Search

T. R. Sundaram

Examiner (ID: 15150)

Most Active Art Unit
2858
Art Unit(s)
2858
Total Applications
238
Issued Applications
212
Pending Applications
13
Abandoned Applications
13

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11412520 [patent_doc_number] => 09559840 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-01-31 [patent_title] => 'Low-bandwidth time-embargoed content disclosure' [patent_app_type] => utility [patent_app_number] => 14/057741 [patent_app_country] => US [patent_app_date] => 2013-10-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5750 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 134 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14057741 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/057741
Low-bandwidth time-embargoed content disclosure Oct 17, 2013 Issued
Array ( [id] => 10550631 [patent_doc_number] => 09275257 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-03-01 [patent_title] => 'Secure communication architecture' [patent_app_type] => utility [patent_app_number] => 14/055706 [patent_app_country] => US [patent_app_date] => 2013-10-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 11542 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14055706 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/055706
Secure communication architecture Oct 15, 2013 Issued
Array ( [id] => 10216045 [patent_doc_number] => 20150101037 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-04-09 [patent_title] => 'PHYSICALLY UNCLONABLE FUNCTION PATTERN MATCHING FOR DEVICE IDENTIFICATION' [patent_app_type] => utility [patent_app_number] => 14/045740 [patent_app_country] => US [patent_app_date] => 2013-10-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 7837 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14045740 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/045740
Physically unclonable function pattern matching for device identification Oct 2, 2013 Issued
Array ( [id] => 10653082 [patent_doc_number] => 09369358 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-06-14 [patent_title] => 'System and method for on-line and off-line streaming application isolation' [patent_app_type] => utility [patent_app_number] => 14/044152 [patent_app_country] => US [patent_app_date] => 2013-10-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8456 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 20 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14044152 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/044152
System and method for on-line and off-line streaming application isolation Oct 1, 2013 Issued
Array ( [id] => 10207952 [patent_doc_number] => 20150092940 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-04-02 [patent_title] => 'Method for Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields Countermeasure for Simple-Side Channel Attacks and C-Safe-Fault Attacks for Right-to-Left Algorithms' [patent_app_type] => utility [patent_app_number] => 14/044544 [patent_app_country] => US [patent_app_date] => 2013-10-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 7031 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14044544 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/044544
Method for Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields Countermeasure for Simple-Side Channel Attacks and C-Safe-Fault Attacks for Right-to-Left Algorithms Oct 1, 2013 Abandoned
Array ( [id] => 9271310 [patent_doc_number] => 20140026228 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-01-23 [patent_title] => 'INFORMATION PROCESSING APPARATUS AND CONTROL METHOD' [patent_app_type] => utility [patent_app_number] => 13/975597 [patent_app_country] => US [patent_app_date] => 2013-08-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 28 [patent_figures_cnt] => 28 [patent_no_of_words] => 16000 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13975597 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/975597
INFORMATION PROCESSING APPARATUS AND CONTROL METHOD Aug 25, 2013 Abandoned
Array ( [id] => 11781089 [patent_doc_number] => 09390274 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-07-12 [patent_title] => 'Media data processing method and apparatus' [patent_app_type] => utility [patent_app_number] => 14/010276 [patent_app_country] => US [patent_app_date] => 2013-08-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 23 [patent_no_of_words] => 8822 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 305 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14010276 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/010276
Media data processing method and apparatus Aug 25, 2013 Issued
Array ( [id] => 10166172 [patent_doc_number] => 09197410 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-24 [patent_title] => 'Key management system' [patent_app_type] => utility [patent_app_number] => 13/968885 [patent_app_country] => US [patent_app_date] => 2013-08-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 12 [patent_no_of_words] => 10890 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 248 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13968885 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/968885
Key management system Aug 15, 2013 Issued
Array ( [id] => 10545530 [patent_doc_number] => 09270675 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-02-23 [patent_title] => 'Information processing device and method' [patent_app_type] => utility [patent_app_number] => 13/963119 [patent_app_country] => US [patent_app_date] => 2013-08-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 4367 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 300 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13963119 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/963119
Information processing device and method Aug 8, 2013 Issued
Array ( [id] => 9308853 [patent_doc_number] => 20140047527 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-02-13 [patent_title] => 'System and Method for Detecting and Preventing Automated Interaction Based on Detected Actions Performed by User to Solve a Proffered Puzzle' [patent_app_type] => utility [patent_app_number] => 13/961872 [patent_app_country] => US [patent_app_date] => 2013-08-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 11690 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13961872 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/961872
System and Method for Detecting and Preventing Automated Interaction Based on Detected Actions Performed by User to Solve a Proffered Puzzle Aug 6, 2013 Abandoned
Array ( [id] => 9297399 [patent_doc_number] => 20140041032 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-02-06 [patent_title] => 'System and Method for Detecting Network Intrusions Using Statistical Models and a Generalized Likelihood Ratio Test' [patent_app_type] => utility [patent_app_number] => 13/956720 [patent_app_country] => US [patent_app_date] => 2013-08-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4974 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13956720 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/956720
System and Method for Detecting Network Intrusions Using Statistical Models and a Generalized Likelihood Ratio Test Jul 31, 2013 Abandoned
Array ( [id] => 9859887 [patent_doc_number] => 20150039905 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-05 [patent_title] => 'SYSTEM FOR PROCESSING AN ENCRYPTED INSTRUCTION STREAM IN HARDWARE' [patent_app_type] => utility [patent_app_number] => 13/954487 [patent_app_country] => US [patent_app_date] => 2013-07-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3753 [patent_no_of_claims] => 44 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13954487 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/954487
System for processing an encrypted instruction stream in hardware Jul 29, 2013 Issued
Array ( [id] => 12013755 [patent_doc_number] => 09807088 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-10-31 [patent_title] => 'Method and network node for obtaining a permanent identity of an authenticating wireless device' [patent_app_type] => utility [patent_app_number] => 14/767497 [patent_app_country] => US [patent_app_date] => 2013-07-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 10 [patent_no_of_words] => 6191 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 159 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14767497 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/767497
Method and network node for obtaining a permanent identity of an authenticating wireless device Jul 28, 2013 Issued
Array ( [id] => 9841255 [patent_doc_number] => 20150033337 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-29 [patent_title] => 'CYBER SECURITY ANALYTICS ARCHITECTURE' [patent_app_type] => utility [patent_app_number] => 13/951128 [patent_app_country] => US [patent_app_date] => 2013-07-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5444 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13951128 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/951128
Cyber security analytics architecture Jul 24, 2013 Issued
Array ( [id] => 11216217 [patent_doc_number] => 09445269 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-09-13 [patent_title] => 'Terminal identity verification and service authentication method, system and terminal' [patent_app_type] => utility [patent_app_number] => 14/417024 [patent_app_country] => US [patent_app_date] => 2013-07-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 5167 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 327 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14417024 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/417024
Terminal identity verification and service authentication method, system and terminal Jul 16, 2013 Issued
Array ( [id] => 10157850 [patent_doc_number] => 09189632 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-17 [patent_title] => 'Method for protecting security of data, network entity and communication terminal' [patent_app_type] => utility [patent_app_number] => 13/943469 [patent_app_country] => US [patent_app_date] => 2013-07-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 9 [patent_no_of_words] => 12632 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 173 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13943469 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/943469
Method for protecting security of data, network entity and communication terminal Jul 15, 2013 Issued
Array ( [id] => 9795345 [patent_doc_number] => 20150007289 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-01 [patent_title] => 'MOTION-BASED HUMAN VERIFICATION SYSTEM AND METHOD' [patent_app_type] => utility [patent_app_number] => 13/927493 [patent_app_country] => US [patent_app_date] => 2013-06-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8524 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13927493 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/927493
Motion-based human verification system and method Jun 25, 2013 Issued
Array ( [id] => 10977387 [patent_doc_number] => 20140380423 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-25 [patent_title] => 'SYSTEM AND METHOD FOR DYNAMICALLY AWARDING PERMISSIONS' [patent_app_type] => utility [patent_app_number] => 13/924788 [patent_app_country] => US [patent_app_date] => 2013-06-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7744 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13924788 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/924788
SYSTEM AND METHOD FOR DYNAMICALLY AWARDING PERMISSIONS Jun 23, 2013 Abandoned
Array ( [id] => 9123815 [patent_doc_number] => 20130290737 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-10-31 [patent_title] => 'METHOD OF DISTRIBUTING A DECRYPTION KEY IN FIXED-CONTENT DATA' [patent_app_type] => utility [patent_app_number] => 13/925780 [patent_app_country] => US [patent_app_date] => 2013-06-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5696 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13925780 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/925780
Method of distributing a decryption key in fixed-content data Jun 23, 2013 Issued
Array ( [id] => 10977431 [patent_doc_number] => 20140380467 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-25 [patent_title] => 'FORCED ALERT THRESHOLDS FOR PROFILED DETECTION' [patent_app_type] => utility [patent_app_number] => 13/922947 [patent_app_country] => US [patent_app_date] => 2013-06-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3558 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13922947 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/922947
Forced alert thresholds for profiled detection Jun 19, 2013 Issued
Menu