Search

Thomas L. Stoll

Examiner (ID: 6502)

Most Active Art Unit
2612
Art Unit(s)
2612, 2616, 2722
Total Applications
304
Issued Applications
189
Pending Applications
17
Abandoned Applications
98

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 14494189 [patent_doc_number] => 10333901 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-06-25 [patent_title] => Policy based data aggregation [patent_app_type] => utility [patent_app_number] => 14/483069 [patent_app_country] => US [patent_app_date] => 2014-09-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 14073 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 188 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14483069 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/483069
Policy based data aggregation Sep 9, 2014 Issued
Array ( [id] => 14673741 [patent_doc_number] => 10374800 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-08-06 [patent_title] => Cryptography algorithm hopping [patent_app_type] => utility [patent_app_number] => 14/483070 [patent_app_country] => US [patent_app_date] => 2014-09-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 16222 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 144 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14483070 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/483070
Cryptography algorithm hopping Sep 9, 2014 Issued
Array ( [id] => 10386191 [patent_doc_number] => 20150271198 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-24 [patent_title] => 'COMPARING SOURCE AND SINK VALUES IN SECURITY ANALYSIS' [patent_app_type] => utility [patent_app_number] => 14/471288 [patent_app_country] => US [patent_app_date] => 2014-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3109 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14471288 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/471288
COMPARING SOURCE AND SINK VALUES IN SECURITY ANALYSIS Aug 27, 2014 Abandoned
Array ( [id] => 11097585 [patent_doc_number] => 20160294553 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-06 [patent_title] => 'INFORMATION DELIVERY SYSTEM' [patent_app_type] => utility [patent_app_number] => 15/036032 [patent_app_country] => US [patent_app_date] => 2014-08-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 21 [patent_no_of_words] => 13869 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15036032 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/036032
INFORMATION DELIVERY SYSTEM Aug 24, 2014 Abandoned
Array ( [id] => 9838232 [patent_doc_number] => 20150030313 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-29 [patent_title] => 'DISPLAYING SESSION AUDIT LOGS' [patent_app_type] => utility [patent_app_number] => 14/339527 [patent_app_country] => US [patent_app_date] => 2014-07-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5853 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14339527 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/339527
Displaying session audit logs Jul 23, 2014 Issued
Array ( [id] => 11579566 [patent_doc_number] => 09634840 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-04-25 [patent_title] => 'Digital signature technique' [patent_app_type] => utility [patent_app_number] => 14/121041 [patent_app_country] => US [patent_app_date] => 2014-07-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2762 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 228 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14121041 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/121041
Digital signature technique Jul 21, 2014 Issued
Array ( [id] => 11552480 [patent_doc_number] => 09621348 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-04-11 [patent_title] => 'System and method of secure text generation' [patent_app_type] => utility [patent_app_number] => 14/305447 [patent_app_country] => US [patent_app_date] => 2014-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6043 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 266 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14305447 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/305447
System and method of secure text generation Jun 15, 2014 Issued
Array ( [id] => 14254691 [patent_doc_number] => 10277559 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-04-30 [patent_title] => Methods and systems for data traffic control and encryption [patent_app_type] => utility [patent_app_number] => 14/283944 [patent_app_country] => US [patent_app_date] => 2014-05-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 12202 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 14 [patent_words_short_claim] => 162 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14283944 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/283944
Methods and systems for data traffic control and encryption May 20, 2014 Issued
Array ( [id] => 14096057 [patent_doc_number] => 10243953 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-03-26 [patent_title] => Systems and methods for secure resource access and network communication [patent_app_type] => utility [patent_app_number] => 14/282616 [patent_app_country] => US [patent_app_date] => 2014-05-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 10241 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 345 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14282616 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/282616
Systems and methods for secure resource access and network communication May 19, 2014 Issued
Array ( [id] => 10772979 [patent_doc_number] => 20160119136 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-04-28 [patent_title] => 'CRYPTOGRAPHIC DEVICE AND SECRET KEY PROTECTION METHOD' [patent_app_type] => utility [patent_app_number] => 14/278318 [patent_app_country] => US [patent_app_date] => 2014-05-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 4450 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14278318 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/278318
Cryptographic device and secret key protection method May 14, 2014 Issued
Array ( [id] => 12576411 [patent_doc_number] => 10021077 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-07-10 [patent_title] => System and method for distributing and using signed send tokens [patent_app_type] => utility [patent_app_number] => 14/275178 [patent_app_country] => US [patent_app_date] => 2014-05-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4883 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 157 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14275178 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/275178
System and method for distributing and using signed send tokens May 11, 2014 Issued
Array ( [id] => 10773206 [patent_doc_number] => 20160119362 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-04-28 [patent_title] => 'DATA PROCESSING SYSTEM, METHOD OF INITIALIZING A DATA PROCESSING SYSTEM, AND COMPUTER PROGRAM PRODUCT' [patent_app_type] => utility [patent_app_number] => 14/275722 [patent_app_country] => US [patent_app_date] => 2014-05-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3672 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14275722 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/275722
DATA PROCESSING SYSTEM, METHOD OF INITIALIZING A DATA PROCESSING SYSTEM, AND COMPUTER PROGRAM PRODUCT May 11, 2014 Abandoned
Array ( [id] => 10773137 [patent_doc_number] => 20160119293 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-04-28 [patent_title] => 'System and Method for Authenticating and Encrypting Data Transmitted To and From the Devices and Cloud Servers' [patent_app_type] => utility [patent_app_number] => 14/273536 [patent_app_country] => US [patent_app_date] => 2014-05-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 3287 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14273536 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/273536
System and Method for Authenticating and Encrypting Data Transmitted To and From the Devices and Cloud Servers May 7, 2014 Abandoned
Array ( [id] => 13273153 [patent_doc_number] => 10148669 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-12-04 [patent_title] => Out-of-band encryption key management system [patent_app_type] => utility [patent_app_number] => 14/271992 [patent_app_country] => US [patent_app_date] => 2014-05-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5550 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 256 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14271992 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/271992
Out-of-band encryption key management system May 6, 2014 Issued
Array ( [id] => 11897344 [patent_doc_number] => 09767281 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-09-19 [patent_title] => 'Device and method for processing data' [patent_app_type] => utility [patent_app_number] => 14/224464 [patent_app_country] => US [patent_app_date] => 2014-03-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 11 [patent_no_of_words] => 9476 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 128 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14224464 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/224464
Device and method for processing data Mar 24, 2014 Issued
Array ( [id] => 10386189 [patent_doc_number] => 20150271196 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-24 [patent_title] => 'COMPARING SOURCE AND SINK VALUES IN SECURITY ANALYSIS' [patent_app_type] => utility [patent_app_number] => 14/220324 [patent_app_country] => US [patent_app_date] => 2014-03-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3109 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14220324 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/220324
COMPARING SOURCE AND SINK VALUES IN SECURITY ANALYSIS Mar 19, 2014 Abandoned
Array ( [id] => 9759123 [patent_doc_number] => 20140289824 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-09-25 [patent_title] => 'SHARING AUTHENTICATION PROFILES BETWEEN A GROUP OF USER DEVICES' [patent_app_type] => utility [patent_app_number] => 14/221189 [patent_app_country] => US [patent_app_date] => 2014-03-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 7393 [patent_no_of_claims] => 42 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14221189 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/221189
Sharing authentication profiles between a group of user devices Mar 19, 2014 Issued
Array ( [id] => 10386193 [patent_doc_number] => 20150271200 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-24 [patent_title] => 'TECHNIQUES TO PROVIDE NETWORK SECURITY THROUGH JUST-IN-TIME PROVISIONED ACCOUNTS' [patent_app_type] => utility [patent_app_number] => 14/220486 [patent_app_country] => US [patent_app_date] => 2014-03-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 16908 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14220486 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/220486
Techniques to provide network security through just-in-time provisioned accounts Mar 19, 2014 Issued
Array ( [id] => 11368011 [patent_doc_number] => 20170005993 [patent_country] => US [patent_kind] => A9 [patent_issue_date] => 2017-01-05 [patent_title] => 'CONTENT ACCESS DEVICE WITH PROGRAMMABLE INTERFACE AND METHODS FOR USE THEREWITH' [patent_app_type] => utility [patent_app_number] => 14/217757 [patent_app_country] => US [patent_app_date] => 2014-03-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3996 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14217757 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/217757
CONTENT ACCESS DEVICE WITH PROGRAMMABLE INTERFACE AND METHODS FOR USE THEREWITH Mar 17, 2014 Abandoned
Array ( [id] => 11905125 [patent_doc_number] => 09774576 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-09-26 [patent_title] => 'Authentication by use of symmetric and asymmetric cryptography' [patent_app_type] => utility [patent_app_number] => 14/217807 [patent_app_country] => US [patent_app_date] => 2014-03-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 4536 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 264 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14217807 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/217807
Authentication by use of symmetric and asymmetric cryptography Mar 17, 2014 Issued
Menu