
Yonas A. Bayou
Examiner (ID: 16390, Phone: (571)272-7610 , Office: P/2434 )
| Most Active Art Unit | 2434 |
| Art Unit(s) | 2434, 2499, 2134 |
| Total Applications | 942 |
| Issued Applications | 748 |
| Pending Applications | 78 |
| Abandoned Applications | 145 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9947869
[patent_doc_number] => 08997199
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-03-31
[patent_title] => 'Token-based security for links to media streams'
[patent_app_type] => utility
[patent_app_number] => 14/109625
[patent_app_country] => US
[patent_app_date] => 2013-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7655
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14109625
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/109625 | Token-based security for links to media streams | Dec 16, 2013 | Issued |
Array
(
[id] => 9673397
[patent_doc_number] => 20140237260
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-21
[patent_title] => 'TELECOMMUNICATIONS DEVICE SECURITY'
[patent_app_type] => utility
[patent_app_number] => 14/094018
[patent_app_country] => US
[patent_app_date] => 2013-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6614
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14094018
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/094018 | Telecommunications device security | Dec 1, 2013 | Issued |
Array
(
[id] => 9513097
[patent_doc_number] => 20140149589
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-29
[patent_title] => 'Enforcing Conditions of Use Associated with Disparate Data Sets'
[patent_app_type] => utility
[patent_app_number] => 14/085485
[patent_app_country] => US
[patent_app_date] => 2013-11-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8050
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14085485
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/085485 | Enforcing conditions of use associated with disparate data sets | Nov 19, 2013 | Issued |
Array
(
[id] => 9478631
[patent_doc_number] => 20140136094
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-15
[patent_title] => 'PROXIMITY DETERMINATION METHOD, PROXIMITY DETERMINATION DEVICE, AND PROXIMITY DETERMINATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/048899
[patent_app_country] => US
[patent_app_date] => 2013-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11392
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14048899
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/048899 | Proximity determination method, proximity determination device, and proximity determination system | Oct 7, 2013 | Issued |
Array
(
[id] => 9941052
[patent_doc_number] => 08990886
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-03-24
[patent_title] => 'Techniques of transforming policies to enforce control in an information management system'
[patent_app_type] => utility
[patent_app_number] => 14/035595
[patent_app_country] => US
[patent_app_date] => 2013-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 24
[patent_no_of_words] => 57252
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14035595
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/035595 | Techniques of transforming policies to enforce control in an information management system | Sep 23, 2013 | Issued |
Array
(
[id] => 9207283
[patent_doc_number] => 20140006460
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-02
[patent_title] => 'System and Method for Addressing a Unique Device from a Common Address Book'
[patent_app_type] => utility
[patent_app_number] => 14/020044
[patent_app_country] => US
[patent_app_date] => 2013-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 9867
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14020044
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/020044 | System and method for addressing a unique device from a common address book | Sep 5, 2013 | Issued |
Array
(
[id] => 9947914
[patent_doc_number] => 08997245
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-03-31
[patent_title] => 'Methods and apparatus for software license management'
[patent_app_type] => utility
[patent_app_number] => 14/013431
[patent_app_country] => US
[patent_app_date] => 2013-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 20
[patent_no_of_words] => 6243
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14013431
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/013431 | Methods and apparatus for software license management | Aug 28, 2013 | Issued |
Array
(
[id] => 9673760
[patent_doc_number] => 20140237622
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-21
[patent_title] => 'SYSTEM AND METHOD FOR INSERTING SECURITY MECHANISMS INTO A SOFTWARE PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/964913
[patent_app_country] => US
[patent_app_date] => 2013-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 30145
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13964913
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/964913 | SYSTEM AND METHOD FOR INSERTING SECURITY MECHANISMS INTO A SOFTWARE PROGRAM | Aug 11, 2013 | Abandoned |
Array
(
[id] => 9163383
[patent_doc_number] => 20130311660
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-21
[patent_title] => 'Functionality Management via Application Modification'
[patent_app_type] => utility
[patent_app_number] => 13/952785
[patent_app_country] => US
[patent_app_date] => 2013-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9349
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13952785
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/952785 | Functionality management via application modification | Jul 28, 2013 | Issued |
Array
(
[id] => 9723436
[patent_doc_number] => 20140259137
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-11
[patent_title] => 'METHOD OF MANAGING USER LOG-IN TO CLOUD-BASED APPLICATION AND IMAGE FORMING APPARATUS PERFORMING THE METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/950514
[patent_app_country] => US
[patent_app_date] => 2013-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6154
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13950514
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/950514 | Method of managing user log-in to cloud-based application and image forming apparatus performing the method | Jul 24, 2013 | Issued |
Array
(
[id] => 9163780
[patent_doc_number] => 20130312057
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-21
[patent_title] => 'Functionality Management via Application Modification'
[patent_app_type] => utility
[patent_app_number] => 13/950486
[patent_app_country] => US
[patent_app_date] => 2013-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9336
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13950486
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/950486 | Functionality management via application modification | Jul 24, 2013 | Issued |
Array
(
[id] => 10126164
[patent_doc_number] => 09160540
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-13
[patent_title] => 'Preventing playback of streaming video if ads are removed'
[patent_app_type] => utility
[patent_app_number] => 13/950552
[patent_app_country] => US
[patent_app_date] => 2013-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3628
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13950552
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/950552 | Preventing playback of streaming video if ads are removed | Jul 24, 2013 | Issued |
Array
(
[id] => 10030052
[patent_doc_number] => 09071971
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-30
[patent_title] => 'Adaptive and context based NFC access control filtering'
[patent_app_type] => utility
[patent_app_number] => 13/949770
[patent_app_country] => US
[patent_app_date] => 2013-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 15
[patent_no_of_words] => 13210
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13949770
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/949770 | Adaptive and context based NFC access control filtering | Jul 23, 2013 | Issued |
Array
(
[id] => 9283339
[patent_doc_number] => 20140033307
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-30
[patent_title] => 'SYSTEM AND METHOD TO PROVIDE AUTOMATIC CLASSIFICATION OF PHISHING SITES'
[patent_app_type] => utility
[patent_app_number] => 13/949974
[patent_app_country] => US
[patent_app_date] => 2013-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 11255
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13949974
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/949974 | System and method to provide automatic classification of phishing sites | Jul 23, 2013 | Issued |
Array
(
[id] => 9283360
[patent_doc_number] => 20140033327
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-30
[patent_title] => 'Siftsort'
[patent_app_type] => utility
[patent_app_number] => 13/950194
[patent_app_country] => US
[patent_app_date] => 2013-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 64
[patent_figures_cnt] => 64
[patent_no_of_words] => 52555
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13950194
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/950194 | Siftsort | Jul 23, 2013 | Issued |
Array
(
[id] => 9841254
[patent_doc_number] => 20150033336
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-29
[patent_title] => 'LOGGING ATTACK CONTEXT DATA'
[patent_app_type] => utility
[patent_app_number] => 13/950252
[patent_app_country] => US
[patent_app_date] => 2013-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7077
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13950252
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/950252 | LOGGING ATTACK CONTEXT DATA | Jul 23, 2013 | Abandoned |
Array
(
[id] => 10185537
[patent_doc_number] => 09215226
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-15
[patent_title] => 'Dynamically mapping users to groups'
[patent_app_type] => utility
[patent_app_number] => 13/949701
[patent_app_country] => US
[patent_app_date] => 2013-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 15595
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13949701
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/949701 | Dynamically mapping users to groups | Jul 23, 2013 | Issued |
Array
(
[id] => 9200733
[patent_doc_number] => 20130340047
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-19
[patent_title] => 'SYSTEMS AND METHODS FOR PROTECTION OF A SIP BACK-TO-BACK USER AGENT ON MODEMS'
[patent_app_type] => utility
[patent_app_number] => 13/866259
[patent_app_country] => US
[patent_app_date] => 2013-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4469
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13866259
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/866259 | Systems and methods for protection of a SIP back-to-back user agent on modems | Apr 18, 2013 | Issued |
Array
(
[id] => 10914712
[patent_doc_number] => 20140317731
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-23
[patent_title] => 'Executable Component Injection Utilizing Hotpatch Mechanisms'
[patent_app_type] => utility
[patent_app_number] => 13/866968
[patent_app_country] => US
[patent_app_date] => 2013-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4398
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13866968
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/866968 | Executable component injection utilizing hotpatch mechanisms | Apr 18, 2013 | Issued |
Array
(
[id] => 9110221
[patent_doc_number] => 20130283353
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-24
[patent_title] => 'SECURE ZONE FOR SECURE PURCHASES'
[patent_app_type] => utility
[patent_app_number] => 13/866687
[patent_app_country] => US
[patent_app_date] => 2013-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10036
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13866687
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/866687 | Secure zone for secure purchases | Apr 18, 2013 | Issued |