
T. R. Sundaram
Examiner (ID: 15150)
| Most Active Art Unit | 2858 |
| Art Unit(s) | 2858 |
| Total Applications | 238 |
| Issued Applications | 212 |
| Pending Applications | 13 |
| Abandoned Applications | 13 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10922201
[patent_doc_number] => 20140325221
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-30
[patent_title] => 'NETWORK TOKEN AUTHENTICATION SCHEME'
[patent_app_type] => utility
[patent_app_number] => 14/218965
[patent_app_country] => US
[patent_app_date] => 2014-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 11018
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14218965
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/218965 | Network token authentication scheme | Mar 17, 2014 | Issued |
Array
(
[id] => 9747359
[patent_doc_number] => 20140283079
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'STEM CELL GRID'
[patent_app_type] => utility
[patent_app_number] => 14/216634
[patent_app_country] => US
[patent_app_date] => 2014-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4035
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14216634
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/216634 | STEM CELL GRID | Mar 16, 2014 | Abandoned |
Array
(
[id] => 9605146
[patent_doc_number] => 20140201827
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-17
[patent_title] => 'INFORMATION PROCESSING APPARATUS AND CONTROL METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/215236
[patent_app_country] => US
[patent_app_date] => 2014-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 40
[patent_figures_cnt] => 40
[patent_no_of_words] => 27241
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14215236
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/215236 | Information processing apparatus and control method | Mar 16, 2014 | Issued |
Array
(
[id] => 10914662
[patent_doc_number] => 20140317681
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-23
[patent_title] => 'CLOUD FORENSICS'
[patent_app_type] => utility
[patent_app_number] => 14/215618
[patent_app_country] => US
[patent_app_date] => 2014-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 11803
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14215618
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/215618 | CLOUD FORENSICS | Mar 16, 2014 | Abandoned |
Array
(
[id] => 10682564
[patent_doc_number] => 20160028708
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-28
[patent_title] => 'DIGITAL CREDENTIAL WITH EMBEDDED AUTHENTICATION INSTRUCTIONS'
[patent_app_type] => utility
[patent_app_number] => 14/772882
[patent_app_country] => US
[patent_app_date] => 2014-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 13346
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14772882
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/772882 | Digital credential with embedded authentication instructions | Mar 13, 2014 | Issued |
Array
(
[id] => 14556325
[patent_doc_number] => 10346624
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-09
[patent_title] => Methods, systems, and devices for obscuring entities depicted in captured images
[patent_app_type] => utility
[patent_app_number] => 14/186528
[patent_app_country] => US
[patent_app_date] => 2014-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 72
[patent_figures_cnt] => 77
[patent_no_of_words] => 53533
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14186528
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/186528 | Methods, systems, and devices for obscuring entities depicted in captured images | Feb 20, 2014 | Issued |
Array
(
[id] => 10660556
[patent_doc_number] => 20160006700
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-07
[patent_title] => 'PRIVACY AGAINST INFERENCE ATTACKS UNDER MISMATCHED PRIOR'
[patent_app_type] => utility
[patent_app_number] => 14/765603
[patent_app_country] => US
[patent_app_date] => 2014-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4346
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14765603
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/765603 | PRIVACY AGAINST INFERENCE ATTACKS UNDER MISMATCHED PRIOR | Feb 5, 2014 | Abandoned |
Array
(
[id] => 10216029
[patent_doc_number] => 20150101021
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-09
[patent_title] => 'HYBRID SYNCHRONIZATION BETWEEN CLOUD AND ON-PREMISE SYSTEMS IN A CONTENT MANAGEMENT SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/170369
[patent_app_country] => US
[patent_app_date] => 2014-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9725
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14170369
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/170369 | Hybrid synchronization between cloud and on-premise systems in a content management system | Jan 30, 2014 | Issued |
Array
(
[id] => 10485996
[patent_doc_number] => 20150371015
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-24
[patent_title] => 'METHOD FOR MANAGING PRIVACY AND SECURITY IN A SOCIAL NETWORK BY CHECKING SHARED DATA AND RELATIONSHIPS BETWEEN USERS'
[patent_app_type] => utility
[patent_app_number] => 14/763056
[patent_app_country] => US
[patent_app_date] => 2014-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7146
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14763056
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/763056 | METHOD FOR MANAGING PRIVACY AND SECURITY IN A SOCIAL NETWORK BY CHECKING SHARED DATA AND RELATIONSHIPS BETWEEN USERS | Jan 22, 2014 | Abandoned |
Array
(
[id] => 10682575
[patent_doc_number] => 20160028719
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-28
[patent_title] => 'SEGMENTED SECRET-KEY STORAGE SYSTEM, SEGMENT STORAGE APPARATUS, SEGMENTED SECRET-KEY STORAGE METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/760935
[patent_app_country] => US
[patent_app_date] => 2014-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9386
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 14
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14760935
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/760935 | Segmented secret-key storage system, segment storage apparatus, segmented secret-key storage method | Jan 15, 2014 | Issued |
Array
(
[id] => 14096917
[patent_doc_number] => 10244395
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-26
[patent_title] => Access control for a wireless network
[patent_app_type] => utility
[patent_app_number] => 15/110767
[patent_app_country] => US
[patent_app_date] => 2014-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7679
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15110767
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/110767 | Access control for a wireless network | Jan 13, 2014 | Issued |
Array
(
[id] => 11308623
[patent_doc_number] => 09516039
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-12-06
[patent_title] => 'Behavioral detection of suspicious host activities in an enterprise'
[patent_app_type] => utility
[patent_app_number] => 14/139047
[patent_app_country] => US
[patent_app_date] => 2013-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 8322
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14139047
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/139047 | Behavioral detection of suspicious host activities in an enterprise | Dec 22, 2013 | Issued |
Array
(
[id] => 11392464
[patent_doc_number] => 09553720
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-24
[patent_title] => 'Using key material protocol services transparently'
[patent_app_type] => utility
[patent_app_number] => 14/138461
[patent_app_country] => US
[patent_app_date] => 2013-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 7299
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14138461
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/138461 | Using key material protocol services transparently | Dec 22, 2013 | Issued |
Array
(
[id] => 11899202
[patent_doc_number] => 09769151
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-19
[patent_title] => 'Multi-algorithm key generation and certificate install'
[patent_app_type] => utility
[patent_app_number] => 14/138436
[patent_app_country] => US
[patent_app_date] => 2013-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4219
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14138436
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/138436 | Multi-algorithm key generation and certificate install | Dec 22, 2013 | Issued |
Array
(
[id] => 10015818
[patent_doc_number] => 09058839
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-06-16
[patent_title] => 'Secure online pictures'
[patent_app_type] => utility
[patent_app_number] => 14/109371
[patent_app_country] => US
[patent_app_date] => 2013-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6995
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14109371
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/109371 | Secure online pictures | Dec 16, 2013 | Issued |
Array
(
[id] => 10284885
[patent_doc_number] => 20150169883
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-18
[patent_title] => 'PRESENCE-BASED CONTENT SHARING'
[patent_app_type] => utility
[patent_app_number] => 14/107495
[patent_app_country] => US
[patent_app_date] => 2013-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8078
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14107495
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/107495 | Presence-based content sharing | Dec 15, 2013 | Issued |
Array
(
[id] => 9407708
[patent_doc_number] => 20140098960
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-10
[patent_title] => 'Ciphertext Processing Method, Apparatus, and System'
[patent_app_type] => utility
[patent_app_number] => 14/104522
[patent_app_country] => US
[patent_app_date] => 2013-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8987
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14104522
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/104522 | Ciphertext Processing Method, Apparatus, and System | Dec 11, 2013 | Abandoned |
Array
(
[id] => 11214036
[patent_doc_number] => 09443074
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-09-13
[patent_title] => 'Techniques for attesting to information'
[patent_app_type] => utility
[patent_app_number] => 14/099785
[patent_app_country] => US
[patent_app_date] => 2013-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 25
[patent_no_of_words] => 24500
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 261
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14099785
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/099785 | Techniques for attesting to information | Dec 5, 2013 | Issued |
Array
(
[id] => 10250276
[patent_doc_number] => 20150135272
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-14
[patent_title] => 'IDENTITY POOL BRIDGING FOR MANAGED DIRECTORY SERVICES'
[patent_app_type] => utility
[patent_app_number] => 14/098298
[patent_app_country] => US
[patent_app_date] => 2013-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 13193
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14098298
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/098298 | Identity pool bridging for managed directory services | Dec 4, 2013 | Issued |
Array
(
[id] => 10276372
[patent_doc_number] => 20150161369
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-11
[patent_title] => 'GRIP SIGNATURE AUTHENTICATION OF USER OF DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/098180
[patent_app_country] => US
[patent_app_date] => 2013-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3103
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14098180
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/098180 | GRIP SIGNATURE AUTHENTICATION OF USER OF DEVICE | Dec 4, 2013 | Abandoned |