
Suzanne E. Mcdowell
Examiner (ID: 18761)
| Most Active Art Unit | 1732 |
| Art Unit(s) | 1732, 1791, 1307 |
| Total Applications | 702 |
| Issued Applications | 527 |
| Pending Applications | 59 |
| Abandoned Applications | 116 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12296844
[patent_doc_number] => 09935973
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-03
[patent_title] => Systems and methods for automatic detection of malicious activity via common files
[patent_app_type] => utility
[patent_app_number] => 14/971828
[patent_app_country] => US
[patent_app_date] => 2015-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 18924
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14971828
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/971828 | Systems and methods for automatic detection of malicious activity via common files | Dec 15, 2015 | Issued |
Array
(
[id] => 13259285
[patent_doc_number] => 10142344
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-27
[patent_title] => Credential management system
[patent_app_type] => utility
[patent_app_number] => 14/969654
[patent_app_country] => US
[patent_app_date] => 2015-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4894
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14969654
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/969654 | Credential management system | Dec 14, 2015 | Issued |
Array
(
[id] => 11693500
[patent_doc_number] => 20170169217
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-15
[patent_title] => 'ATTACK PATTERN FRAMEWORK FOR MONITORING ENTERPRISE INFORMATION SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 14/966885
[patent_app_country] => US
[patent_app_date] => 2015-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7481
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14966885
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/966885 | Attack pattern framework for monitoring enterprise information systems | Dec 10, 2015 | Issued |
Array
(
[id] => 13294891
[patent_doc_number] => 10158653
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-12-18
[patent_title] => Artificial intelligence with cyber security
[patent_app_type] => utility
[patent_app_number] => 14/959608
[patent_app_country] => US
[patent_app_date] => 2015-12-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3023
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14959608
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/959608 | Artificial intelligence with cyber security | Dec 3, 2015 | Issued |
Array
(
[id] => 12101790
[patent_doc_number] => 09858888
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-02
[patent_title] => 'Display apparatus'
[patent_app_type] => utility
[patent_app_number] => 14/941666
[patent_app_country] => US
[patent_app_date] => 2015-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 23
[patent_no_of_words] => 13845
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 336
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14941666
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/941666 | Display apparatus | Nov 15, 2015 | Issued |
Array
(
[id] => 13259337
[patent_doc_number] => 10142370
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-27
[patent_title] => Methods and apparatus for generating and using security assertions associated with containers in a computing environment
[patent_app_type] => utility
[patent_app_number] => 14/886131
[patent_app_country] => US
[patent_app_date] => 2015-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 18
[patent_no_of_words] => 22817
[patent_no_of_claims] => 63
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14886131
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/886131 | Methods and apparatus for generating and using security assertions associated with containers in a computing environment | Oct 18, 2015 | Issued |
Array
(
[id] => 13258801
[patent_doc_number] => 10142101
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-27
[patent_title] => Hardware enforced one-way cryptography
[patent_app_type] => utility
[patent_app_number] => 14/868579
[patent_app_country] => US
[patent_app_date] => 2015-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7112
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14868579
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/868579 | Hardware enforced one-way cryptography | Sep 28, 2015 | Issued |
Array
(
[id] => 13273063
[patent_doc_number] => 10148624
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-04
[patent_title] => Secure service matching
[patent_app_type] => utility
[patent_app_number] => 14/865430
[patent_app_country] => US
[patent_app_date] => 2015-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 12831
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14865430
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/865430 | Secure service matching | Sep 24, 2015 | Issued |
Array
(
[id] => 10666081
[patent_doc_number] => 20160012225
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-14
[patent_title] => 'SYSTEM AND METHOD FOR THE DETECTION OF MALWARE'
[patent_app_type] => utility
[patent_app_number] => 14/862570
[patent_app_country] => US
[patent_app_date] => 2015-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4078
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14862570
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/862570 | SYSTEM AND METHOD FOR THE DETECTION OF MALWARE | Sep 22, 2015 | Abandoned |
Array
(
[id] => 10810469
[patent_doc_number] => 20160156628
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-02
[patent_title] => 'AUTOMATIC SHARING OF EVENT CONTENT BY LINKING DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/815994
[patent_app_country] => US
[patent_app_date] => 2015-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7104
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14815994
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/815994 | AUTOMATIC SHARING OF EVENT CONTENT BY LINKING DEVICES | Jul 31, 2015 | Abandoned |
Array
(
[id] => 10442062
[patent_doc_number] => 20150327074
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'System and Method for Facilitating Secure Voice Communication over a Network'
[patent_app_type] => utility
[patent_app_number] => 14/804324
[patent_app_country] => US
[patent_app_date] => 2015-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 6496
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14804324
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/804324 | System and Method for Facilitating Secure Voice Communication over a Network | Jul 19, 2015 | Abandoned |
Array
(
[id] => 11352767
[patent_doc_number] => 20160371507
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'Managing Unwanted Tracking on a Device'
[patent_app_type] => utility
[patent_app_number] => 14/745742
[patent_app_country] => US
[patent_app_date] => 2015-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 15455
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14745742
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/745742 | Managing unwanted tracking on a device | Jun 21, 2015 | Issued |
Array
(
[id] => 10658707
[patent_doc_number] => 20160004851
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-07
[patent_title] => 'PROCESSING APPARATUS, METHOD FOR CONTROLLING PROCESSING APPARATUS, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 14/744380
[patent_app_country] => US
[patent_app_date] => 2015-06-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9235
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14744380
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/744380 | Processing apparatus, method for controlling processing apparatus, and non-transitory computer-readable storage medium | Jun 18, 2015 | Issued |
Array
(
[id] => 11354522
[patent_doc_number] => 20160373263
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'Identifying and Maintaining Secure Communications'
[patent_app_type] => utility
[patent_app_number] => 14/743674
[patent_app_country] => US
[patent_app_date] => 2015-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6009
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14743674
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/743674 | Identifying and maintaining secure communications | Jun 17, 2015 | Issued |
Array
(
[id] => 11352728
[patent_doc_number] => 20160371468
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'UNIFIED DIGITAL RIGHTS MANAGEMENT FOR HETEROGENOUS COMPUTING PLATFORMS'
[patent_app_type] => utility
[patent_app_number] => 14/742524
[patent_app_country] => US
[patent_app_date] => 2015-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9136
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14742524
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/742524 | Unified digital rights management for heterogenous computing platforms | Jun 16, 2015 | Issued |
Array
(
[id] => 10478574
[patent_doc_number] => 20150363591
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-17
[patent_title] => 'METHOD OF ACTIVATE UPON AUTHENTICATION OF ELECTRONIC DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/741437
[patent_app_country] => US
[patent_app_date] => 2015-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8041
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14741437
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/741437 | METHOD OF ACTIVATE UPON AUTHENTICATION OF ELECTRONIC DEVICE | Jun 15, 2015 | Abandoned |
Array
(
[id] => 13273201
[patent_doc_number] => 10148693
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-04
[patent_title] => Exploit detection system
[patent_app_type] => utility
[patent_app_number] => 14/739921
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9824
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739921
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/739921 | Exploit detection system | Jun 14, 2015 | Issued |
Array
(
[id] => 13273179
[patent_doc_number] => 10148682
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-04
[patent_title] => Security of VDI clones
[patent_app_type] => utility
[patent_app_number] => 14/738608
[patent_app_country] => US
[patent_app_date] => 2015-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5660
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738608
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738608 | Security of VDI clones | Jun 11, 2015 | Issued |
Array
(
[id] => 11340380
[patent_doc_number] => 20160366135
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'CONFIGURATION MANAGEMENT FOR VIRTUAL MACHINE ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/736422
[patent_app_country] => US
[patent_app_date] => 2015-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12818
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14736422
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/736422 | Configuration management for virtual machine environment | Jun 10, 2015 | Issued |
Array
(
[id] => 11825744
[patent_doc_number] => 20170214681
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-27
[patent_title] => 'MANAGEMENT SYSTEM, PROGRAM, MANAGEMENT METHOD, AND COMMUNICATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/308700
[patent_app_country] => US
[patent_app_date] => 2015-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 8353
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15308700
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/308700 | Management system, program, management method, and communication system | Apr 30, 2015 | Issued |