
Yogesh Paliwal
Examiner (ID: 5588, Phone: (571)270-1807 , Office: P/2435 )
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435, 2135 |
| Total Applications | 938 |
| Issued Applications | 734 |
| Pending Applications | 67 |
| Abandoned Applications | 155 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10710876
[patent_doc_number] => 20160057023
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-25
[patent_title] => 'INTERNET ACCESS AUTHORIZATION AND REGULATION SYSTEMS AND METHODS FOR CONTROLLED ENVIRONMENT OF AN INSTITUTIONAL FACILITY'
[patent_app_type] => utility
[patent_app_number] => 14/929609
[patent_app_country] => US
[patent_app_date] => 2015-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10104
[patent_no_of_claims] => 46
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14929609
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/929609 | Internet access authorization and regulation systems and methods for controlled environment of an institutional facility | Nov 1, 2015 | Issued |
Array
(
[id] => 10804252
[patent_doc_number] => 20160150409
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'Method of Access Point Connection'
[patent_app_type] => utility
[patent_app_number] => 14/929418
[patent_app_country] => US
[patent_app_date] => 2015-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 2067
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14929418
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/929418 | Method of Access Point Connection | Nov 1, 2015 | Abandoned |
Array
(
[id] => 12257863
[patent_doc_number] => 09930024
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-27
[patent_title] => 'Detecting social login security flaws using database query features'
[patent_app_type] => utility
[patent_app_number] => 14/929820
[patent_app_country] => US
[patent_app_date] => 2015-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8524
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14929820
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/929820 | Detecting social login security flaws using database query features | Nov 1, 2015 | Issued |
Array
(
[id] => 12103147
[patent_doc_number] => 09860256
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-02
[patent_title] => 'Geofencing of data in a cloud-based environment'
[patent_app_type] => utility
[patent_app_number] => 14/929920
[patent_app_country] => US
[patent_app_date] => 2015-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 6270
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14929920
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/929920 | Geofencing of data in a cloud-based environment | Nov 1, 2015 | Issued |
Array
(
[id] => 10994617
[patent_doc_number] => 20160191563
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-30
[patent_title] => 'SYSTEM FOR DETECTING THREATS USING SCENARIO-BASED TRACKING OF INTERNAL AND EXTERNAL NETWORK TRAFFIC'
[patent_app_type] => utility
[patent_app_number] => 14/930618
[patent_app_country] => US
[patent_app_date] => 2015-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5686
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14930618
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/930618 | System for detecting threats using scenario-based tracking of internal and external network traffic | Nov 1, 2015 | Issued |
Array
(
[id] => 13021245
[patent_doc_number] => 10033752
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-24
[patent_title] => System for implementing threat detection using daily network traffic community outliers
[patent_app_type] => utility
[patent_app_number] => 14/930583
[patent_app_country] => US
[patent_app_date] => 2015-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 4988
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14930583
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/930583 | System for implementing threat detection using daily network traffic community outliers | Nov 1, 2015 | Issued |
Array
(
[id] => 10994604
[patent_doc_number] => 20160191550
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-30
[patent_title] => 'MICROVISOR-BASED MALWARE DETECTION ENDPOINT ARCHITECTURE'
[patent_app_type] => utility
[patent_app_number] => 14/929821
[patent_app_country] => US
[patent_app_date] => 2015-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9543
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14929821
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/929821 | MICROVISOR-BASED MALWARE DETECTION ENDPOINT ARCHITECTURE | Nov 1, 2015 | Abandoned |
Array
(
[id] => 11186847
[patent_doc_number] => 09418251
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-16
[patent_title] => 'Mesh grid protection system'
[patent_app_type] => utility
[patent_app_number] => 14/869342
[patent_app_country] => US
[patent_app_date] => 2015-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 16
[patent_no_of_words] => 5605
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14869342
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/869342 | Mesh grid protection system | Sep 28, 2015 | Issued |
Array
(
[id] => 10666113
[patent_doc_number] => 20160012257
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-14
[patent_title] => 'System, Method and Computer Program Product for Tamper Protection in a Data Storage System'
[patent_app_type] => utility
[patent_app_number] => 14/861879
[patent_app_country] => US
[patent_app_date] => 2015-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 19634
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14861879
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/861879 | System, Method and Computer Program Product for Tamper Protection in a Data Storage System | Sep 21, 2015 | Abandoned |
Array
(
[id] => 10667797
[patent_doc_number] => 20160013942
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-14
[patent_title] => 'Identity Verification Using Key Pairs'
[patent_app_type] => utility
[patent_app_number] => 14/861104
[patent_app_country] => US
[patent_app_date] => 2015-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2764
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14861104
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/861104 | Identity verification using key pairs | Sep 21, 2015 | Issued |
Array
(
[id] => 11287893
[patent_doc_number] => 09503764
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-11-22
[patent_title] => 'Processing and/or distributing media content associated with at least one parameter related to a memory operation'
[patent_app_type] => utility
[patent_app_number] => 14/857208
[patent_app_country] => US
[patent_app_date] => 2015-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 14543
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14857208
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/857208 | Processing and/or distributing media content associated with at least one parameter related to a memory operation | Sep 16, 2015 | Issued |
Array
(
[id] => 12971563
[patent_doc_number] => 09876779
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-23
[patent_title] => Document verification with distributed calendar infrastructure
[patent_app_type] => utility
[patent_app_number] => 14/842761
[patent_app_country] => US
[patent_app_date] => 2015-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 18
[patent_no_of_words] => 12430
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 340
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14842761
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/842761 | Document verification with distributed calendar infrastructure | Aug 31, 2015 | Issued |
Array
(
[id] => 13161223
[patent_doc_number] => 10097349
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-09
[patent_title] => Systems and methods for protecting symmetric encryption keys
[patent_app_type] => utility
[patent_app_number] => 14/827004
[patent_app_country] => US
[patent_app_date] => 2015-08-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6002
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14827004
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/827004 | Systems and methods for protecting symmetric encryption keys | Aug 13, 2015 | Issued |
Array
(
[id] => 10994575
[patent_doc_number] => 20160191521
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-30
[patent_title] => 'INTROSPECTION METHOD AND APPARATUS FOR NETWORK ACCESS FILTERING'
[patent_app_type] => utility
[patent_app_number] => 14/814413
[patent_app_country] => US
[patent_app_date] => 2015-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11164
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14814413
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/814413 | Introspection method and apparatus for network access filtering | Jul 29, 2015 | Issued |
Array
(
[id] => 11424003
[patent_doc_number] => 20170032147
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-02
[patent_title] => 'OBSCURING USER WEB USAGE PATTERNS'
[patent_app_type] => utility
[patent_app_number] => 14/814084
[patent_app_country] => US
[patent_app_date] => 2015-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10978
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14814084
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/814084 | Obscuring user web usage patterns | Jul 29, 2015 | Issued |
Array
(
[id] => 11638994
[patent_doc_number] => 09660987
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-23
[patent_title] => 'Storage isolation using I/O authentication'
[patent_app_type] => utility
[patent_app_number] => 14/814354
[patent_app_country] => US
[patent_app_date] => 2015-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6726
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14814354
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/814354 | Storage isolation using I/O authentication | Jul 29, 2015 | Issued |
Array
(
[id] => 11661164
[patent_doc_number] => 09674186
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-06
[patent_title] => 'Managing private and public service set utilization'
[patent_app_type] => utility
[patent_app_number] => 14/813534
[patent_app_country] => US
[patent_app_date] => 2015-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5618
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14813534
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/813534 | Managing private and public service set utilization | Jul 29, 2015 | Issued |
Array
(
[id] => 10819277
[patent_doc_number] => 20160165441
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-09
[patent_title] => 'ELECTRONIC DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/814479
[patent_app_country] => US
[patent_app_date] => 2015-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3696
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14814479
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/814479 | Electronic device | Jul 29, 2015 | Issued |
Array
(
[id] => 11424006
[patent_doc_number] => 20170032150
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-02
[patent_title] => 'EVENT-BASED DISPLAY INFORMATION PROTECTION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/814006
[patent_app_country] => US
[patent_app_date] => 2015-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 10966
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14814006
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/814006 | Event-based display information protection system | Jul 29, 2015 | Issued |
Array
(
[id] => 13122645
[patent_doc_number] => 10079686
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-18
[patent_title] => Privacy-preserving attribute-based credentials
[patent_app_type] => utility
[patent_app_number] => 14/811882
[patent_app_country] => US
[patent_app_date] => 2015-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13057
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14811882
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/811882 | Privacy-preserving attribute-based credentials | Jul 28, 2015 | Issued |