![](/images/general/no_picture/200_user.png)
Stephen J Ralis
Examiner (ID: 3853, Phone: (571)272-6227 , Office: P/3992 )
Most Active Art Unit | 3742 |
Art Unit(s) | 3742, 3992 |
Total Applications | 473 |
Issued Applications | 182 |
Pending Applications | 47 |
Abandoned Applications | 243 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 4940436
[patent_doc_number] => 20080077755
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-03-27
[patent_title] => 'Access-Control Method For Software Module And Programmable Electronic Device Therefor'
[patent_app_type] => utility
[patent_app_number] => 11/857501
[patent_app_country] => US
[patent_app_date] => 2007-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12199
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0077/20080077755.pdf
[firstpage_image] =>[orig_patent_app_number] => 11857501
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/857501 | Access-control method for software module and programmable electronic device therefor | Sep 18, 2007 | Issued |
Array
(
[id] => 166706
[patent_doc_number] => 07673150
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-03-02
[patent_title] => 'Virus detection system, method and computer program product for handheld computers'
[patent_app_type] => utility
[patent_app_number] => 11/855961
[patent_app_country] => US
[patent_app_date] => 2007-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 7285
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/673/07673150.pdf
[firstpage_image] =>[orig_patent_app_number] => 11855961
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/855961 | Virus detection system, method and computer program product for handheld computers | Sep 13, 2007 | Issued |
Array
(
[id] => 8935662
[patent_doc_number] => 08495381
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-23
[patent_title] => 'Authenticated remote PIN unblock'
[patent_app_type] => utility
[patent_app_number] => 11/834560
[patent_app_country] => US
[patent_app_date] => 2007-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 4325
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11834560
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/834560 | Authenticated remote PIN unblock | Aug 5, 2007 | Issued |
Array
(
[id] => 212742
[patent_doc_number] => 07623657
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-11-24
[patent_title] => 'Methods and apparatus for secure and adaptive delivery of multimedia content'
[patent_app_type] => utility
[patent_app_number] => 11/781699
[patent_app_country] => US
[patent_app_date] => 2007-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 11
[patent_no_of_words] => 6098
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/623/07623657.pdf
[firstpage_image] =>[orig_patent_app_number] => 11781699
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/781699 | Methods and apparatus for secure and adaptive delivery of multimedia content | Jul 22, 2007 | Issued |
Array
(
[id] => 5045203
[patent_doc_number] => 20070263875
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-15
[patent_title] => 'Information processing system and method using encryption key block'
[patent_app_type] => utility
[patent_app_number] => 11/879639
[patent_app_country] => US
[patent_app_date] => 2007-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 45
[patent_figures_cnt] => 45
[patent_no_of_words] => 26556
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0263/20070263875.pdf
[firstpage_image] =>[orig_patent_app_number] => 11879639
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/879639 | Information processing system and method using encryption key block | Jul 17, 2007 | Issued |
Array
(
[id] => 97316
[patent_doc_number] => 07735142
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-06-08
[patent_title] => 'Electronic vulnerability and reliability assessment'
[patent_app_type] => utility
[patent_app_number] => 11/768055
[patent_app_country] => US
[patent_app_date] => 2007-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9135
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 321
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/735/07735142.pdf
[firstpage_image] =>[orig_patent_app_number] => 11768055
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/768055 | Electronic vulnerability and reliability assessment | Jun 24, 2007 | Issued |
Array
(
[id] => 237236
[patent_doc_number] => 07596222
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-09-29
[patent_title] => 'Encrypting data for access by multiple users'
[patent_app_type] => utility
[patent_app_number] => 11/766192
[patent_app_country] => US
[patent_app_date] => 2007-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2499
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/596/07596222.pdf
[firstpage_image] =>[orig_patent_app_number] => 11766192
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/766192 | Encrypting data for access by multiple users | Jun 20, 2007 | Issued |
Array
(
[id] => 6640156
[patent_doc_number] => 20100005313
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-01-07
[patent_title] => 'PORTABLE TELECOMMUNICATIONS APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 12/301754
[patent_app_country] => US
[patent_app_date] => 2007-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3216
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0005/20100005313.pdf
[firstpage_image] =>[orig_patent_app_number] => 12301754
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/301754 | Portable telecommunications apparatus | May 21, 2007 | Issued |
Array
(
[id] => 4781021
[patent_doc_number] => 20080289020
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-11-20
[patent_title] => 'Identity Tokens Using Biometric Representations'
[patent_app_type] => utility
[patent_app_number] => 11/749020
[patent_app_country] => US
[patent_app_date] => 2007-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10293
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0289/20080289020.pdf
[firstpage_image] =>[orig_patent_app_number] => 11749020
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/749020 | Identity Tokens Using Biometric Representations | May 14, 2007 | Abandoned |
Array
(
[id] => 5229826
[patent_doc_number] => 20070291933
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-12-20
[patent_title] => 'METHOD AND SYSTEM FOR REUSING AN MMH FUNCTION TO PERFORM A FAST MMH-MAC CALCULATION'
[patent_app_type] => utility
[patent_app_number] => 11/748953
[patent_app_country] => US
[patent_app_date] => 2007-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1886
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0291/20070291933.pdf
[firstpage_image] =>[orig_patent_app_number] => 11748953
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/748953 | Method and system for reusing an MMH function to perform a fast MMH-MAC calculation | May 14, 2007 | Issued |
Array
(
[id] => 11552691
[patent_doc_number] => 09621559
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-11
[patent_title] => 'Network apparatus for secure remote access and control'
[patent_app_type] => utility
[patent_app_number] => 11/748871
[patent_app_country] => US
[patent_app_date] => 2007-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5835
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11748871
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/748871 | Network apparatus for secure remote access and control | May 14, 2007 | Issued |
Array
(
[id] => 4781048
[patent_doc_number] => 20080289047
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-11-20
[patent_title] => 'ANTI-CONTENT SPOOFING (ACS)'
[patent_app_type] => utility
[patent_app_number] => 11/748314
[patent_app_country] => US
[patent_app_date] => 2007-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7476
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0289/20080289047.pdf
[firstpage_image] =>[orig_patent_app_number] => 11748314
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/748314 | Anti-content spoofing (ACS) | May 13, 2007 | Issued |
Array
(
[id] => 5012943
[patent_doc_number] => 20070283422
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-12-06
[patent_title] => 'Method, apparatus, and computer product for managing operation'
[patent_app_type] => utility
[patent_app_number] => 11/786454
[patent_app_country] => US
[patent_app_date] => 2007-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 11771
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0283/20070283422.pdf
[firstpage_image] =>[orig_patent_app_number] => 11786454
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/786454 | Method, apparatus, and computer product for managing operation | Apr 10, 2007 | Issued |
Array
(
[id] => 5127951
[patent_doc_number] => 20070240222
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-10-11
[patent_title] => 'System and Method for Managing Malware Protection on Mobile Devices'
[patent_app_type] => utility
[patent_app_number] => 11/697672
[patent_app_country] => US
[patent_app_date] => 2007-04-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 21121
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0240/20070240222.pdf
[firstpage_image] =>[orig_patent_app_number] => 11697672
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/697672 | System and Method for Managing Malware Protection on Mobile Devices | Apr 5, 2007 | Abandoned |
Array
(
[id] => 5479113
[patent_doc_number] => 20090202070
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-08-13
[patent_title] => 'Robust Cipher Design'
[patent_app_type] => utility
[patent_app_number] => 12/223137
[patent_app_country] => US
[patent_app_date] => 2007-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4734
[patent_no_of_claims] => 47
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0202/20090202070.pdf
[firstpage_image] =>[orig_patent_app_number] => 12223137
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/223137 | Robust cipher design | Mar 19, 2007 | Issued |
Array
(
[id] => 328057
[patent_doc_number] => 07515710
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-04-07
[patent_title] => 'Federated digital rights management scheme including trusted systems'
[patent_app_type] => utility
[patent_app_number] => 11/685929
[patent_app_country] => US
[patent_app_date] => 2007-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 9156
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/515/07515710.pdf
[firstpage_image] =>[orig_patent_app_number] => 11685929
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/685929 | Federated digital rights management scheme including trusted systems | Mar 13, 2007 | Issued |
Array
(
[id] => 8234458
[patent_doc_number] => 08199912
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-06-12
[patent_title] => 'Security storage of electronic keys within volatile memories'
[patent_app_type] => utility
[patent_app_number] => 12/296150
[patent_app_country] => US
[patent_app_date] => 2007-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 2
[patent_no_of_words] => 3024
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/199/08199912.pdf
[firstpage_image] =>[orig_patent_app_number] => 12296150
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/296150 | Security storage of electronic keys within volatile memories | Feb 14, 2007 | Issued |
Array
(
[id] => 4793925
[patent_doc_number] => 20080294899
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-11-27
[patent_title] => 'SECURE MANAGEMENT OF DOCUMENT IN A CLIENT-SERVER ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 11/623014
[patent_app_country] => US
[patent_app_date] => 2007-01-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5982
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0294/20080294899.pdf
[firstpage_image] =>[orig_patent_app_number] => 11623014
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/623014 | SECURE MANAGEMENT OF DOCUMENT IN A CLIENT-SERVER ENVIRONMENT | Jan 11, 2007 | Abandoned |
Array
(
[id] => 9829547
[patent_doc_number] => 08938786
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-20
[patent_title] => 'System and method for using a declarative approach to enforce instance based security in a distributed environment'
[patent_app_type] => utility
[patent_app_number] => 11/622698
[patent_app_country] => US
[patent_app_date] => 2007-01-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 16
[patent_no_of_words] => 4896
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11622698
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/622698 | System and method for using a declarative approach to enforce instance based security in a distributed environment | Jan 11, 2007 | Issued |
Array
(
[id] => 4929165
[patent_doc_number] => 20080168528
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-07-10
[patent_title] => 'ROLE-BASED AUTHORIZATION USING CONDITIONAL PERMISSIONS'
[patent_app_type] => utility
[patent_app_number] => 11/619672
[patent_app_country] => US
[patent_app_date] => 2007-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 5921
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0168/20080168528.pdf
[firstpage_image] =>[orig_patent_app_number] => 11619672
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/619672 | ROLE-BASED AUTHORIZATION USING CONDITIONAL PERMISSIONS | Jan 3, 2007 | Abandoned |