Nelson C Holtje
Examiner (ID: 9949)
Most Active Art Unit | 2913 |
Art Unit(s) | 2902, 2913, 2912, 2900, 2899, 2903, 2702 |
Total Applications | 5859 |
Issued Applications | 5818 |
Pending Applications | 1 |
Abandoned Applications | 40 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 14678793
[patent_doc_number] => 20190238511
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-01
[patent_title] => METHODS AND APPARATUS FOR MANAGING RISK IN DIGITAL COMMUNICATIONS OF THE INDUSTRIAL INTERNET OF THINGS
[patent_app_type] => utility
[patent_app_number] => 16/261247
[patent_app_country] => US
[patent_app_date] => 2019-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11909
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16261247
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/261247 | METHODS AND APPARATUS FOR MANAGING RISK IN DIGITAL COMMUNICATIONS OF THE INDUSTRIAL INTERNET OF THINGS | Jan 28, 2019 | Abandoned |
Array
(
[id] => 14319729
[patent_doc_number] => 20190149568
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-16
[patent_title] => DEVICE ACTIVITY AND DATA TRAFFIC SIGNATURE-BASED DETECTION OF MOBILE DEVICE HEALTH
[patent_app_type] => utility
[patent_app_number] => 16/244507
[patent_app_country] => US
[patent_app_date] => 2019-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5442
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 60
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16244507
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/244507 | DEVICE ACTIVITY AND DATA TRAFFIC SIGNATURE-BASED DETECTION OF MOBILE DEVICE HEALTH | Jan 9, 2019 | Abandoned |
Array
(
[id] => 12055496
[patent_doc_number] => 20170331840
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-16
[patent_title] => 'SYSTEMS AND METHODS FOR DETERMINING SECURITY RISK PROFILES'
[patent_app_type] => utility
[patent_app_number] => 15/151734
[patent_app_country] => US
[patent_app_date] => 2016-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8907
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15151734
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/151734 | SYSTEMS AND METHODS FOR DETERMINING SECURITY RISK PROFILES | May 10, 2016 | Abandoned |
Array
(
[id] => 10956703
[patent_doc_number] => 20140359725
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-04
[patent_title] => 'System and Method for Providing Authentication and Authorisation for a Person to Perform Specific Instructions (Tasks)'
[patent_app_type] => utility
[patent_app_number] => 14/296136
[patent_app_country] => US
[patent_app_date] => 2014-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3132
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14296136
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/296136 | System and Method for Providing Authentication and Authorisation for a Person to Perform Specific Instructions (Tasks) | Jun 3, 2014 | Abandoned |
Array
(
[id] => 8735195
[patent_doc_number] => 20130080764
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-28
[patent_title] => 'Secure Remote Credential Provisioning'
[patent_app_type] => utility
[patent_app_number] => 13/247042
[patent_app_country] => US
[patent_app_date] => 2011-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3977
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13247042
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/247042 | Secure remote credential provisioning | Sep 27, 2011 | Issued |
Array
(
[id] => 5935223
[patent_doc_number] => 20110211698
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-01
[patent_title] => 'Encryption/Decryption System for a Mobile Device'
[patent_app_type] => utility
[patent_app_number] => 13/035739
[patent_app_country] => US
[patent_app_date] => 2011-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 1727
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0211/20110211698.pdf
[firstpage_image] =>[orig_patent_app_number] => 13035739
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/035739 | Encryption/Decryption System for a Mobile Device | Feb 24, 2011 | Abandoned |
Array
(
[id] => 5940475
[patent_doc_number] => 20110214165
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-01
[patent_title] => 'Processor Implemented Systems And Methods For Using Identity Maps And Authentication To Provide Restricted Access To Backend Server Processor or Data'
[patent_app_type] => utility
[patent_app_number] => 13/034323
[patent_app_country] => US
[patent_app_date] => 2011-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6410
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0214/20110214165.pdf
[firstpage_image] =>[orig_patent_app_number] => 13034323
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/034323 | Processor Implemented Systems And Methods For Using Identity Maps And Authentication To Provide Restricted Access To Backend Server Processor or Data | Feb 23, 2011 | Abandoned |
Array
(
[id] => 8816793
[patent_doc_number] => 20130117838
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-09
[patent_title] => 'Superpositional Control of Integrated Circuit Processing'
[patent_app_type] => utility
[patent_app_number] => 13/025946
[patent_app_country] => US
[patent_app_date] => 2011-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6121
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13025946
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/025946 | Superpositional Control of Integrated Circuit Processing | Feb 10, 2011 | Abandoned |
Array
(
[id] => 8219915
[patent_doc_number] => 20120134490
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-31
[patent_title] => 'Selective Data Encryption and Decryption Method and Apparatus'
[patent_app_type] => utility
[patent_app_number] => 12/976931
[patent_app_country] => US
[patent_app_date] => 2010-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5802
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12976931
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/976931 | Selective Data Encryption and Decryption Method and Apparatus | Dec 21, 2010 | Abandoned |
Array
(
[id] => 7493571
[patent_doc_number] => 20110239267
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-29
[patent_title] => 'PASSWORD COMPLEXITY POLICY FOR EXTERNALLY CONTROLLED SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 12/729268
[patent_app_country] => US
[patent_app_date] => 2010-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 13663
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0239/20110239267.pdf
[firstpage_image] =>[orig_patent_app_number] => 12729268
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/729268 | PASSWORD COMPLEXITY POLICY FOR EXTERNALLY CONTROLLED SYSTEMS | Mar 22, 2010 | Abandoned |
Array
(
[id] => 7682541
[patent_doc_number] => 20100241870
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-23
[patent_title] => 'CONTROL DEVICE, STORAGE DEVICE, DATA LEAKAGE PREVENTING METHOD'
[patent_app_type] => utility
[patent_app_number] => 12/728135
[patent_app_country] => US
[patent_app_date] => 2010-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3064
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0241/20100241870.pdf
[firstpage_image] =>[orig_patent_app_number] => 12728135
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/728135 | CONTROL DEVICE, STORAGE DEVICE, DATA LEAKAGE PREVENTING METHOD | Mar 18, 2010 | Abandoned |
Array
(
[id] => 5418371
[patent_doc_number] => 20090044258
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-02-12
[patent_title] => 'COMMUNICATION METHOD AND SERVICE IN PERSONAL AREA NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/250529
[patent_app_country] => US
[patent_app_date] => 2008-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2980
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0044/20090044258.pdf
[firstpage_image] =>[orig_patent_app_number] => 12250529
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/250529 | COMMUNICATION METHOD AND SERVICE IN PERSONAL AREA NETWORK | Oct 12, 2008 | Abandoned |
Array
(
[id] => 5560294
[patent_doc_number] => 20090271871
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-10-29
[patent_title] => 'INTELLIGENT UPLOADED CONTENT PLACEMENT'
[patent_app_type] => utility
[patent_app_number] => 12/107771
[patent_app_country] => US
[patent_app_date] => 2008-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4778
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0271/20090271871.pdf
[firstpage_image] =>[orig_patent_app_number] => 12107771
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/107771 | INTELLIGENT UPLOADED CONTENT PLACEMENT | Apr 22, 2008 | Abandoned |
Array
(
[id] => 4767061
[patent_doc_number] => 20080178273
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-07-24
[patent_title] => 'Automated Authentication Process for Application Clients'
[patent_app_type] => utility
[patent_app_number] => 12/018767
[patent_app_country] => US
[patent_app_date] => 2008-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1935
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0178/20080178273.pdf
[firstpage_image] =>[orig_patent_app_number] => 12018767
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/018767 | Automated Authentication Process for Application Clients | Jan 22, 2008 | Abandoned |
Array
(
[id] => 4730187
[patent_doc_number] => 20080209039
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-08-28
[patent_title] => 'Service chaining methods and apparatus'
[patent_app_type] => utility
[patent_app_number] => 12/002389
[patent_app_country] => US
[patent_app_date] => 2007-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 11222
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0209/20080209039.pdf
[firstpage_image] =>[orig_patent_app_number] => 12002389
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/002389 | Service chaining methods and apparatus | Dec 16, 2007 | Abandoned |
Array
(
[id] => 6494916
[patent_doc_number] => 20100215179
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-08-26
[patent_title] => 'Security Key Method In Semiconductor Manufacturing'
[patent_app_type] => utility
[patent_app_number] => 11/669001
[patent_app_country] => US
[patent_app_date] => 2007-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8001
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0215/20100215179.pdf
[firstpage_image] =>[orig_patent_app_number] => 11669001
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/669001 | Security Key Method In Semiconductor Manufacturing | Jan 29, 2007 | Pending |
Array
(
[id] => 5221276
[patent_doc_number] => 20070162588
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-07-12
[patent_title] => 'Method and system for adding group member'
[patent_app_type] => utility
[patent_app_number] => 11/699867
[patent_app_country] => US
[patent_app_date] => 2007-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4256
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0162/20070162588.pdf
[firstpage_image] =>[orig_patent_app_number] => 11699867
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/699867 | Method and system for adding group member | Jan 29, 2007 | Abandoned |
Array
(
[id] => 5878480
[patent_doc_number] => 20060168142
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-07-27
[patent_title] => 'Music distribution system'
[patent_app_type] => utility
[patent_app_number] => 11/322029
[patent_app_country] => US
[patent_app_date] => 2005-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12082
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0168/20060168142.pdf
[firstpage_image] =>[orig_patent_app_number] => 11322029
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/322029 | Authorized units music distribution system | Dec 28, 2005 | Issued |
Array
(
[id] => 4659613
[patent_doc_number] => 20080028475
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-01-31
[patent_title] => 'Method For Authenticating A Website'
[patent_app_type] => utility
[patent_app_number] => 11/720247
[patent_app_country] => US
[patent_app_date] => 2005-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2417
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0028/20080028475.pdf
[firstpage_image] =>[orig_patent_app_number] => 11720247
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/720247 | Method For Authenticating A Website | Nov 23, 2005 | Abandoned |
Array
(
[id] => 5097037
[patent_doc_number] => 20070118646
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-05-24
[patent_title] => 'Preventing the installation of rootkits on a standalone computer'
[patent_app_type] => utility
[patent_app_number] => 11/244014
[patent_app_country] => US
[patent_app_date] => 2005-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3509
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0118/20070118646.pdf
[firstpage_image] =>[orig_patent_app_number] => 11244014
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/244014 | Preventing the installation of rootkits on a standalone computer | Oct 3, 2005 | Abandoned |