Stephen K Cronin
Supervisory Patent Examiner (ID: 10179, Phone: (571)272-4536 , Office: P/3747 )
Most Active Art Unit | 3727 |
Art Unit(s) | 2401, 2899, 3727, 3207, 3747 |
Total Applications | 1665 |
Issued Applications | 1267 |
Pending Applications | 108 |
Abandoned Applications | 289 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 11200542
[patent_doc_number] => 09430761
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-30
[patent_title] => 'Electronic system for the protection and control of license transactions associated with the alteration of replicated read only media and its bound licensed content'
[patent_app_type] => utility
[patent_app_number] => 14/726007
[patent_app_country] => US
[patent_app_date] => 2015-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 35
[patent_figures_cnt] => 44
[patent_no_of_words] => 14456
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14726007
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/726007 | Electronic system for the protection and control of license transactions associated with the alteration of replicated read only media and its bound licensed content | May 28, 2015 | Issued |
Array
(
[id] => 11833311
[patent_doc_number] => 09730072
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-08
[patent_title] => 'Electronic subscriber identity module provisioning'
[patent_app_type] => utility
[patent_app_number] => 14/715761
[patent_app_country] => US
[patent_app_date] => 2015-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 9817
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14715761
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/715761 | Electronic subscriber identity module provisioning | May 18, 2015 | Issued |
Array
(
[id] => 13175919
[patent_doc_number] => 10104089
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-16
[patent_title] => Method and apparatus for providing security function
[patent_app_type] => utility
[patent_app_number] => 14/715813
[patent_app_country] => US
[patent_app_date] => 2015-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 16463
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14715813
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/715813 | Method and apparatus for providing security function | May 18, 2015 | Issued |
Array
(
[id] => 11931875
[patent_doc_number] => 09798875
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-24
[patent_title] => 'Systems and methods for detecting and addressing HTML-modifying malware'
[patent_app_type] => utility
[patent_app_number] => 14/716684
[patent_app_country] => US
[patent_app_date] => 2015-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8948
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 354
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14716684
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/716684 | Systems and methods for detecting and addressing HTML-modifying malware | May 18, 2015 | Issued |
Array
(
[id] => 12358110
[patent_doc_number] => 09954891
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-24
[patent_title] => Unobtrusive and dynamic DDoS mitigation
[patent_app_type] => utility
[patent_app_number] => 14/714449
[patent_app_country] => US
[patent_app_date] => 2015-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6257
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 328
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14714449
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/714449 | Unobtrusive and dynamic DDoS mitigation | May 17, 2015 | Issued |
Array
(
[id] => 11272899
[patent_doc_number] => 20160335447
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'SECURE ENTERPRISE CDN FRAMEWORK'
[patent_app_type] => utility
[patent_app_number] => 14/713525
[patent_app_country] => US
[patent_app_date] => 2015-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6087
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14713525
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/713525 | SECURE ENTERPRISE CDN FRAMEWORK | May 14, 2015 | Abandoned |
Array
(
[id] => 10396175
[patent_doc_number] => 20150281182
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-01
[patent_title] => 'Web-based Security and Filtering System for Inbound/outbound Communications with Proxy Chaining'
[patent_app_type] => utility
[patent_app_number] => 14/713864
[patent_app_country] => US
[patent_app_date] => 2015-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6719
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14713864
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/713864 | Web-based Security and Filtering System for Inbound/outbound Communications with Proxy Chaining | May 14, 2015 | Abandoned |
Array
(
[id] => 11818820
[patent_doc_number] => 09722791
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-01
[patent_title] => 'Three-tiered security and computational architecture'
[patent_app_type] => utility
[patent_app_number] => 14/712769
[patent_app_country] => US
[patent_app_date] => 2015-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 6150
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 275
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14712769
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/712769 | Three-tiered security and computational architecture | May 13, 2015 | Issued |
Array
(
[id] => 12556776
[patent_doc_number] => 10015159
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-03
[patent_title] => Terminal authentication system, server device, and terminal authentication method
[patent_app_type] => utility
[patent_app_number] => 14/712645
[patent_app_country] => US
[patent_app_date] => 2015-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5756
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14712645
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/712645 | Terminal authentication system, server device, and terminal authentication method | May 13, 2015 | Issued |
Array
(
[id] => 10359723
[patent_doc_number] => 20150244728
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'METHOD AND DEVICE FOR DETECTING MALICIOUS URL'
[patent_app_type] => utility
[patent_app_number] => 14/711560
[patent_app_country] => US
[patent_app_date] => 2015-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5799
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14711560
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/711560 | Method and device for detecting malicious URL | May 12, 2015 | Issued |
Array
(
[id] => 10351846
[patent_doc_number] => 20150236851
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-20
[patent_title] => 'METHOD AND APPARATUS FOR UPDATING CA PUBLIC KEY, UE AND CA'
[patent_app_type] => utility
[patent_app_number] => 14/706432
[patent_app_country] => US
[patent_app_date] => 2015-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 17257
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14706432
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/706432 | METHOD AND APPARATUS FOR UPDATING CA PUBLIC KEY, UE AND CA | May 6, 2015 | Abandoned |
Array
(
[id] => 11265243
[patent_doc_number] => 09489540
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-08
[patent_title] => 'Memory controller with encryption and decryption engine'
[patent_app_type] => utility
[patent_app_number] => 14/702167
[patent_app_country] => US
[patent_app_date] => 2015-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 6838
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702167
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/702167 | Memory controller with encryption and decryption engine | Apr 30, 2015 | Issued |
Array
(
[id] => 12148445
[patent_doc_number] => 09882716
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-30
[patent_title] => 'Method and apparatus for generating and processing quantum signal in regular frame unit for quantum encryption key distribution'
[patent_app_type] => utility
[patent_app_number] => 14/697595
[patent_app_country] => US
[patent_app_date] => 2015-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3884
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14697595
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/697595 | Method and apparatus for generating and processing quantum signal in regular frame unit for quantum encryption key distribution | Apr 26, 2015 | Issued |
Array
(
[id] => 12103156
[patent_doc_number] => 09860265
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-02
[patent_title] => 'System and method for identifying exploitable weak points in a network'
[patent_app_type] => utility
[patent_app_number] => 14/689762
[patent_app_country] => US
[patent_app_date] => 2015-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 18527
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14689762
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/689762 | System and method for identifying exploitable weak points in a network | Apr 16, 2015 | Issued |
Array
(
[id] => 14958461
[patent_doc_number] => 10440523
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-08
[patent_title] => Communication control device, communication device, and computer program product for managing a group of devices
[patent_app_type] => utility
[patent_app_number] => 14/672287
[patent_app_country] => US
[patent_app_date] => 2015-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 8469
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14672287
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/672287 | Communication control device, communication device, and computer program product for managing a group of devices | Mar 29, 2015 | Issued |
Array
(
[id] => 16187897
[patent_doc_number] => 10721244
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-21
[patent_title] => Traffic feature information extraction method, traffic feature information extraction device, and traffic feature information extraction program
[patent_app_type] => utility
[patent_app_number] => 15/120933
[patent_app_country] => US
[patent_app_date] => 2015-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 23
[patent_no_of_words] => 12040
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 436
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15120933
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/120933 | Traffic feature information extraction method, traffic feature information extraction device, and traffic feature information extraction program | Mar 11, 2015 | Issued |
Array
(
[id] => 11724510
[patent_doc_number] => 09697366
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-07-04
[patent_title] => 'Use of generic (browser) encryption API to do key exchange (for media files and player)'
[patent_app_type] => utility
[patent_app_number] => 14/640611
[patent_app_country] => US
[patent_app_date] => 2015-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 14836
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14640611
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/640611 | Use of generic (browser) encryption API to do key exchange (for media files and player) | Mar 5, 2015 | Issued |
Array
(
[id] => 10284894
[patent_doc_number] => 20150169892
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-18
[patent_title] => 'Encryption-Based Data Access Management'
[patent_app_type] => utility
[patent_app_number] => 14/632601
[patent_app_country] => US
[patent_app_date] => 2015-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 13927
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14632601
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/632601 | Encryption-based data access management | Feb 25, 2015 | Issued |
Array
(
[id] => 13273751
[patent_doc_number] => 10148970
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-04
[patent_title] => Scalable video coding/multiplexing compatible with non-scalable decoders
[patent_app_type] => utility
[patent_app_number] => 14/599285
[patent_app_country] => US
[patent_app_date] => 2015-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1702
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14599285
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/599285 | Scalable video coding/multiplexing compatible with non-scalable decoders | Jan 15, 2015 | Issued |
Array
(
[id] => 16049423
[patent_doc_number] => 10686604
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-16
[patent_title] => Key device, key cloud system, decryption method, and program
[patent_app_type] => utility
[patent_app_number] => 15/027718
[patent_app_country] => US
[patent_app_date] => 2014-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 14238
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 290
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15027718
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/027718 | Key device, key cloud system, decryption method, and program | Oct 6, 2014 | Issued |