
Tania Abraham
Examiner (ID: 18993, Phone: (571)272-2635 , Office: P/3636 )
| Most Active Art Unit | 3636 |
| Art Unit(s) | 3636 |
| Total Applications | 1011 |
| Issued Applications | 699 |
| Pending Applications | 81 |
| Abandoned Applications | 262 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10357623
[patent_doc_number] => 20150242628
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'System and Method for Detection of Malicious Hypertext Transfer Protocol Chains'
[patent_app_type] => utility
[patent_app_number] => 14/627686
[patent_app_country] => US
[patent_app_date] => 2015-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7556
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14627686
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/627686 | System and method for detection of malicious hypertext transfer protocol chains | Feb 19, 2015 | Issued |
Array
(
[id] => 10359676
[patent_doc_number] => 20150244681
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'ANONYMOUS INFORMATION SHARING'
[patent_app_type] => utility
[patent_app_number] => 14/627609
[patent_app_country] => US
[patent_app_date] => 2015-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9167
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14627609
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/627609 | Anonymous information sharing | Feb 19, 2015 | Issued |
Array
(
[id] => 11579757
[patent_doc_number] => 09635031
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-25
[patent_title] => 'Identifying fraudulent activities and the perpetrators thereof'
[patent_app_type] => utility
[patent_app_number] => 14/622900
[patent_app_country] => US
[patent_app_date] => 2015-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4417
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14622900
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/622900 | Identifying fraudulent activities and the perpetrators thereof | Feb 14, 2015 | Issued |
Array
(
[id] => 11037224
[patent_doc_number] => 20160234180
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'Methods And Apparatus For Sharing Encrypted Data'
[patent_app_type] => utility
[patent_app_number] => 14/616746
[patent_app_country] => US
[patent_app_date] => 2015-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 2502
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14616746
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/616746 | Methods and apparatus for sharing encrypted data | Feb 8, 2015 | Issued |
Array
(
[id] => 11247883
[patent_doc_number] => 09473942
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-18
[patent_title] => 'System and method for authentication for wireless emergency services'
[patent_app_type] => utility
[patent_app_number] => 14/590868
[patent_app_country] => US
[patent_app_date] => 2015-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 12
[patent_no_of_words] => 4550
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 70
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14590868
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/590868 | System and method for authentication for wireless emergency services | Jan 5, 2015 | Issued |
Array
(
[id] => 10308633
[patent_doc_number] => 20150193634
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-09
[patent_title] => 'IMAGE PROCESSING APPARATUS AND CONTROL METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/587749
[patent_app_country] => US
[patent_app_date] => 2014-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6619
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14587749
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/587749 | IMAGE PROCESSING APPARATUS AND CONTROL METHOD THEREOF | Dec 30, 2014 | Abandoned |
Array
(
[id] => 11137398
[patent_doc_number] => 09372987
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-06-21
[patent_title] => 'Apparatus and method for masking a real user controlling synthetic identities'
[patent_app_type] => utility
[patent_app_number] => 14/578284
[patent_app_country] => US
[patent_app_date] => 2014-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2514
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14578284
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/578284 | Apparatus and method for masking a real user controlling synthetic identities | Dec 18, 2014 | Issued |
Array
(
[id] => 11416956
[patent_doc_number] => 09563785
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-07
[patent_title] => 'Optimized encryption filtering of files'
[patent_app_type] => utility
[patent_app_number] => 14/558917
[patent_app_country] => US
[patent_app_date] => 2014-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 4658
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14558917
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/558917 | Optimized encryption filtering of files | Dec 2, 2014 | Issued |
Array
(
[id] => 10094149
[patent_doc_number] => 09130989
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-08
[patent_title] => 'Securing email communications'
[patent_app_type] => utility
[patent_app_number] => 14/558939
[patent_app_country] => US
[patent_app_date] => 2014-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 11092
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14558939
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/558939 | Securing email communications | Dec 2, 2014 | Issued |
Array
(
[id] => 11752609
[patent_doc_number] => 09710624
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-18
[patent_title] => 'Implementing extent granularity authorization initialization processing in CAPI adapters'
[patent_app_type] => utility
[patent_app_number] => 14/548825
[patent_app_country] => US
[patent_app_date] => 2014-11-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 3947
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14548825
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/548825 | Implementing extent granularity authorization initialization processing in CAPI adapters | Nov 19, 2014 | Issued |
Array
(
[id] => 11933606
[patent_doc_number] => 09800616
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-24
[patent_title] => 'Integrating policies from a plurality of disparate management agents'
[patent_app_type] => utility
[patent_app_number] => 14/546262
[patent_app_country] => US
[patent_app_date] => 2014-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6936
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14546262
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/546262 | Integrating policies from a plurality of disparate management agents | Nov 17, 2014 | Issued |
Array
(
[id] => 10788449
[patent_doc_number] => 20160134605
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-12
[patent_title] => 'SYSTEMS AND METHODS TO SECURELY INSTALL NETWORK DEVICES USING PHYSICAL CONFIRMATION'
[patent_app_type] => utility
[patent_app_number] => 14/539627
[patent_app_country] => US
[patent_app_date] => 2014-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 30
[patent_no_of_words] => 20336
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14539627
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/539627 | Systems and methods to securely install network devices using physical confirmation | Nov 11, 2014 | Issued |
Array
(
[id] => 9919211
[patent_doc_number] => 20150074416
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-12
[patent_title] => 'VERIFICATION OF SIGNED DIGITAL DOCUMENTS'
[patent_app_type] => utility
[patent_app_number] => 14/537629
[patent_app_country] => US
[patent_app_date] => 2014-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 17782
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14537629
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/537629 | Verification of signed digital documents | Nov 9, 2014 | Issued |
Array
(
[id] => 10153248
[patent_doc_number] => 09185560
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-10
[patent_title] => 'Identity management on a wireless device'
[patent_app_type] => utility
[patent_app_number] => 14/537226
[patent_app_country] => US
[patent_app_date] => 2014-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 23856
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14537226
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/537226 | Identity management on a wireless device | Nov 9, 2014 | Issued |
Array
(
[id] => 11832801
[patent_doc_number] => 09729555
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-08
[patent_title] => 'Techniques for managing groups on a mobile platform'
[patent_app_type] => utility
[patent_app_number] => 14/534100
[patent_app_country] => US
[patent_app_date] => 2014-11-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 35
[patent_figures_cnt] => 63
[patent_no_of_words] => 37839
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14534100
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/534100 | Techniques for managing groups on a mobile platform | Nov 4, 2014 | Issued |
Array
(
[id] => 11245764
[patent_doc_number] => 09471807
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-10-18
[patent_title] => 'System and method for creating a security slices with storage system resources and related operations relevant in software defined/as-a-service models, on a purpose built backup appliance (PBBA)/protection storage appliance natively'
[patent_app_type] => utility
[patent_app_number] => 14/533437
[patent_app_country] => US
[patent_app_date] => 2014-11-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6217
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 260
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14533437
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/533437 | System and method for creating a security slices with storage system resources and related operations relevant in software defined/as-a-service models, on a purpose built backup appliance (PBBA)/protection storage appliance natively | Nov 4, 2014 | Issued |
Array
(
[id] => 10276380
[patent_doc_number] => 20150161377
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-11
[patent_title] => 'WEARABLE DEVICE AND A METHOD FOR STORING CREDENTIALS ASSOCIATED WITH AN ELECTRONIC DEVICE IN SAID WEARABLE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/533492
[patent_app_country] => US
[patent_app_date] => 2014-11-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6355
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14533492
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/533492 | Wearable device and a method for storing credentials associated with an electronic device in said wearable device | Nov 4, 2014 | Issued |
Array
(
[id] => 10314511
[patent_doc_number] => 20150199514
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-16
[patent_title] => 'Computer Security Systems And Methods Using Virtualization Exceptions'
[patent_app_type] => utility
[patent_app_number] => 14/533670
[patent_app_country] => US
[patent_app_date] => 2014-11-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8075
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14533670
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/533670 | Computer security systems and methods using virtualization exceptions | Nov 4, 2014 | Issued |
Array
(
[id] => 11124479
[patent_doc_number] => 20160321453
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-03
[patent_title] => 'METHOD AND DEVICE FOR DETECTING MALICIOUS CODE IN AN INTELLIGENT TERMINAL'
[patent_app_type] => utility
[patent_app_number] => 15/108927
[patent_app_country] => US
[patent_app_date] => 2014-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8304
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15108927
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/108927 | Method and device for detecting malicious code in an intelligent terminal | Oct 30, 2014 | Issued |
Array
(
[id] => 10576257
[patent_doc_number] => 09298904
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-29
[patent_title] => 'Method for accessing a plurality of services by a mobile terminal user, and related secure device'
[patent_app_type] => utility
[patent_app_number] => 14/516800
[patent_app_country] => US
[patent_app_date] => 2014-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5476
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14516800
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/516800 | Method for accessing a plurality of services by a mobile terminal user, and related secure device | Oct 16, 2014 | Issued |