Search

Traci Casler

Examiner (ID: 16003)

Most Active Art Unit
3629
Art Unit(s)
3629, OPQA, 6217
Total Applications
325
Issued Applications
65
Pending Applications
12
Abandoned Applications
248

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 108294 [patent_doc_number] => 07725927 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-05-25 [patent_title] => 'Low code-footprint security solution' [patent_app_type] => utility [patent_app_number] => 11/262194 [patent_app_country] => US [patent_app_date] => 2005-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 5650 [patent_no_of_claims] => 36 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 111 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/725/07725927.pdf [firstpage_image] =>[orig_patent_app_number] => 11262194 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/262194
Low code-footprint security solution Oct 27, 2005 Issued
Array ( [id] => 5604231 [patent_doc_number] => 20060294578 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-12-28 [patent_title] => 'Unified authorization for heterogeneous applications' [patent_app_type] => utility [patent_app_number] => 11/262273 [patent_app_country] => US [patent_app_date] => 2005-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 16207 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0294/20060294578.pdf [firstpage_image] =>[orig_patent_app_number] => 11262273 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/262273
Unified authorization for heterogeneous applications Oct 27, 2005 Issued
Array ( [id] => 106007 [patent_doc_number] => 07724906 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-05-25 [patent_title] => 'Decryption apparatus and decryption method' [patent_app_type] => utility [patent_app_number] => 11/219768 [patent_app_country] => US [patent_app_date] => 2005-09-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 28 [patent_no_of_words] => 15728 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 322 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/724/07724906.pdf [firstpage_image] =>[orig_patent_app_number] => 11219768 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/219768
Decryption apparatus and decryption method Sep 6, 2005 Issued
Array ( [id] => 4612540 [patent_doc_number] => 07995755 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-08-09 [patent_title] => 'Method for management of access means to conditional access data' [patent_app_type] => utility [patent_app_number] => 11/218605 [patent_app_country] => US [patent_app_date] => 2005-09-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3034 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 241 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/995/07995755.pdf [firstpage_image] =>[orig_patent_app_number] => 11218605 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/218605
Method for management of access means to conditional access data Sep 5, 2005 Issued
Array ( [id] => 5182168 [patent_doc_number] => 20070053512 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-03-08 [patent_title] => 'Method and apparatus for improving security in a voice over internet protocol session' [patent_app_type] => utility [patent_app_number] => 11/218675 [patent_app_country] => US [patent_app_date] => 2005-09-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3003 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0053/20070053512.pdf [firstpage_image] =>[orig_patent_app_number] => 11218675 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/218675
Method and apparatus for improving security in a voice over internet protocol session Sep 1, 2005 Abandoned
Array ( [id] => 9190 [patent_doc_number] => 07814314 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-10-12 [patent_title] => 'Revocation of cryptographic digital certificates' [patent_app_type] => utility [patent_app_number] => 11/218093 [patent_app_country] => US [patent_app_date] => 2005-08-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 31 [patent_no_of_words] => 15423 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 215 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/814/07814314.pdf [firstpage_image] =>[orig_patent_app_number] => 11218093 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/218093
Revocation of cryptographic digital certificates Aug 30, 2005 Issued
Array ( [id] => 5055890 [patent_doc_number] => 20070058812 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-03-15 [patent_title] => 'Enforcing time-based transaction policies on devices lacking independent clocks' [patent_app_type] => utility [patent_app_number] => 11/216363 [patent_app_country] => US [patent_app_date] => 2005-08-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 9588 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0058/20070058812.pdf [firstpage_image] =>[orig_patent_app_number] => 11216363 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/216363
Enforcing time-based transaction policies on devices lacking independent clocks Aug 30, 2005 Issued
Array ( [id] => 5150788 [patent_doc_number] => 20070050848 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-03-01 [patent_title] => 'Preventing malware from accessing operating system services' [patent_app_type] => utility [patent_app_number] => 11/218042 [patent_app_country] => US [patent_app_date] => 2005-08-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5704 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0050/20070050848.pdf [firstpage_image] =>[orig_patent_app_number] => 11218042 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/218042
Preventing malware from accessing operating system services Aug 30, 2005 Abandoned
Array ( [id] => 192945 [patent_doc_number] => 07644272 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-01-05 [patent_title] => 'Systems and methods for providing security to different functions' [patent_app_type] => utility [patent_app_number] => 11/216271 [patent_app_country] => US [patent_app_date] => 2005-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 14 [patent_no_of_words] => 5774 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 100 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/644/07644272.pdf [firstpage_image] =>[orig_patent_app_number] => 11216271 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/216271
Systems and methods for providing security to different functions Aug 29, 2005 Issued
Array ( [id] => 4479323 [patent_doc_number] => 07945784 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2011-05-17 [patent_title] => 'Method and system to perform secret sharing' [patent_app_type] => utility [patent_app_number] => 11/207358 [patent_app_country] => US [patent_app_date] => 2005-08-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 3873 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 122 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/945/07945784.pdf [firstpage_image] =>[orig_patent_app_number] => 11207358 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/207358
Method and system to perform secret sharing Aug 18, 2005 Issued
Array ( [id] => 8149518 [patent_doc_number] => 08166538 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-04-24 [patent_title] => 'Unified architecture for remote network access' [patent_app_type] => utility [patent_app_number] => 11/178219 [patent_app_country] => US [patent_app_date] => 2005-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5665 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 311 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/166/08166538.pdf [firstpage_image] =>[orig_patent_app_number] => 11178219 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/178219
Unified architecture for remote network access Jul 7, 2005 Issued
Array ( [id] => 5125060 [patent_doc_number] => 20070237331 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-10-11 [patent_title] => 'Method for Processing Contents Intended for Broadcasting' [patent_app_type] => utility [patent_app_number] => 11/578465 [patent_app_country] => US [patent_app_date] => 2005-04-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2596 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0237/20070237331.pdf [firstpage_image] =>[orig_patent_app_number] => 11578465 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/578465
Method for processing contents intended for broadcasting Apr 20, 2005 Issued
Array ( [id] => 7536769 [patent_doc_number] => 08050409 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-11-01 [patent_title] => 'Threshold and identity-based key management and authentication for wireless ad hoc networks' [patent_app_type] => utility [patent_app_number] => 11/098250 [patent_app_country] => US [patent_app_date] => 2005-04-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 2 [patent_no_of_words] => 4239 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 369 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/050/08050409.pdf [firstpage_image] =>[orig_patent_app_number] => 11098250 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/098250
Threshold and identity-based key management and authentication for wireless ad hoc networks Apr 3, 2005 Issued
Array ( [id] => 200883 [patent_doc_number] => 07640430 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2009-12-29 [patent_title] => 'System and method for achieving machine authentication without maintaining additional credentials' [patent_app_type] => utility [patent_app_number] => 11/098637 [patent_app_country] => US [patent_app_date] => 2005-04-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 4347 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 155 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/640/07640430.pdf [firstpage_image] =>[orig_patent_app_number] => 11098637 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/098637
System and method for achieving machine authentication without maintaining additional credentials Apr 3, 2005 Issued
Array ( [id] => 4631873 [patent_doc_number] => 08010783 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2011-08-30 [patent_title] => 'Service provider invocation' [patent_app_type] => utility [patent_app_number] => 11/079709 [patent_app_country] => US [patent_app_date] => 2005-03-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 19592 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 150 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/010/08010783.pdf [firstpage_image] =>[orig_patent_app_number] => 11079709 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/079709
Service provider invocation Mar 13, 2005 Issued
Array ( [id] => 4589903 [patent_doc_number] => 07831825 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-11-09 [patent_title] => 'Packet-based and pseudo-packet based cryptographic communications systems and methods' [patent_app_type] => utility [patent_app_number] => 11/076215 [patent_app_country] => US [patent_app_date] => 2005-03-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 30 [patent_no_of_words] => 13271 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 227 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/831/07831825.pdf [firstpage_image] =>[orig_patent_app_number] => 11076215 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/076215
Packet-based and pseudo-packet based cryptographic communications systems and methods Mar 8, 2005 Issued
Array ( [id] => 4606374 [patent_doc_number] => 07987360 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-07-26 [patent_title] => 'Method for implementing grouping devices and interacting among grouped devices' [patent_app_type] => utility [patent_app_number] => 11/568443 [patent_app_country] => US [patent_app_date] => 2005-01-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 9 [patent_no_of_words] => 7365 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 256 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/987/07987360.pdf [firstpage_image] =>[orig_patent_app_number] => 11568443 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/568443
Method for implementing grouping devices and interacting among grouped devices Jan 20, 2005 Issued
Array ( [id] => 4841839 [patent_doc_number] => 20080282325 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-11-13 [patent_title] => 'Aaa Support for Dhcp' [patent_app_type] => utility [patent_app_number] => 11/568013 [patent_app_country] => US [patent_app_date] => 2004-12-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 11269 [patent_no_of_claims] => 48 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0282/20080282325.pdf [firstpage_image] =>[orig_patent_app_number] => 11568013 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/568013
AAA support for DHCP Dec 9, 2004 Issued
Array ( [id] => 6988390 [patent_doc_number] => 20050087604 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-04-28 [patent_title] => 'Licensing and identification devices having coded marks and methods of making and authenticating such licensing and identification devices' [patent_app_type] => utility [patent_app_number] => 10/972942 [patent_app_country] => US [patent_app_date] => 2004-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 5725 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0087/20050087604.pdf [firstpage_image] =>[orig_patent_app_number] => 10972942 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/972942
Licensing and identification devices having coded marks and methods of making and authenticating such licensing and identification devices Oct 24, 2004 Abandoned
Array ( [id] => 5816763 [patent_doc_number] => 20060085854 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-04-20 [patent_title] => 'Method and system for detecting intrusive anomalous use of a software system using multiple detection algorithms' [patent_app_type] => utility [patent_app_number] => 10/967945 [patent_app_country] => US [patent_app_date] => 2004-10-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7206 [patent_no_of_claims] => 38 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0085/20060085854.pdf [firstpage_image] =>[orig_patent_app_number] => 10967945 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/967945
Method and system for detecting intrusive anomalous use of a software system using multiple detection algorithms Oct 18, 2004 Issued
Menu