
Yogesh Paliwal
Examiner (ID: 3968)
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435, 2135 |
| Total Applications | 943 |
| Issued Applications | 736 |
| Pending Applications | 70 |
| Abandoned Applications | 155 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10015283
[patent_doc_number] => 09058297
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-16
[patent_title] => 'Device with privileged memory and applications thereof'
[patent_app_type] => utility
[patent_app_number] => 14/295479
[patent_app_country] => US
[patent_app_date] => 2014-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 16
[patent_no_of_words] => 7463
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14295479
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/295479 | Device with privileged memory and applications thereof | Jun 3, 2014 | Issued |
Array
(
[id] => 11247478
[patent_doc_number] => 09473534
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-18
[patent_title] => 'System and method for switching between messaging security policies'
[patent_app_type] => utility
[patent_app_number] => 14/293783
[patent_app_country] => US
[patent_app_date] => 2014-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 29
[patent_no_of_words] => 10166
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 56
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14293783
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/293783 | System and method for switching between messaging security policies | Jun 1, 2014 | Issued |
Array
(
[id] => 10464935
[patent_doc_number] => 20150349951
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'Protecting Cryptographic Operations Using Conjugacy Class Functions'
[patent_app_type] => utility
[patent_app_number] => 14/291591
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12560
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291591
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/291591 | Protecting cryptographic operations using conjugacy class functions | May 29, 2014 | Issued |
Array
(
[id] => 11777087
[patent_doc_number] => 09386078
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-05
[patent_title] => 'Controlling application programming interface transactions based on content of earlier transactions'
[patent_app_type] => utility
[patent_app_number] => 14/291598
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 10681
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291598
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/291598 | Controlling application programming interface transactions based on content of earlier transactions | May 29, 2014 | Issued |
Array
(
[id] => 10465155
[patent_doc_number] => 20150350170
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'Secure authentication of mobile users with no connectivity between authentication service and requesting entity'
[patent_app_type] => utility
[patent_app_number] => 14/291456
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3783
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291456
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/291456 | Secure authentication of mobile users with no connectivity between authentication service and requesting entity | May 29, 2014 | Abandoned |
Array
(
[id] => 12197022
[patent_doc_number] => 09900774
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-20
[patent_title] => 'Shared network connection credentials on check-in at a user\'s home location'
[patent_app_type] => utility
[patent_app_number] => 14/292298
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9688
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292298
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/292298 | Shared network connection credentials on check-in at a user's home location | May 29, 2014 | Issued |
Array
(
[id] => 10501703
[patent_doc_number] => 09230104
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-05
[patent_title] => 'Distributed voting mechanism for attack detection'
[patent_app_type] => utility
[patent_app_number] => 14/273676
[patent_app_country] => US
[patent_app_date] => 2014-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 9896
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14273676
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/273676 | Distributed voting mechanism for attack detection | May 8, 2014 | Issued |
Array
(
[id] => 10584793
[patent_doc_number] => 09306929
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-05
[patent_title] => 'Vertical social network'
[patent_app_type] => utility
[patent_app_number] => 14/274164
[patent_app_country] => US
[patent_app_date] => 2014-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 7856
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14274164
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/274164 | Vertical social network | May 8, 2014 | Issued |
Array
(
[id] => 11233079
[patent_doc_number] => 09460308
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-04
[patent_title] => 'Multi-level privacy evaluation'
[patent_app_type] => utility
[patent_app_number] => 14/274460
[patent_app_country] => US
[patent_app_date] => 2014-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 17
[patent_no_of_words] => 11813
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14274460
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/274460 | Multi-level privacy evaluation | May 8, 2014 | Issued |
Array
(
[id] => 9688640
[patent_doc_number] => 20140245405
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-28
[patent_title] => 'METHOD FOR TRANSFERRING AUTHORIZATION INFORMATION, RELAY DEVICE, AND SERVER'
[patent_app_type] => utility
[patent_app_number] => 14/272217
[patent_app_country] => US
[patent_app_date] => 2014-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5565
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14272217
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/272217 | Method for transferring authorization information, relay device, and server | May 6, 2014 | Issued |
Array
(
[id] => 10610215
[patent_doc_number] => 09330250
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-03
[patent_title] => 'Authorization of media content transfer between home media server and client device'
[patent_app_type] => utility
[patent_app_number] => 14/272426
[patent_app_country] => US
[patent_app_date] => 2014-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6884
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14272426
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/272426 | Authorization of media content transfer between home media server and client device | May 6, 2014 | Issued |
Array
(
[id] => 11322250
[patent_doc_number] => 09521002
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-12-13
[patent_title] => 'Method for copy-protected storage of information on a data carrier'
[patent_app_type] => utility
[patent_app_number] => 14/271636
[patent_app_country] => US
[patent_app_date] => 2014-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 2789
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14271636
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/271636 | Method for copy-protected storage of information on a data carrier | May 6, 2014 | Issued |
Array
(
[id] => 10934936
[patent_doc_number] => 20140337957
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-13
[patent_title] => 'OUT-OF-BAND AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/272487
[patent_app_country] => US
[patent_app_date] => 2014-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7372
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14272487
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/272487 | OUT-OF-BAND AUTHENTICATION | May 6, 2014 | Abandoned |
Array
(
[id] => 10441544
[patent_doc_number] => 20150326556
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'UNIVERSAL LOGIN AUTHENTICATION SERVICE'
[patent_app_type] => utility
[patent_app_number] => 14/271279
[patent_app_country] => US
[patent_app_date] => 2014-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3012
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14271279
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/271279 | UNIVERSAL LOGIN AUTHENTICATION SERVICE | May 5, 2014 | Abandoned |
Array
(
[id] => 9688161
[patent_doc_number] => 20140244925
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-28
[patent_title] => 'SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR TAMPER PROTECTION IN A DATA STORAGE SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/271207
[patent_app_country] => US
[patent_app_date] => 2014-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 19547
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14271207
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/271207 | System, method and computer program product for tamper protection in a data storage system | May 5, 2014 | Issued |
Array
(
[id] => 11179603
[patent_doc_number] => 09411597
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-09
[patent_title] => 'Return-oriented programming as an obfuscation technique'
[patent_app_type] => utility
[patent_app_number] => 14/270558
[patent_app_country] => US
[patent_app_date] => 2014-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3777
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14270558
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/270558 | Return-oriented programming as an obfuscation technique | May 5, 2014 | Issued |
Array
(
[id] => 10442049
[patent_doc_number] => 20150327060
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'Connecting Devices to Networks'
[patent_app_type] => utility
[patent_app_number] => 14/270452
[patent_app_country] => US
[patent_app_date] => 2014-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12251
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14270452
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/270452 | Connecting devices to networks | May 5, 2014 | Issued |
Array
(
[id] => 10085497
[patent_doc_number] => 09122846
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-01
[patent_title] => 'Document verification with distributed calendar infrastructure'
[patent_app_type] => utility
[patent_app_number] => 14/265478
[patent_app_country] => US
[patent_app_date] => 2014-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 18
[patent_no_of_words] => 12596
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 416
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14265478
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/265478 | Document verification with distributed calendar infrastructure | Apr 29, 2014 | Issued |
Array
(
[id] => 10764397
[patent_doc_number] => 20160110552
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-21
[patent_title] => 'Method and Apparatus for Transmission of Visually Encoded Data'
[patent_app_type] => utility
[patent_app_number] => 14/888503
[patent_app_country] => US
[patent_app_date] => 2014-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4493
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14888503
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/888503 | Method and apparatus for transmission of visually encoded data | Apr 29, 2014 | Issued |
Array
(
[id] => 9974558
[patent_doc_number] => 09021597
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-28
[patent_title] => 'Security arrangements for extended USB protocol stack of a USB host system'
[patent_app_type] => utility
[patent_app_number] => 14/244349
[patent_app_country] => US
[patent_app_date] => 2014-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4332
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 27
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14244349
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/244349 | Security arrangements for extended USB protocol stack of a USB host system | Apr 2, 2014 | Issued |