
Tania Abraham
Examiner (ID: 18993, Phone: (571)272-2635 , Office: P/3636 )
| Most Active Art Unit | 3636 |
| Art Unit(s) | 3636 |
| Total Applications | 1011 |
| Issued Applications | 699 |
| Pending Applications | 81 |
| Abandoned Applications | 262 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10478410
[patent_doc_number] => 20150363427
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-17
[patent_title] => 'AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/834864
[patent_app_country] => US
[patent_app_date] => 2015-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5529
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14834864
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/834864 | Automatic resource ownership assignment system and method | Aug 24, 2015 | Issued |
Array
(
[id] => 11440310
[patent_doc_number] => 20170041331
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'AIR-BASED AND GROUND-BASED SECURITY INFORMATION AND EVENT MANAGEMENT SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/819857
[patent_app_country] => US
[patent_app_date] => 2015-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5573
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14819857
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/819857 | Air-based and ground-based security information and event management system | Aug 5, 2015 | Issued |
Array
(
[id] => 12167804
[patent_doc_number] => 09886573
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-06
[patent_title] => 'Non-repudiation of broadcast messaging'
[patent_app_type] => utility
[patent_app_number] => 14/820238
[patent_app_country] => US
[patent_app_date] => 2015-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4773
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14820238
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/820238 | Non-repudiation of broadcast messaging | Aug 5, 2015 | Issued |
Array
(
[id] => 11202109
[patent_doc_number] => 09432335
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-08-30
[patent_title] => 'Cloud-based multi-layer security architecture with firewalled virtual network portions'
[patent_app_type] => utility
[patent_app_number] => 14/793285
[patent_app_country] => US
[patent_app_date] => 2015-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 16820
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14793285
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/793285 | Cloud-based multi-layer security architecture with firewalled virtual network portions | Jul 6, 2015 | Issued |
Array
(
[id] => 11386943
[patent_doc_number] => 20170012998
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-12
[patent_title] => 'AUTOMATION OF COLLECTION OF FORENSIC EVIDENCE'
[patent_app_type] => utility
[patent_app_number] => 14/792185
[patent_app_country] => US
[patent_app_date] => 2015-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5979
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14792185
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/792185 | Automation of collection of forensic evidence | Jul 5, 2015 | Issued |
Array
(
[id] => 10660565
[patent_doc_number] => 20160006709
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-07
[patent_title] => 'SYSTEM AND CONTROL METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/792281
[patent_app_country] => US
[patent_app_date] => 2015-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 11382
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14792281
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/792281 | SYSTEM AND CONTROL METHOD THEREOF | Jul 5, 2015 | Abandoned |
Array
(
[id] => 11333151
[patent_doc_number] => 09524397
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-12-20
[patent_title] => 'Inter-system data forensics'
[patent_app_type] => utility
[patent_app_number] => 14/792549
[patent_app_country] => US
[patent_app_date] => 2015-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4951
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14792549
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/792549 | Inter-system data forensics | Jul 5, 2015 | Issued |
Array
(
[id] => 10667794
[patent_doc_number] => 20160013939
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-14
[patent_title] => 'GENERATING A KEY BASED ON A COMBINATION OF KEYS'
[patent_app_type] => utility
[patent_app_number] => 14/792445
[patent_app_country] => US
[patent_app_date] => 2015-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8961
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14792445
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/792445 | Generating a key based on a combination of keys | Jul 5, 2015 | Issued |
Array
(
[id] => 10680671
[patent_doc_number] => 20160026816
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-28
[patent_title] => 'METHOD FOR STRONGLY ENCRYPTING .ZIP FILES'
[patent_app_type] => utility
[patent_app_number] => 14/753888
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4564
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14753888
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/753888 | Method for strongly encrypting .zip files | Jun 28, 2015 | Issued |
Array
(
[id] => 10427203
[patent_doc_number] => 20150312214
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-29
[patent_title] => 'SECURING EMAIL COMMUNICATIONS'
[patent_app_type] => utility
[patent_app_number] => 14/745410
[patent_app_country] => US
[patent_app_date] => 2015-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11111
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14745410
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/745410 | Securing email communications | Jun 19, 2015 | Issued |
Array
(
[id] => 13322489
[patent_doc_number] => 20180212782
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-26
[patent_title] => Methods For Digitally Signing An Electronic File And Authentication Method
[patent_app_type] => utility
[patent_app_number] => 15/502616
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8936
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15502616
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/502616 | Methods for digitally signing an electronic file and authentication method | Jun 14, 2015 | Issued |
Array
(
[id] => 12826111
[patent_doc_number] => 20180167209
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-14
[patent_title] => FIBRE-OPTIC COMMUNICATION BASED ON ENCODED FREQUENCY-SHIFTED LIGHT
[patent_app_type] => utility
[patent_app_number] => 15/580891
[patent_app_country] => US
[patent_app_date] => 2015-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5784
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15580891
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/580891 | Fibre-optic communication based on encoded frequency-shifted light | Jun 10, 2015 | Issued |
Array
(
[id] => 10393486
[patent_doc_number] => 20150278494
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-01
[patent_title] => 'SYSTEMS AND METHODS FOR VALIDATING LOGIN ATTEMPTS BASED ON USER LOCATION'
[patent_app_type] => utility
[patent_app_number] => 14/735195
[patent_app_country] => US
[patent_app_date] => 2015-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10769
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14735195
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/735195 | Systems and methods for validating login attempts based on user location | Jun 9, 2015 | Issued |
Array
(
[id] => 11552665
[patent_doc_number] => 09621534
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-11
[patent_title] => 'Authentication apparatus, authentication system, authentication method and storage medium'
[patent_app_type] => utility
[patent_app_number] => 14/728012
[patent_app_country] => US
[patent_app_date] => 2015-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4206
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14728012
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/728012 | Authentication apparatus, authentication system, authentication method and storage medium | Jun 1, 2015 | Issued |
Array
(
[id] => 10369437
[patent_doc_number] => 20150254442
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-10
[patent_title] => 'System and Method of Data Cognition Incorporating Autonomous Security Protection'
[patent_app_type] => utility
[patent_app_number] => 14/716341
[patent_app_country] => US
[patent_app_date] => 2015-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 13649
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14716341
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/716341 | System and method of data cognition incorporating autonomous security protection | May 18, 2015 | Issued |
Array
(
[id] => 11266884
[patent_doc_number] => 09491200
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-08
[patent_title] => 'Role-based attribute based access control (RABAC)'
[patent_app_type] => utility
[patent_app_number] => 14/702491
[patent_app_country] => US
[patent_app_date] => 2015-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5327
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702491
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/702491 | Role-based attribute based access control (RABAC) | Apr 30, 2015 | Issued |
Array
(
[id] => 10330290
[patent_doc_number] => 20150215294
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-30
[patent_title] => 'DIFFERENTIAL CLIENT-SIDE ENCRYPTION OF INFORMATION ORIGINATING FROM A CLIENT'
[patent_app_type] => utility
[patent_app_number] => 14/677867
[patent_app_country] => US
[patent_app_date] => 2015-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 13583
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14677867
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/677867 | Differential client-side encryption of information originating from a client | Apr 1, 2015 | Issued |
Array
(
[id] => 11301647
[patent_doc_number] => 09509667
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-29
[patent_title] => 'Method and system for digital rights management of documents'
[patent_app_type] => utility
[patent_app_number] => 14/635262
[patent_app_country] => US
[patent_app_date] => 2015-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 14
[patent_no_of_words] => 6134
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14635262
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/635262 | Method and system for digital rights management of documents | Mar 1, 2015 | Issued |
Array
(
[id] => 11058151
[patent_doc_number] => 20160255113
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-01
[patent_title] => 'Trusted Third Party Broker for Collection and Private Sharing of Successful Computer Security Practices'
[patent_app_type] => utility
[patent_app_number] => 14/632812
[patent_app_country] => US
[patent_app_date] => 2015-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4694
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14632812
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/632812 | Trusted third party broker for collection and private sharing of successful computer security practices | Feb 25, 2015 | Issued |
Array
(
[id] => 11056535
[patent_doc_number] => 20160253497
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-01
[patent_title] => 'Return Oriented Programming Attack Detection Via Memory Monitoring'
[patent_app_type] => utility
[patent_app_number] => 14/632652
[patent_app_country] => US
[patent_app_date] => 2015-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15954
[patent_no_of_claims] => 40
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14632652
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/632652 | Return Oriented Programming Attack Detection Via Memory Monitoring | Feb 25, 2015 | Abandoned |