
Traci Casler
Examiner (ID: 16003)
| Most Active Art Unit | 3629 |
| Art Unit(s) | 3629, OPQA, 6217 |
| Total Applications | 325 |
| Issued Applications | 65 |
| Pending Applications | 12 |
| Abandoned Applications | 248 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 108294
[patent_doc_number] => 07725927
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-05-25
[patent_title] => 'Low code-footprint security solution'
[patent_app_type] => utility
[patent_app_number] => 11/262194
[patent_app_country] => US
[patent_app_date] => 2005-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 5650
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/725/07725927.pdf
[firstpage_image] =>[orig_patent_app_number] => 11262194
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/262194 | Low code-footprint security solution | Oct 27, 2005 | Issued |
Array
(
[id] => 5604231
[patent_doc_number] => 20060294578
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-12-28
[patent_title] => 'Unified authorization for heterogeneous applications'
[patent_app_type] => utility
[patent_app_number] => 11/262273
[patent_app_country] => US
[patent_app_date] => 2005-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 16207
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0294/20060294578.pdf
[firstpage_image] =>[orig_patent_app_number] => 11262273
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/262273 | Unified authorization for heterogeneous applications | Oct 27, 2005 | Issued |
Array
(
[id] => 106007
[patent_doc_number] => 07724906
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-05-25
[patent_title] => 'Decryption apparatus and decryption method'
[patent_app_type] => utility
[patent_app_number] => 11/219768
[patent_app_country] => US
[patent_app_date] => 2005-09-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 28
[patent_no_of_words] => 15728
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 322
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/724/07724906.pdf
[firstpage_image] =>[orig_patent_app_number] => 11219768
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/219768 | Decryption apparatus and decryption method | Sep 6, 2005 | Issued |
Array
(
[id] => 4612540
[patent_doc_number] => 07995755
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-08-09
[patent_title] => 'Method for management of access means to conditional access data'
[patent_app_type] => utility
[patent_app_number] => 11/218605
[patent_app_country] => US
[patent_app_date] => 2005-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3034
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/995/07995755.pdf
[firstpage_image] =>[orig_patent_app_number] => 11218605
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/218605 | Method for management of access means to conditional access data | Sep 5, 2005 | Issued |
Array
(
[id] => 5182168
[patent_doc_number] => 20070053512
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-03-08
[patent_title] => 'Method and apparatus for improving security in a voice over internet protocol session'
[patent_app_type] => utility
[patent_app_number] => 11/218675
[patent_app_country] => US
[patent_app_date] => 2005-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3003
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0053/20070053512.pdf
[firstpage_image] =>[orig_patent_app_number] => 11218675
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/218675 | Method and apparatus for improving security in a voice over internet protocol session | Sep 1, 2005 | Abandoned |
Array
(
[id] => 9190
[patent_doc_number] => 07814314
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-10-12
[patent_title] => 'Revocation of cryptographic digital certificates'
[patent_app_type] => utility
[patent_app_number] => 11/218093
[patent_app_country] => US
[patent_app_date] => 2005-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 31
[patent_no_of_words] => 15423
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/814/07814314.pdf
[firstpage_image] =>[orig_patent_app_number] => 11218093
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/218093 | Revocation of cryptographic digital certificates | Aug 30, 2005 | Issued |
Array
(
[id] => 5055890
[patent_doc_number] => 20070058812
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-03-15
[patent_title] => 'Enforcing time-based transaction policies on devices lacking independent clocks'
[patent_app_type] => utility
[patent_app_number] => 11/216363
[patent_app_country] => US
[patent_app_date] => 2005-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9588
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0058/20070058812.pdf
[firstpage_image] =>[orig_patent_app_number] => 11216363
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/216363 | Enforcing time-based transaction policies on devices lacking independent clocks | Aug 30, 2005 | Issued |
Array
(
[id] => 5150788
[patent_doc_number] => 20070050848
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-03-01
[patent_title] => 'Preventing malware from accessing operating system services'
[patent_app_type] => utility
[patent_app_number] => 11/218042
[patent_app_country] => US
[patent_app_date] => 2005-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5704
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0050/20070050848.pdf
[firstpage_image] =>[orig_patent_app_number] => 11218042
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/218042 | Preventing malware from accessing operating system services | Aug 30, 2005 | Abandoned |
Array
(
[id] => 192945
[patent_doc_number] => 07644272
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-01-05
[patent_title] => 'Systems and methods for providing security to different functions'
[patent_app_type] => utility
[patent_app_number] => 11/216271
[patent_app_country] => US
[patent_app_date] => 2005-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 5774
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/644/07644272.pdf
[firstpage_image] =>[orig_patent_app_number] => 11216271
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/216271 | Systems and methods for providing security to different functions | Aug 29, 2005 | Issued |
Array
(
[id] => 4479323
[patent_doc_number] => 07945784
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2011-05-17
[patent_title] => 'Method and system to perform secret sharing'
[patent_app_type] => utility
[patent_app_number] => 11/207358
[patent_app_country] => US
[patent_app_date] => 2005-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3873
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/945/07945784.pdf
[firstpage_image] =>[orig_patent_app_number] => 11207358
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/207358 | Method and system to perform secret sharing | Aug 18, 2005 | Issued |
Array
(
[id] => 8149518
[patent_doc_number] => 08166538
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-04-24
[patent_title] => 'Unified architecture for remote network access'
[patent_app_type] => utility
[patent_app_number] => 11/178219
[patent_app_country] => US
[patent_app_date] => 2005-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5665
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 311
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/166/08166538.pdf
[firstpage_image] =>[orig_patent_app_number] => 11178219
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/178219 | Unified architecture for remote network access | Jul 7, 2005 | Issued |
Array
(
[id] => 5125060
[patent_doc_number] => 20070237331
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-10-11
[patent_title] => 'Method for Processing Contents Intended for Broadcasting'
[patent_app_type] => utility
[patent_app_number] => 11/578465
[patent_app_country] => US
[patent_app_date] => 2005-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2596
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0237/20070237331.pdf
[firstpage_image] =>[orig_patent_app_number] => 11578465
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/578465 | Method for processing contents intended for broadcasting | Apr 20, 2005 | Issued |
Array
(
[id] => 7536769
[patent_doc_number] => 08050409
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-11-01
[patent_title] => 'Threshold and identity-based key management and authentication for wireless ad hoc networks'
[patent_app_type] => utility
[patent_app_number] => 11/098250
[patent_app_country] => US
[patent_app_date] => 2005-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 2
[patent_no_of_words] => 4239
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 369
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/050/08050409.pdf
[firstpage_image] =>[orig_patent_app_number] => 11098250
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/098250 | Threshold and identity-based key management and authentication for wireless ad hoc networks | Apr 3, 2005 | Issued |
Array
(
[id] => 200883
[patent_doc_number] => 07640430
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-12-29
[patent_title] => 'System and method for achieving machine authentication without maintaining additional credentials'
[patent_app_type] => utility
[patent_app_number] => 11/098637
[patent_app_country] => US
[patent_app_date] => 2005-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 4347
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/640/07640430.pdf
[firstpage_image] =>[orig_patent_app_number] => 11098637
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/098637 | System and method for achieving machine authentication without maintaining additional credentials | Apr 3, 2005 | Issued |
Array
(
[id] => 4631873
[patent_doc_number] => 08010783
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2011-08-30
[patent_title] => 'Service provider invocation'
[patent_app_type] => utility
[patent_app_number] => 11/079709
[patent_app_country] => US
[patent_app_date] => 2005-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 19592
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/010/08010783.pdf
[firstpage_image] =>[orig_patent_app_number] => 11079709
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/079709 | Service provider invocation | Mar 13, 2005 | Issued |
Array
(
[id] => 4589903
[patent_doc_number] => 07831825
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-11-09
[patent_title] => 'Packet-based and pseudo-packet based cryptographic communications systems and methods'
[patent_app_type] => utility
[patent_app_number] => 11/076215
[patent_app_country] => US
[patent_app_date] => 2005-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 30
[patent_no_of_words] => 13271
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 227
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/831/07831825.pdf
[firstpage_image] =>[orig_patent_app_number] => 11076215
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/076215 | Packet-based and pseudo-packet based cryptographic communications systems and methods | Mar 8, 2005 | Issued |
Array
(
[id] => 4606374
[patent_doc_number] => 07987360
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-07-26
[patent_title] => 'Method for implementing grouping devices and interacting among grouped devices'
[patent_app_type] => utility
[patent_app_number] => 11/568443
[patent_app_country] => US
[patent_app_date] => 2005-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 7365
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/987/07987360.pdf
[firstpage_image] =>[orig_patent_app_number] => 11568443
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/568443 | Method for implementing grouping devices and interacting among grouped devices | Jan 20, 2005 | Issued |
Array
(
[id] => 4841839
[patent_doc_number] => 20080282325
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-11-13
[patent_title] => 'Aaa Support for Dhcp'
[patent_app_type] => utility
[patent_app_number] => 11/568013
[patent_app_country] => US
[patent_app_date] => 2004-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11269
[patent_no_of_claims] => 48
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0282/20080282325.pdf
[firstpage_image] =>[orig_patent_app_number] => 11568013
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/568013 | AAA support for DHCP | Dec 9, 2004 | Issued |
Array
(
[id] => 6988390
[patent_doc_number] => 20050087604
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-04-28
[patent_title] => 'Licensing and identification devices having coded marks and methods of making and authenticating such licensing and identification devices'
[patent_app_type] => utility
[patent_app_number] => 10/972942
[patent_app_country] => US
[patent_app_date] => 2004-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5725
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0087/20050087604.pdf
[firstpage_image] =>[orig_patent_app_number] => 10972942
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/972942 | Licensing and identification devices having coded marks and methods of making and authenticating such licensing and identification devices | Oct 24, 2004 | Abandoned |
Array
(
[id] => 5816763
[patent_doc_number] => 20060085854
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-04-20
[patent_title] => 'Method and system for detecting intrusive anomalous use of a software system using multiple detection algorithms'
[patent_app_type] => utility
[patent_app_number] => 10/967945
[patent_app_country] => US
[patent_app_date] => 2004-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7206
[patent_no_of_claims] => 38
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0085/20060085854.pdf
[firstpage_image] =>[orig_patent_app_number] => 10967945
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/967945 | Method and system for detecting intrusive anomalous use of a software system using multiple detection algorithms | Oct 18, 2004 | Issued |