
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-09-09
[patent_title] => 'Method and apparatus for asynchronous dynamic password'
[patent_app_type] => utility
[patent_app_number] => 13/196105
[patent_app_country] => US
[patent_app_date] => 2011-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6085
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13196105
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/196105 | Method and apparatus for asynchronous dynamic password | Aug 1, 2011 | Issued |
Array
(
[id] => 8832004
[patent_doc_number] => 20130133048
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-23
[patent_title] => 'IDENTITY ASSESSMENT METHOD AND SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/813424
[patent_app_country] => US
[patent_app_date] => 2011-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 23466
[patent_no_of_claims] => 77
[patent_no_of_ind_claims] => 50
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13813424
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/813424 | Identity assessment method and system | Aug 1, 2011 | Issued |
Array
(
[id] => 11637189
[patent_doc_number] => 09659164
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-23
[patent_title] => 'Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device'
[patent_app_type] => utility
[patent_app_number] => 13/196864
[patent_app_country] => US
[patent_app_date] => 2011-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 8122
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13196864
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/196864 | Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device | Aug 1, 2011 | Issued |
Array
(
[id] => 7786018
[patent_doc_number] => 20120047574
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-23
[patent_title] => 'TERMINAL AND METHOD FOR RECOGNIZING MULTI USER INPUT'
[patent_app_type] => utility
[patent_app_number] => 13/196816
[patent_app_country] => US
[patent_app_date] => 2011-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5029
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0047/20120047574.pdf
[firstpage_image] =>[orig_patent_app_number] => 13196816
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/196816 | TERMINAL AND METHOD FOR RECOGNIZING MULTI USER INPUT | Aug 1, 2011 | Abandoned |
Array
(
[id] => 6172276
[patent_doc_number] => 20110197282
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-08-11
[patent_title] => 'METHOD AND APPARATUS FOR DETECTING SCANS IN REAL-TIME'
[patent_app_type] => utility
[patent_app_number] => 13/088230
[patent_app_country] => US
[patent_app_date] => 2011-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3610
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0197/20110197282.pdf
[firstpage_image] =>[orig_patent_app_number] => 13088230
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/088230 | Method and apparatus for detecting scans in real-time | Apr 14, 2011 | Issued |
Array
(
[id] => 8558147
[patent_doc_number] => 08332632
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-12-11
[patent_title] => 'Method and system for execution monitor-based trusted computing'
[patent_app_type] => utility
[patent_app_number] => 13/084614
[patent_app_country] => US
[patent_app_date] => 2011-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 9261
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13084614
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/084614 | Method and system for execution monitor-based trusted computing | Apr 11, 2011 | Issued |
Array
(
[id] => 6094631
[patent_doc_number] => 20110219435
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-08
[patent_title] => 'CONTENT PROCESSING SYSTEM, CONTENT PROCESSING METHOD, COMPUTER PROGRAM, RECORDING MEDIUM, AND PORTABLE TERMINAL'
[patent_app_type] => utility
[patent_app_number] => 13/016091
[patent_app_country] => US
[patent_app_date] => 2011-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9730
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0219/20110219435.pdf
[firstpage_image] =>[orig_patent_app_number] => 13016091
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/016091 | Content processing system, content processing method, computer program, recording medium, and portable terminal | Jan 27, 2011 | Issued |
Array
(
[id] => 8326154
[patent_doc_number] => 20120198568
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-08-02
[patent_title] => 'Security Classification Applying Social Norming'
[patent_app_type] => utility
[patent_app_number] => 13/016596
[patent_app_country] => US
[patent_app_date] => 2011-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6512
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13016596
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/016596 | Security classification applying social norming | Jan 27, 2011 | Issued |
Array
(
[id] => 6117553
[patent_doc_number] => 20110191827
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-08-04
[patent_title] => 'Detecting Unauthorized Router Access Points or Rogue APs in the Wired Network'
[patent_app_type] => utility
[patent_app_number] => 13/016490
[patent_app_country] => US
[patent_app_date] => 2011-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1924
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0191/20110191827.pdf
[firstpage_image] =>[orig_patent_app_number] => 13016490
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/016490 | Detecting Unauthorized Router Access Points or Rogue APs in the Wired Network | Jan 27, 2011 | Abandoned |
Array
(
[id] => 10848041
[patent_doc_number] => 08875243
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-10-28
[patent_title] => 'Identity abstraction providing limited cross-domain access'
[patent_app_type] => utility
[patent_app_number] => 13/015558
[patent_app_country] => US
[patent_app_date] => 2011-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8084
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13015558
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/015558 | Identity abstraction providing limited cross-domain access | Jan 26, 2011 | Issued |
Array
(
[id] => 9012748
[patent_doc_number] => 08528069
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-09-03
[patent_title] => 'Trustworthy device claims for enterprise applications'
[patent_app_type] => utility
[patent_app_number] => 13/015202
[patent_app_country] => US
[patent_app_date] => 2011-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 7150
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13015202
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/015202 | Trustworthy device claims for enterprise applications | Jan 26, 2011 | Issued |