
Thomas L. Stoll
Examiner (ID: 6502)
| Most Active Art Unit | 2612 |
| Art Unit(s) | 2612, 2616, 2722 |
| Total Applications | 304 |
| Issued Applications | 189 |
| Pending Applications | 17 |
| Abandoned Applications | 98 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14494189
[patent_doc_number] => 10333901
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-06-25
[patent_title] => Policy based data aggregation
[patent_app_type] => utility
[patent_app_number] => 14/483069
[patent_app_country] => US
[patent_app_date] => 2014-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 14073
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14483069
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/483069 | Policy based data aggregation | Sep 9, 2014 | Issued |
Array
(
[id] => 14673741
[patent_doc_number] => 10374800
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-08-06
[patent_title] => Cryptography algorithm hopping
[patent_app_type] => utility
[patent_app_number] => 14/483070
[patent_app_country] => US
[patent_app_date] => 2014-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 16222
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14483070
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/483070 | Cryptography algorithm hopping | Sep 9, 2014 | Issued |
Array
(
[id] => 10386191
[patent_doc_number] => 20150271198
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-24
[patent_title] => 'COMPARING SOURCE AND SINK VALUES IN SECURITY ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 14/471288
[patent_app_country] => US
[patent_app_date] => 2014-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3109
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14471288
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/471288 | COMPARING SOURCE AND SINK VALUES IN SECURITY ANALYSIS | Aug 27, 2014 | Abandoned |
Array
(
[id] => 11097585
[patent_doc_number] => 20160294553
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'INFORMATION DELIVERY SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/036032
[patent_app_country] => US
[patent_app_date] => 2014-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 13869
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15036032
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/036032 | INFORMATION DELIVERY SYSTEM | Aug 24, 2014 | Abandoned |
Array
(
[id] => 9838232
[patent_doc_number] => 20150030313
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-29
[patent_title] => 'DISPLAYING SESSION AUDIT LOGS'
[patent_app_type] => utility
[patent_app_number] => 14/339527
[patent_app_country] => US
[patent_app_date] => 2014-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5853
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14339527
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/339527 | Displaying session audit logs | Jul 23, 2014 | Issued |
Array
(
[id] => 11579566
[patent_doc_number] => 09634840
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-25
[patent_title] => 'Digital signature technique'
[patent_app_type] => utility
[patent_app_number] => 14/121041
[patent_app_country] => US
[patent_app_date] => 2014-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2762
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 228
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14121041
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/121041 | Digital signature technique | Jul 21, 2014 | Issued |
Array
(
[id] => 11552480
[patent_doc_number] => 09621348
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-11
[patent_title] => 'System and method of secure text generation'
[patent_app_type] => utility
[patent_app_number] => 14/305447
[patent_app_country] => US
[patent_app_date] => 2014-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6043
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 266
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14305447
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/305447 | System and method of secure text generation | Jun 15, 2014 | Issued |
Array
(
[id] => 14254691
[patent_doc_number] => 10277559
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-30
[patent_title] => Methods and systems for data traffic control and encryption
[patent_app_type] => utility
[patent_app_number] => 14/283944
[patent_app_country] => US
[patent_app_date] => 2014-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 12202
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 14
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14283944
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/283944 | Methods and systems for data traffic control and encryption | May 20, 2014 | Issued |
Array
(
[id] => 14096057
[patent_doc_number] => 10243953
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-26
[patent_title] => Systems and methods for secure resource access and network communication
[patent_app_type] => utility
[patent_app_number] => 14/282616
[patent_app_country] => US
[patent_app_date] => 2014-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10241
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 345
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14282616
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/282616 | Systems and methods for secure resource access and network communication | May 19, 2014 | Issued |
Array
(
[id] => 10772979
[patent_doc_number] => 20160119136
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'CRYPTOGRAPHIC DEVICE AND SECRET KEY PROTECTION METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/278318
[patent_app_country] => US
[patent_app_date] => 2014-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 4450
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14278318
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/278318 | Cryptographic device and secret key protection method | May 14, 2014 | Issued |
Array
(
[id] => 12576411
[patent_doc_number] => 10021077
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-07-10
[patent_title] => System and method for distributing and using signed send tokens
[patent_app_type] => utility
[patent_app_number] => 14/275178
[patent_app_country] => US
[patent_app_date] => 2014-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4883
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14275178
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/275178 | System and method for distributing and using signed send tokens | May 11, 2014 | Issued |
Array
(
[id] => 10773206
[patent_doc_number] => 20160119362
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'DATA PROCESSING SYSTEM, METHOD OF INITIALIZING A DATA PROCESSING SYSTEM, AND COMPUTER PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 14/275722
[patent_app_country] => US
[patent_app_date] => 2014-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3672
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14275722
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/275722 | DATA PROCESSING SYSTEM, METHOD OF INITIALIZING A DATA PROCESSING SYSTEM, AND COMPUTER PROGRAM PRODUCT | May 11, 2014 | Abandoned |
Array
(
[id] => 10773137
[patent_doc_number] => 20160119293
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'System and Method for Authenticating and Encrypting Data Transmitted To and From the Devices and Cloud Servers'
[patent_app_type] => utility
[patent_app_number] => 14/273536
[patent_app_country] => US
[patent_app_date] => 2014-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3287
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14273536
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/273536 | System and Method for Authenticating and Encrypting Data Transmitted To and From the Devices and Cloud Servers | May 7, 2014 | Abandoned |
Array
(
[id] => 13273153
[patent_doc_number] => 10148669
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-04
[patent_title] => Out-of-band encryption key management system
[patent_app_type] => utility
[patent_app_number] => 14/271992
[patent_app_country] => US
[patent_app_date] => 2014-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5550
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14271992
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/271992 | Out-of-band encryption key management system | May 6, 2014 | Issued |
Array
(
[id] => 11897344
[patent_doc_number] => 09767281
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-19
[patent_title] => 'Device and method for processing data'
[patent_app_type] => utility
[patent_app_number] => 14/224464
[patent_app_country] => US
[patent_app_date] => 2014-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 11
[patent_no_of_words] => 9476
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14224464
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/224464 | Device and method for processing data | Mar 24, 2014 | Issued |
Array
(
[id] => 10386189
[patent_doc_number] => 20150271196
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-24
[patent_title] => 'COMPARING SOURCE AND SINK VALUES IN SECURITY ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 14/220324
[patent_app_country] => US
[patent_app_date] => 2014-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3109
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14220324
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/220324 | COMPARING SOURCE AND SINK VALUES IN SECURITY ANALYSIS | Mar 19, 2014 | Abandoned |
Array
(
[id] => 9759123
[patent_doc_number] => 20140289824
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-25
[patent_title] => 'SHARING AUTHENTICATION PROFILES BETWEEN A GROUP OF USER DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/221189
[patent_app_country] => US
[patent_app_date] => 2014-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7393
[patent_no_of_claims] => 42
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14221189
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/221189 | Sharing authentication profiles between a group of user devices | Mar 19, 2014 | Issued |
Array
(
[id] => 10386193
[patent_doc_number] => 20150271200
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-24
[patent_title] => 'TECHNIQUES TO PROVIDE NETWORK SECURITY THROUGH JUST-IN-TIME PROVISIONED ACCOUNTS'
[patent_app_type] => utility
[patent_app_number] => 14/220486
[patent_app_country] => US
[patent_app_date] => 2014-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 16908
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14220486
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/220486 | Techniques to provide network security through just-in-time provisioned accounts | Mar 19, 2014 | Issued |
Array
(
[id] => 11368011
[patent_doc_number] => 20170005993
[patent_country] => US
[patent_kind] => A9
[patent_issue_date] => 2017-01-05
[patent_title] => 'CONTENT ACCESS DEVICE WITH PROGRAMMABLE INTERFACE AND METHODS FOR USE THEREWITH'
[patent_app_type] => utility
[patent_app_number] => 14/217757
[patent_app_country] => US
[patent_app_date] => 2014-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3996
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14217757
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/217757 | CONTENT ACCESS DEVICE WITH PROGRAMMABLE INTERFACE AND METHODS FOR USE THEREWITH | Mar 17, 2014 | Abandoned |
Array
(
[id] => 11905125
[patent_doc_number] => 09774576
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-26
[patent_title] => 'Authentication by use of symmetric and asymmetric cryptography'
[patent_app_type] => utility
[patent_app_number] => 14/217807
[patent_app_country] => US
[patent_app_date] => 2014-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4536
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14217807
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/217807 | Authentication by use of symmetric and asymmetric cryptography | Mar 17, 2014 | Issued |