
Yogesh Paliwal
Examiner (ID: 3968)
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435, 2135 |
| Total Applications | 943 |
| Issued Applications | 736 |
| Pending Applications | 70 |
| Abandoned Applications | 155 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11753077
[patent_doc_number] => 09711095
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-18
[patent_title] => 'Electronic apparatus, security processing method and storage medium'
[patent_app_type] => utility
[patent_app_number] => 14/688154
[patent_app_country] => US
[patent_app_date] => 2015-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 3848
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 69
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14688154
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/688154 | Electronic apparatus, security processing method and storage medium | Apr 15, 2015 | Issued |
Array
(
[id] => 11563931
[patent_doc_number] => 09626521
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-18
[patent_title] => 'Physiological signal-based encryption and EHR management'
[patent_app_type] => utility
[patent_app_number] => 14/688181
[patent_app_country] => US
[patent_app_date] => 2015-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 17
[patent_no_of_words] => 6953
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14688181
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/688181 | Physiological signal-based encryption and EHR management | Apr 15, 2015 | Issued |
Array
(
[id] => 10419314
[patent_doc_number] => 20150304325
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-22
[patent_title] => 'METHOD, SYSTEM AND APPARATUS FOR GEO-VERIFICATION'
[patent_app_type] => utility
[patent_app_number] => 14/688569
[patent_app_country] => US
[patent_app_date] => 2015-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4912
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14688569
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/688569 | Method, system and apparatus for geo-verification | Apr 15, 2015 | Issued |
Array
(
[id] => 11095468
[patent_doc_number] => 20160292437
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'TECHNIQUE FOR DATA LOSS PREVENTION FOR A CLOUD SYNC APPLICATION'
[patent_app_type] => utility
[patent_app_number] => 14/688158
[patent_app_country] => US
[patent_app_date] => 2015-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5431
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14688158
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/688158 | Technique for data loss prevention for a cloud sync application | Apr 15, 2015 | Issued |
Array
(
[id] => 12971647
[patent_doc_number] => 09876807
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-23
[patent_title] => Network attack detection method
[patent_app_type] => utility
[patent_app_number] => 14/688554
[patent_app_country] => US
[patent_app_date] => 2015-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 29
[patent_no_of_words] => 8804
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 316
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14688554
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/688554 | Network attack detection method | Apr 15, 2015 | Issued |
Array
(
[id] => 11848398
[patent_doc_number] => 09735965
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-08-15
[patent_title] => 'Systems and methods for protecting notification messages'
[patent_app_type] => utility
[patent_app_number] => 14/687941
[patent_app_country] => US
[patent_app_date] => 2015-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9111
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14687941
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/687941 | Systems and methods for protecting notification messages | Apr 15, 2015 | Issued |
Array
(
[id] => 10328394
[patent_doc_number] => 20150213398
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-30
[patent_title] => 'ADDRESS EXCHANGE SYSTEMS AND METHODS'
[patent_app_type] => utility
[patent_app_number] => 14/681356
[patent_app_country] => US
[patent_app_date] => 2015-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6588
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14681356
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/681356 | Address exchange systems and methods | Apr 7, 2015 | Issued |
Array
(
[id] => 11404048
[patent_doc_number] => 20170024585
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-26
[patent_title] => 'SECURED ELECTRONICS DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/300936
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 31835
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 15
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15300936
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/300936 | SECURED ELECTRONICS DEVICE | Mar 30, 2015 | Abandoned |
Array
(
[id] => 10403704
[patent_doc_number] => 20150288714
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'Classifier Bypass Based On Message Sender Trust and Verification'
[patent_app_type] => utility
[patent_app_number] => 14/634726
[patent_app_country] => US
[patent_app_date] => 2015-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 42
[patent_figures_cnt] => 42
[patent_no_of_words] => 21828
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14634726
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/634726 | Method for computer security based on message and message sender | Feb 27, 2015 | Issued |
Array
(
[id] => 10403704
[patent_doc_number] => 20150288714
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'Classifier Bypass Based On Message Sender Trust and Verification'
[patent_app_type] => utility
[patent_app_number] => 14/634726
[patent_app_country] => US
[patent_app_date] => 2015-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 42
[patent_figures_cnt] => 42
[patent_no_of_words] => 21828
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14634726
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/634726 | Method for computer security based on message and message sender | Feb 27, 2015 | Issued |
Array
(
[id] => 10337614
[patent_doc_number] => 20150222620
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-06
[patent_title] => 'SYSTEM AND METHOD FOR PROVIDING APPLICATION SECURITY IN A CLOUD COMPUTING ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/610524
[patent_app_country] => US
[patent_app_date] => 2015-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 6421
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14610524
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/610524 | System and method for providing application security in a cloud computing environment | Jan 29, 2015 | Issued |
Array
(
[id] => 11228236
[patent_doc_number] => 09455964
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-27
[patent_title] => 'Guest WiFi authentication based on physical proximity'
[patent_app_type] => utility
[patent_app_number] => 14/611158
[patent_app_country] => US
[patent_app_date] => 2015-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5765
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14611158
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/611158 | Guest WiFi authentication based on physical proximity | Jan 29, 2015 | Issued |
Array
(
[id] => 10371518
[patent_doc_number] => 20150256525
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-10
[patent_title] => 'NETWORK SYSTEM, NETWORK DEVICE AND CONNECTION CONTROL METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/609489
[patent_app_country] => US
[patent_app_date] => 2015-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 11398
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14609489
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/609489 | Network system, network device and connection control method | Jan 29, 2015 | Issued |
Array
(
[id] => 11215799
[patent_doc_number] => 09444850
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-13
[patent_title] => 'Seeding of mobile application management policies'
[patent_app_type] => utility
[patent_app_number] => 14/610333
[patent_app_country] => US
[patent_app_date] => 2015-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 6886
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14610333
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/610333 | Seeding of mobile application management policies | Jan 29, 2015 | Issued |
Array
(
[id] => 11933546
[patent_doc_number] => 09800556
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-24
[patent_title] => 'Systems and methods for providing data security services'
[patent_app_type] => utility
[patent_app_number] => 14/610869
[patent_app_country] => US
[patent_app_date] => 2015-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11955
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14610869
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/610869 | Systems and methods for providing data security services | Jan 29, 2015 | Issued |
Array
(
[id] => 11781099
[patent_doc_number] => 09390283
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'Controlling access in a dispersed storage network'
[patent_app_type] => utility
[patent_app_number] => 14/610331
[patent_app_country] => US
[patent_app_date] => 2015-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 56
[patent_figures_cnt] => 63
[patent_no_of_words] => 41418
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 302
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14610331
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/610331 | Controlling access in a dispersed storage network | Jan 29, 2015 | Issued |
Array
(
[id] => 12951484
[patent_doc_number] => 09836623
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-12-05
[patent_title] => Anonymizing machine data events
[patent_app_type] => utility
[patent_app_number] => 14/611155
[patent_app_country] => US
[patent_app_date] => 2015-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 25
[patent_no_of_words] => 24208
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14611155
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/611155 | Anonymizing machine data events | Jan 29, 2015 | Issued |
Array
(
[id] => 11029907
[patent_doc_number] => 20160226863
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-04
[patent_title] => 'AUTHORITY TRUSTED SECURE SYSTEM COMPONENT'
[patent_app_type] => utility
[patent_app_number] => 14/610845
[patent_app_country] => US
[patent_app_date] => 2015-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4270
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14610845
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/610845 | Authority trusted secure system component | Jan 29, 2015 | Issued |
Array
(
[id] => 11260349
[patent_doc_number] => 09485267
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-01
[patent_title] => 'Anomalous behavior detection using radio frequency fingerprints and access credentials'
[patent_app_type] => utility
[patent_app_number] => 14/610659
[patent_app_country] => US
[patent_app_date] => 2015-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 20057
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14610659
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/610659 | Anomalous behavior detection using radio frequency fingerprints and access credentials | Jan 29, 2015 | Issued |
Array
(
[id] => 10410894
[patent_doc_number] => 20150295903
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-15
[patent_title] => 'Efficient Routing of Streams Encrypted Using Point-to-Point Authentication Protocol'
[patent_app_type] => utility
[patent_app_number] => 14/610855
[patent_app_country] => US
[patent_app_date] => 2015-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3511
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14610855
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/610855 | Efficient routing of streams encrypted using point-to-point authentication protocol | Jan 29, 2015 | Issued |