
Zoila E. Cabrera
Examiner (ID: 12551)
| Most Active Art Unit | 2125 |
| Art Unit(s) | 2125, OPQA, 2121, 2123, 2786 |
| Total Applications | 523 |
| Issued Applications | 354 |
| Pending Applications | 104 |
| Abandoned Applications | 65 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 4905779
[patent_doc_number] => 20080115193
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-05-15
[patent_title] => 'Method And System For Managing Patient\'s Identities Of A Computer Network Producing And Storing Medical Data'
[patent_app_type] => utility
[patent_app_number] => 11/813379
[patent_app_country] => US
[patent_app_date] => 2005-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7956
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0115/20080115193.pdf
[firstpage_image] =>[orig_patent_app_number] => 11813379
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/813379 | Method And System For Managing Patient's Identities Of A Computer Network Producing And Storing Medical Data | Dec 1, 2005 | Abandoned |
Array
(
[id] => 6301985
[patent_doc_number] => 20100161958
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-24
[patent_title] => 'Device for Realizing Security Function in Mac of Portable Internet System and Authentication Method Using the Device'
[patent_app_type] => utility
[patent_app_number] => 11/922900
[patent_app_country] => US
[patent_app_date] => 2005-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7146
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0161/20100161958.pdf
[firstpage_image] =>[orig_patent_app_number] => 11922900
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/922900 | Device for Realizing Security Function in Mac of Portable Internet System and Authentication Method Using the Device | Oct 26, 2005 | Abandoned |
Array
(
[id] => 4823252
[patent_doc_number] => 20080123481
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-05-29
[patent_title] => 'Method for Saving ther Keylockers on Optical Discs'
[patent_app_type] => utility
[patent_app_number] => 11/577364
[patent_app_country] => US
[patent_app_date] => 2005-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3242
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0123/20080123481.pdf
[firstpage_image] =>[orig_patent_app_number] => 11577364
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/577364 | Method for Saving ther Keylockers on Optical Discs | Oct 11, 2005 | Abandoned |
Array
(
[id] => 9946334
[patent_doc_number] => 08995653
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-03-31
[patent_title] => 'Generating a secret key from an asymmetric private key'
[patent_app_type] => utility
[patent_app_number] => 11/179189
[patent_app_country] => US
[patent_app_date] => 2005-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2674
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11179189
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/179189 | Generating a secret key from an asymmetric private key | Jul 11, 2005 | Issued |
Array
(
[id] => 5822110
[patent_doc_number] => 20060026423
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-02-02
[patent_title] => 'Privacy-protecting integrity attestation of a computing platform'
[patent_app_type] => utility
[patent_app_number] => 11/178722
[patent_app_country] => US
[patent_app_date] => 2005-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6721
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0026/20060026423.pdf
[firstpage_image] =>[orig_patent_app_number] => 11178722
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/178722 | Privacy-protecting integrity attestation of a computing platform | Jul 10, 2005 | Abandoned |
Array
(
[id] => 4996399
[patent_doc_number] => 20070011744
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-01-11
[patent_title] => 'Methods and systems for providing security from malicious software'
[patent_app_type] => utility
[patent_app_number] => 11/178812
[patent_app_country] => US
[patent_app_date] => 2005-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4558
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0011/20070011744.pdf
[firstpage_image] =>[orig_patent_app_number] => 11178812
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/178812 | Methods and systems for providing security from malicious software | Jul 10, 2005 | Abandoned |
Array
(
[id] => 5792716
[patent_doc_number] => 20060013397
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-01-19
[patent_title] => 'Channel adapter managed trusted queue pairs'
[patent_app_type] => utility
[patent_app_number] => 11/178761
[patent_app_country] => US
[patent_app_date] => 2005-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2509
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0013/20060013397.pdf
[firstpage_image] =>[orig_patent_app_number] => 11178761
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/178761 | Channel adapter managed trusted queue pairs | Jul 10, 2005 | Abandoned |
Array
(
[id] => 5706649
[patent_doc_number] => 20060195697
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-08-31
[patent_title] => 'Method of supplying power to time-stamping device, security device, and time-correcting device'
[patent_app_type] => utility
[patent_app_number] => 11/178529
[patent_app_country] => US
[patent_app_date] => 2005-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8346
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0195/20060195697.pdf
[firstpage_image] =>[orig_patent_app_number] => 11178529
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/178529 | Method of supplying power to time-stamping device, security device, and time-correcting device | Jul 10, 2005 | Abandoned |
Array
(
[id] => 9103033
[patent_doc_number] => 08566927
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-10-22
[patent_title] => 'Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card'
[patent_app_type] => utility
[patent_app_number] => 10/570378
[patent_app_country] => US
[patent_app_date] => 2005-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4221
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 10570378
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/570378 | Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card | Jun 29, 2005 | Issued |
Array
(
[id] => 9960094
[patent_doc_number] => 09008311
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-14
[patent_title] => 'Method for encryption and decryption of messages'
[patent_app_type] => utility
[patent_app_number] => 11/630783
[patent_app_country] => US
[patent_app_date] => 2005-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8775
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 29
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11630783
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/630783 | Method for encryption and decryption of messages | Jun 22, 2005 | Issued |
Array
(
[id] => 8595163
[patent_doc_number] => 08353046
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-01-08
[patent_title] => 'System and method for delivery of a modular operating system'
[patent_app_type] => utility
[patent_app_number] => 11/147539
[patent_app_country] => US
[patent_app_date] => 2005-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4514
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11147539
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/147539 | System and method for delivery of a modular operating system | Jun 7, 2005 | Issued |
Array
(
[id] => 5830866
[patent_doc_number] => 20060064744
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-03-23
[patent_title] => 'Network scan system passing through firewall and method of organizing the same'
[patent_app_type] => utility
[patent_app_number] => 11/147315
[patent_app_country] => US
[patent_app_date] => 2005-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3007
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0064/20060064744.pdf
[firstpage_image] =>[orig_patent_app_number] => 11147315
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/147315 | Network scan system passing through firewall and method of organizing the same | Jun 7, 2005 | Issued |
Array
(
[id] => 107246
[patent_doc_number] => 07730536
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-06-01
[patent_title] => 'Security perimeters'
[patent_app_type] => utility
[patent_app_number] => 11/147303
[patent_app_country] => US
[patent_app_date] => 2005-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6857
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/730/07730536.pdf
[firstpage_image] =>[orig_patent_app_number] => 11147303
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/147303 | Security perimeters | Jun 7, 2005 | Issued |
Array
(
[id] => 5830688
[patent_doc_number] => 20060064598
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-03-23
[patent_title] => 'Illegal access preventing program, apparatus, and method'
[patent_app_type] => utility
[patent_app_number] => 11/146152
[patent_app_country] => US
[patent_app_date] => 2005-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 5750
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0064/20060064598.pdf
[firstpage_image] =>[orig_patent_app_number] => 11146152
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/146152 | Illegal access preventing program, apparatus, and method | Jun 6, 2005 | Abandoned |
Array
(
[id] => 5770804
[patent_doc_number] => 20060020805
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-01-26
[patent_title] => 'Image-forming device, method for controlling image-forming device, terminal, method for controlling terminal, and computer program'
[patent_app_type] => utility
[patent_app_number] => 11/146960
[patent_app_country] => US
[patent_app_date] => 2005-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8448
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0020/20060020805.pdf
[firstpage_image] =>[orig_patent_app_number] => 11146960
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/146960 | Image-forming device, method for controlling image-forming device, terminal, method for controlling terminal, and computer program | Jun 6, 2005 | Issued |
Array
(
[id] => 7255446
[patent_doc_number] => 20050273610
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-12-08
[patent_title] => 'Information processing apparatus'
[patent_app_type] => utility
[patent_app_number] => 11/146435
[patent_app_country] => US
[patent_app_date] => 2005-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5110
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0273/20050273610.pdf
[firstpage_image] =>[orig_patent_app_number] => 11146435
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/146435 | Information processing apparatus with certificate invalidity determination | Jun 6, 2005 | Issued |
Array
(
[id] => 5892315
[patent_doc_number] => 20060277596
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-12-07
[patent_title] => 'Method and system for multi-instance session support in a load-balanced environment'
[patent_app_type] => utility
[patent_app_number] => 11/146969
[patent_app_country] => US
[patent_app_date] => 2005-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9715
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0277/20060277596.pdf
[firstpage_image] =>[orig_patent_app_number] => 11146969
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/146969 | Method and system for multi-instance session support in a load-balanced environment | Jun 5, 2005 | Abandoned |
Array
(
[id] => 10847716
[patent_doc_number] => 08874918
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-10-28
[patent_title] => 'Conditional access method and system for broadcast services'
[patent_app_type] => utility
[patent_app_number] => 11/919336
[patent_app_country] => US
[patent_app_date] => 2005-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9304
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11919336
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/919336 | Conditional access method and system for broadcast services | Apr 27, 2005 | Issued |
Array
(
[id] => 4725687
[patent_doc_number] => 20080205228
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-08-28
[patent_title] => 'Information Protection System, Recording Medium to be Used Therefor and Storage Medium Storage Case'
[patent_app_type] => utility
[patent_app_number] => 10/574432
[patent_app_country] => US
[patent_app_date] => 2004-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5468
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0205/20080205228.pdf
[firstpage_image] =>[orig_patent_app_number] => 10574432
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/574432 | Information Protection System, Recording Medium to be Used Therefor and Storage Medium Storage Case | Oct 6, 2004 | Abandoned |
Array
(
[id] => 7174029
[patent_doc_number] => 20050123131
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-06-09
[patent_title] => 'Cryptographic system comprising an encryption and decryption system and a key escrow system, and the associated equipment and devices'
[patent_app_type] => utility
[patent_app_number] => 10/817453
[patent_app_country] => US
[patent_app_date] => 2004-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5163
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0123/20050123131.pdf
[firstpage_image] =>[orig_patent_app_number] => 10817453
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/817453 | Cryptographic system comprising an encryption and decryption system and a key escrow system, and the associated equipment and devices | Apr 4, 2004 | Abandoned |