
T. R. Sundaram
Examiner (ID: 15150)
| Most Active Art Unit | 2858 |
| Art Unit(s) | 2858 |
| Total Applications | 238 |
| Issued Applications | 212 |
| Pending Applications | 13 |
| Abandoned Applications | 13 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11412520
[patent_doc_number] => 09559840
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-31
[patent_title] => 'Low-bandwidth time-embargoed content disclosure'
[patent_app_type] => utility
[patent_app_number] => 14/057741
[patent_app_country] => US
[patent_app_date] => 2013-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5750
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14057741
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/057741 | Low-bandwidth time-embargoed content disclosure | Oct 17, 2013 | Issued |
Array
(
[id] => 10550631
[patent_doc_number] => 09275257
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-01
[patent_title] => 'Secure communication architecture'
[patent_app_type] => utility
[patent_app_number] => 14/055706
[patent_app_country] => US
[patent_app_date] => 2013-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 11542
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14055706
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/055706 | Secure communication architecture | Oct 15, 2013 | Issued |
Array
(
[id] => 10216045
[patent_doc_number] => 20150101037
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-09
[patent_title] => 'PHYSICALLY UNCLONABLE FUNCTION PATTERN MATCHING FOR DEVICE IDENTIFICATION'
[patent_app_type] => utility
[patent_app_number] => 14/045740
[patent_app_country] => US
[patent_app_date] => 2013-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 7837
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14045740
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/045740 | Physically unclonable function pattern matching for device identification | Oct 2, 2013 | Issued |
Array
(
[id] => 10653082
[patent_doc_number] => 09369358
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-06-14
[patent_title] => 'System and method for on-line and off-line streaming application isolation'
[patent_app_type] => utility
[patent_app_number] => 14/044152
[patent_app_country] => US
[patent_app_date] => 2013-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8456
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 20
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14044152
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/044152 | System and method for on-line and off-line streaming application isolation | Oct 1, 2013 | Issued |
Array
(
[id] => 10207952
[patent_doc_number] => 20150092940
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-02
[patent_title] => 'Method for Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields Countermeasure for Simple-Side Channel Attacks and C-Safe-Fault Attacks for Right-to-Left Algorithms'
[patent_app_type] => utility
[patent_app_number] => 14/044544
[patent_app_country] => US
[patent_app_date] => 2013-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 7031
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14044544
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/044544 | Method for Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields Countermeasure for Simple-Side Channel Attacks and C-Safe-Fault Attacks for Right-to-Left Algorithms | Oct 1, 2013 | Abandoned |
Array
(
[id] => 9271310
[patent_doc_number] => 20140026228
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-23
[patent_title] => 'INFORMATION PROCESSING APPARATUS AND CONTROL METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/975597
[patent_app_country] => US
[patent_app_date] => 2013-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 16000
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13975597
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/975597 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD | Aug 25, 2013 | Abandoned |
Array
(
[id] => 11781089
[patent_doc_number] => 09390274
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'Media data processing method and apparatus'
[patent_app_type] => utility
[patent_app_number] => 14/010276
[patent_app_country] => US
[patent_app_date] => 2013-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 23
[patent_no_of_words] => 8822
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 305
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14010276
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/010276 | Media data processing method and apparatus | Aug 25, 2013 | Issued |
Array
(
[id] => 10166172
[patent_doc_number] => 09197410
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-24
[patent_title] => 'Key management system'
[patent_app_type] => utility
[patent_app_number] => 13/968885
[patent_app_country] => US
[patent_app_date] => 2013-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 12
[patent_no_of_words] => 10890
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13968885
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/968885 | Key management system | Aug 15, 2013 | Issued |
Array
(
[id] => 10545530
[patent_doc_number] => 09270675
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-23
[patent_title] => 'Information processing device and method'
[patent_app_type] => utility
[patent_app_number] => 13/963119
[patent_app_country] => US
[patent_app_date] => 2013-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 4367
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 300
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13963119
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/963119 | Information processing device and method | Aug 8, 2013 | Issued |
Array
(
[id] => 9308853
[patent_doc_number] => 20140047527
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-13
[patent_title] => 'System and Method for Detecting and Preventing Automated Interaction Based on Detected Actions Performed by User to Solve a Proffered Puzzle'
[patent_app_type] => utility
[patent_app_number] => 13/961872
[patent_app_country] => US
[patent_app_date] => 2013-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 11690
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13961872
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/961872 | System and Method for Detecting and Preventing Automated Interaction Based on Detected Actions Performed by User to Solve a Proffered Puzzle | Aug 6, 2013 | Abandoned |
Array
(
[id] => 9297399
[patent_doc_number] => 20140041032
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-06
[patent_title] => 'System and Method for Detecting Network Intrusions Using Statistical Models and a Generalized Likelihood Ratio Test'
[patent_app_type] => utility
[patent_app_number] => 13/956720
[patent_app_country] => US
[patent_app_date] => 2013-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4974
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13956720
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/956720 | System and Method for Detecting Network Intrusions Using Statistical Models and a Generalized Likelihood Ratio Test | Jul 31, 2013 | Abandoned |
Array
(
[id] => 9859887
[patent_doc_number] => 20150039905
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-05
[patent_title] => 'SYSTEM FOR PROCESSING AN ENCRYPTED INSTRUCTION STREAM IN HARDWARE'
[patent_app_type] => utility
[patent_app_number] => 13/954487
[patent_app_country] => US
[patent_app_date] => 2013-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3753
[patent_no_of_claims] => 44
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13954487
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/954487 | System for processing an encrypted instruction stream in hardware | Jul 29, 2013 | Issued |
Array
(
[id] => 12013755
[patent_doc_number] => 09807088
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-31
[patent_title] => 'Method and network node for obtaining a permanent identity of an authenticating wireless device'
[patent_app_type] => utility
[patent_app_number] => 14/767497
[patent_app_country] => US
[patent_app_date] => 2013-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 6191
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14767497
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/767497 | Method and network node for obtaining a permanent identity of an authenticating wireless device | Jul 28, 2013 | Issued |
Array
(
[id] => 9841255
[patent_doc_number] => 20150033337
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-29
[patent_title] => 'CYBER SECURITY ANALYTICS ARCHITECTURE'
[patent_app_type] => utility
[patent_app_number] => 13/951128
[patent_app_country] => US
[patent_app_date] => 2013-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5444
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13951128
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/951128 | Cyber security analytics architecture | Jul 24, 2013 | Issued |
Array
(
[id] => 11216217
[patent_doc_number] => 09445269
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-13
[patent_title] => 'Terminal identity verification and service authentication method, system and terminal'
[patent_app_type] => utility
[patent_app_number] => 14/417024
[patent_app_country] => US
[patent_app_date] => 2013-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 5167
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 327
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14417024
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/417024 | Terminal identity verification and service authentication method, system and terminal | Jul 16, 2013 | Issued |
Array
(
[id] => 10157850
[patent_doc_number] => 09189632
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-17
[patent_title] => 'Method for protecting security of data, network entity and communication terminal'
[patent_app_type] => utility
[patent_app_number] => 13/943469
[patent_app_country] => US
[patent_app_date] => 2013-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 12632
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13943469
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/943469 | Method for protecting security of data, network entity and communication terminal | Jul 15, 2013 | Issued |
Array
(
[id] => 9795345
[patent_doc_number] => 20150007289
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-01
[patent_title] => 'MOTION-BASED HUMAN VERIFICATION SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/927493
[patent_app_country] => US
[patent_app_date] => 2013-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8524
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13927493
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/927493 | Motion-based human verification system and method | Jun 25, 2013 | Issued |
Array
(
[id] => 10977387
[patent_doc_number] => 20140380423
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-25
[patent_title] => 'SYSTEM AND METHOD FOR DYNAMICALLY AWARDING PERMISSIONS'
[patent_app_type] => utility
[patent_app_number] => 13/924788
[patent_app_country] => US
[patent_app_date] => 2013-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7744
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13924788
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/924788 | SYSTEM AND METHOD FOR DYNAMICALLY AWARDING PERMISSIONS | Jun 23, 2013 | Abandoned |
Array
(
[id] => 9123815
[patent_doc_number] => 20130290737
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-31
[patent_title] => 'METHOD OF DISTRIBUTING A DECRYPTION KEY IN FIXED-CONTENT DATA'
[patent_app_type] => utility
[patent_app_number] => 13/925780
[patent_app_country] => US
[patent_app_date] => 2013-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5696
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13925780
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/925780 | Method of distributing a decryption key in fixed-content data | Jun 23, 2013 | Issued |
Array
(
[id] => 10977431
[patent_doc_number] => 20140380467
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-25
[patent_title] => 'FORCED ALERT THRESHOLDS FOR PROFILED DETECTION'
[patent_app_type] => utility
[patent_app_number] => 13/922947
[patent_app_country] => US
[patent_app_date] => 2013-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3558
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13922947
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/922947 | Forced alert thresholds for profiled detection | Jun 19, 2013 | Issued |