
Yogesh Paliwal
Examiner (ID: 3968)
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435, 2135 |
| Total Applications | 943 |
| Issued Applications | 736 |
| Pending Applications | 70 |
| Abandoned Applications | 155 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14162453
[patent_doc_number] => 20190108329
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-11
[patent_title] => Method and Terminal for Enhancing Information Security
[patent_app_type] => utility
[patent_app_number] => 16/213148
[patent_app_country] => US
[patent_app_date] => 2018-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5902
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 79
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16213148
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/213148 | Method and terminal for enhancing information security | Dec 6, 2018 | Issued |
Array
(
[id] => 16820964
[patent_doc_number] => 11005816
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-11
[patent_title] => Adaptive and dynamic network provisioning
[patent_app_type] => utility
[patent_app_number] => 16/208982
[patent_app_country] => US
[patent_app_date] => 2018-12-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7009
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16208982
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/208982 | Adaptive and dynamic network provisioning | Dec 3, 2018 | Issued |
Array
(
[id] => 16821028
[patent_doc_number] => 11005881
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-11
[patent_title] => Anti-phishing
[patent_app_type] => utility
[patent_app_number] => 16/204135
[patent_app_country] => US
[patent_app_date] => 2018-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 38
[patent_figures_cnt] => 41
[patent_no_of_words] => 21485
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16204135
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/204135 | Anti-phishing | Nov 28, 2018 | Issued |
Array
(
[id] => 15809665
[patent_doc_number] => 20200127975
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-23
[patent_title] => CLOUD COMPUTING ARCHITECTURE WITH SECURE MULTI-CLOUD INTEGRATION
[patent_app_type] => utility
[patent_app_number] => 16/198928
[patent_app_country] => US
[patent_app_date] => 2018-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4810
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16198928
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/198928 | Cloud computing architecture with secure multi-cloud integration | Nov 22, 2018 | Issued |
Array
(
[id] => 15941641
[patent_doc_number] => 20200162454
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-21
[patent_title] => SELF-FEDERATION IN AUTHENTICATION SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 16/198249
[patent_app_country] => US
[patent_app_date] => 2018-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14784
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16198249
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/198249 | Self-federation in authentication systems | Nov 20, 2018 | Issued |
Array
(
[id] => 14051689
[patent_doc_number] => 20190081952
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-14
[patent_title] => System and Method for Blocking of DNS Tunnels
[patent_app_type] => utility
[patent_app_number] => 16/189763
[patent_app_country] => US
[patent_app_date] => 2018-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13336
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16189763
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/189763 | System and Method for Blocking of DNS Tunnels | Nov 12, 2018 | Abandoned |
Array
(
[id] => 15837869
[patent_doc_number] => 20200134217
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-30
[patent_title] => DATABASE SYSTEM CONSENSUS-BASED ACCESS CONTROL
[patent_app_type] => utility
[patent_app_number] => 16/174171
[patent_app_country] => US
[patent_app_date] => 2018-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11694
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16174171
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/174171 | Database system consensus-based access control | Oct 28, 2018 | Issued |
Array
(
[id] => 17108384
[patent_doc_number] => 11128616
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-21
[patent_title] => Proximity based security
[patent_app_type] => utility
[patent_app_number] => 16/162268
[patent_app_country] => US
[patent_app_date] => 2018-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4636
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16162268
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/162268 | Proximity based security | Oct 15, 2018 | Issued |
Array
(
[id] => 16065743
[patent_doc_number] => 10691823
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-23
[patent_title] => Method and system to prevent ultrasound data leaks in mobile devices
[patent_app_type] => utility
[patent_app_number] => 16/158023
[patent_app_country] => US
[patent_app_date] => 2018-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3492
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16158023
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/158023 | Method and system to prevent ultrasound data leaks in mobile devices | Oct 10, 2018 | Issued |
Array
(
[id] => 13911513
[patent_doc_number] => 20190044961
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-07
[patent_title] => SYSTEM AND METHODS FOR COMPUTER NETWORK SECURITY INVOLVING USER CONFIRMATION OF NETWORK CONNECTIONS
[patent_app_type] => utility
[patent_app_number] => 16/153113
[patent_app_country] => US
[patent_app_date] => 2018-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12101
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16153113
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/153113 | SYSTEM AND METHODS FOR COMPUTER NETWORK SECURITY INVOLVING USER CONFIRMATION OF NETWORK CONNECTIONS | Oct 4, 2018 | Abandoned |
Array
(
[id] => 16866863
[patent_doc_number] => 11025629
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-01
[patent_title] => Secure component-based web applications
[patent_app_type] => utility
[patent_app_number] => 16/151625
[patent_app_country] => US
[patent_app_date] => 2018-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 16027
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16151625
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/151625 | Secure component-based web applications | Oct 3, 2018 | Issued |
Array
(
[id] => 13881243
[patent_doc_number] => 20190036962
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-31
[patent_title] => IDENTIFYING AND REMEDIATING MALWARE-COMPROMISED DEVICES
[patent_app_type] => utility
[patent_app_number] => 16/151558
[patent_app_country] => US
[patent_app_date] => 2018-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7180
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16151558
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/151558 | Identifying and remediating malware-compromised devices | Oct 3, 2018 | Issued |
Array
(
[id] => 16286833
[patent_doc_number] => 20200280435
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-03
[patent_title] => Secure Authentication in a 5G Communication Network in Non-3GPP Access
[patent_app_type] => utility
[patent_app_number] => 16/759966
[patent_app_country] => US
[patent_app_date] => 2018-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6348
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16759966
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/759966 | Secure Authentication in a 5G Communication Network in Non-3GPP Access | Oct 2, 2018 | Abandoned |
Array
(
[id] => 16195076
[patent_doc_number] => 20200235925
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-23
[patent_title] => ACCESS TO SECURED INFORMATION
[patent_app_type] => utility
[patent_app_number] => 16/652340
[patent_app_country] => US
[patent_app_date] => 2018-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10858
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16652340
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/652340 | Access to secured information | Sep 30, 2018 | Issued |
Array
(
[id] => 16447880
[patent_doc_number] => 10839811
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-17
[patent_title] => System, device and method for enforcing privacy during a communication session with a voice assistant
[patent_app_type] => utility
[patent_app_number] => 16/144752
[patent_app_country] => US
[patent_app_date] => 2018-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 21175
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 293
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16144752
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/144752 | System, device and method for enforcing privacy during a communication session with a voice assistant | Sep 26, 2018 | Issued |
Array
(
[id] => 16554156
[patent_doc_number] => 10887339
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-01-05
[patent_title] => Systems and methods for protecting a cloud storage against suspected malware
[patent_app_type] => utility
[patent_app_number] => 16/142270
[patent_app_country] => US
[patent_app_date] => 2018-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8661
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16142270
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/142270 | Systems and methods for protecting a cloud storage against suspected malware | Sep 25, 2018 | Issued |
Array
(
[id] => 16836158
[patent_doc_number] => 11012423
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-18
[patent_title] => Maximizing resource utilization through efficient component communication in disaggregated datacenters
[patent_app_type] => utility
[patent_app_number] => 16/141851
[patent_app_country] => US
[patent_app_date] => 2018-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 22
[patent_no_of_words] => 14909
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16141851
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/141851 | Maximizing resource utilization through efficient component communication in disaggregated datacenters | Sep 24, 2018 | Issued |
Array
(
[id] => 16654489
[patent_doc_number] => 10931690
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-02-23
[patent_title] => Thwarting potentially malicious online activity
[patent_app_type] => utility
[patent_app_number] => 16/127164
[patent_app_country] => US
[patent_app_date] => 2018-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6260
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16127164
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/127164 | Thwarting potentially malicious online activity | Sep 9, 2018 | Issued |
Array
(
[id] => 16552006
[patent_doc_number] => 10885167
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-01-05
[patent_title] => Intrusion detection based on anomalies in access patterns
[patent_app_type] => utility
[patent_app_number] => 16/119339
[patent_app_country] => US
[patent_app_date] => 2018-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 12143
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16119339
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/119339 | Intrusion detection based on anomalies in access patterns | Aug 30, 2018 | Issued |
Array
(
[id] => 14384053
[patent_doc_number] => 20190165939
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-30
[patent_title] => TWO-STEP CENTRAL MATCHING
[patent_app_type] => utility
[patent_app_number] => 16/117552
[patent_app_country] => US
[patent_app_date] => 2018-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7337
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16117552
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/117552 | Two-step central matching | Aug 29, 2018 | Issued |