Robert A Hullinger
Examiner (ID: 12417)
Most Active Art Unit | 2825 |
Art Unit(s) | 2813, 2825 |
Total Applications | 24 |
Issued Applications | 24 |
Pending Applications | 0 |
Abandoned Applications | 0 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 8213894
[patent_doc_number] => 20120131317
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-24
[patent_title] => 'TICKET AUTHORIZED SECURE INSTALLATION AND BOOT'
[patent_app_type] => utility
[patent_app_number] => 13/342821
[patent_app_country] => US
[patent_app_date] => 2012-01-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 10221
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0131/20120131317.pdf
[firstpage_image] =>[orig_patent_app_number] => 13342821
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/342821 | Ticket authorized secure installation and boot | Jan 2, 2012 | Issued |
Array
(
[id] => 8552546
[patent_doc_number] => 08327447
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-12-04
[patent_title] => 'Detection of undesired computer files in archives'
[patent_app_type] => utility
[patent_app_number] => 13/312966
[patent_app_country] => US
[patent_app_date] => 2011-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 7735
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13312966
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/312966 | Detection of undesired computer files in archives | Dec 5, 2011 | Issued |
Array
(
[id] => 7765420
[patent_doc_number] => 20120033815
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-09
[patent_title] => 'METHOD OF HANDLING SECURITY KEY CHANGE AND RELATED COMMUNICATION DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/277770
[patent_app_country] => US
[patent_app_date] => 2011-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2593
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 15
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0033/20120033815.pdf
[firstpage_image] =>[orig_patent_app_number] => 13277770
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/277770 | Method of handling security key change and related communication device | Oct 19, 2011 | Issued |
Array
(
[id] => 8661286
[patent_doc_number] => 20130042115
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-02-14
[patent_title] => 'SYSTEMS AND METHODS FOR IMPLEMENTING SECURITY IN A CLOUD COMPUTING ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 13/205948
[patent_app_country] => US
[patent_app_date] => 2011-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 14561
[patent_no_of_claims] => 65
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13205948
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/205948 | Systems and methods for implementing security in a cloud computing environment | Aug 8, 2011 | Issued |
Array
(
[id] => 8650735
[patent_doc_number] => 20130036465
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-02-07
[patent_title] => 'Security controller'
[patent_app_type] => utility
[patent_app_number] => 13/137293
[patent_app_country] => US
[patent_app_date] => 2011-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10017
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13137293
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/137293 | Security controller | Aug 2, 2011 | Issued |
Array
(
[id] => 8650717
[patent_doc_number] => 20130036447
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-02-07
[patent_title] => 'Attribution points for policy management'
[patent_app_type] => utility
[patent_app_number] => 13/136510
[patent_app_country] => US
[patent_app_date] => 2011-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3205
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13136510
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/136510 | Attribution points for policy management | Aug 1, 2011 | Abandoned |
Array
(
[id] => 8326131
[patent_doc_number] => 20120198540
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-08-02
[patent_title] => 'Internet-based fill-level measurement value and diagnostic information polling system'
[patent_app_type] => utility
[patent_app_number] => 13/196344
[patent_app_country] => US
[patent_app_date] => 2011-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4300
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13196344
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/196344 | Internet-based fill-level measurement value and diagnostic information polling system | Aug 1, 2011 | Issued |
Array
(
[id] => 8040575
[patent_doc_number] => 20120069998
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-03-22
[patent_title] => 'ENCRYPTION DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/192122
[patent_app_country] => US
[patent_app_date] => 2011-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 13485
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0069/20120069998.pdf
[firstpage_image] =>[orig_patent_app_number] => 13192122
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/192122 | Encryption device | Jul 26, 2011 | Issued |
Array
(
[id] => 8959039
[patent_doc_number] => 08504833
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-06
[patent_title] => 'Relay device, wireless communications device, network system, program storage medium, and method'
[patent_app_type] => utility
[patent_app_number] => 13/189590
[patent_app_country] => US
[patent_app_date] => 2011-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 10291
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13189590
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/189590 | Relay device, wireless communications device, network system, program storage medium, and method | Jul 24, 2011 | Issued |
Array
(
[id] => 8922836
[patent_doc_number] => 08488779
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-16
[patent_title] => 'Method and system for conducting high speed, symmetric stream cipher encryption'
[patent_app_type] => utility
[patent_app_number] => 13/189936
[patent_app_country] => US
[patent_app_date] => 2011-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 20
[patent_no_of_words] => 13810
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13189936
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/189936 | Method and system for conducting high speed, symmetric stream cipher encryption | Jul 24, 2011 | Issued |
Array
(
[id] => 8959038
[patent_doc_number] => 08504832
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-06
[patent_title] => 'Mobile terminal for sharing resources, method of sharing resources within mobile terminal and method of sharing resources between web server and terminal'
[patent_app_type] => utility
[patent_app_number] => 13/189352
[patent_app_country] => US
[patent_app_date] => 2011-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 2547
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13189352
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/189352 | Mobile terminal for sharing resources, method of sharing resources within mobile terminal and method of sharing resources between web server and terminal | Jul 21, 2011 | Issued |
Array
(
[id] => 8879061
[patent_doc_number] => 08474046
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-06-25
[patent_title] => 'Systems and methods for identifying the spreading of sensitive data by a suspicious application'
[patent_app_type] => utility
[patent_app_number] => 13/188346
[patent_app_country] => US
[patent_app_date] => 2011-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4496
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13188346
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/188346 | Systems and methods for identifying the spreading of sensitive data by a suspicious application | Jul 20, 2011 | Issued |
Array
(
[id] => 8849571
[patent_doc_number] => 08458771
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-06-04
[patent_title] => 'Image forming apparatus, authentication method, and recording medium'
[patent_app_type] => utility
[patent_app_number] => 13/067892
[patent_app_country] => US
[patent_app_date] => 2011-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 7039
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13067892
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/067892 | Image forming apparatus, authentication method, and recording medium | Jul 4, 2011 | Issued |
Array
(
[id] => 7493595
[patent_doc_number] => 20110239279
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-29
[patent_title] => 'DRM Protected Content Sharing'
[patent_app_type] => utility
[patent_app_number] => 13/155604
[patent_app_country] => US
[patent_app_date] => 2011-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5284
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0239/20110239279.pdf
[firstpage_image] =>[orig_patent_app_number] => 13155604
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/155604 | DRM Protected Content Sharing | Jun 7, 2011 | Abandoned |
Array
(
[id] => 7493597
[patent_doc_number] => 20110239280
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-29
[patent_title] => 'DRM Protected Content Sharing'
[patent_app_type] => utility
[patent_app_number] => 13/155609
[patent_app_country] => US
[patent_app_date] => 2011-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5284
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0239/20110239280.pdf
[firstpage_image] =>[orig_patent_app_number] => 13155609
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/155609 | DRM Protected Content Sharing | Jun 7, 2011 | Abandoned |
Array
(
[id] => 8878758
[patent_doc_number] => 08473742
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-06-25
[patent_title] => 'Method of distributing a decryption key in fixed-content data'
[patent_app_type] => utility
[patent_app_number] => 13/108539
[patent_app_country] => US
[patent_app_date] => 2011-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 5716
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13108539
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/108539 | Method of distributing a decryption key in fixed-content data | May 15, 2011 | Issued |
Array
(
[id] => 8472688
[patent_doc_number] => 08301881
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-10-30
[patent_title] => 'Proactive forced renewal of content protection implementations'
[patent_app_type] => utility
[patent_app_number] => 13/105125
[patent_app_country] => US
[patent_app_date] => 2011-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4053
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13105125
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/105125 | Proactive forced renewal of content protection implementations | May 10, 2011 | Issued |
Array
(
[id] => 8208105
[patent_doc_number] => 08190900
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-05-29
[patent_title] => 'Secure telemetric link'
[patent_app_type] => utility
[patent_app_number] => 13/088823
[patent_app_country] => US
[patent_app_date] => 2011-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 17
[patent_no_of_words] => 14547
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/190/08190900.pdf
[firstpage_image] =>[orig_patent_app_number] => 13088823
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/088823 | Secure telemetric link | Apr 17, 2011 | Issued |
Array
(
[id] => 8378532
[patent_doc_number] => 08261339
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-09-04
[patent_title] => 'Dynamic network tunnel endpoint selection'
[patent_app_type] => utility
[patent_app_number] => 12/968200
[patent_app_country] => US
[patent_app_date] => 2010-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 9629
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12968200
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/968200 | Dynamic network tunnel endpoint selection | Dec 13, 2010 | Issued |
Array
(
[id] => 8775152
[patent_doc_number] => 08429126
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-04-23
[patent_title] => 'Object graph editing context and methods of use'
[patent_app_type] => utility
[patent_app_number] => 12/950837
[patent_app_country] => US
[patent_app_date] => 2010-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7540
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12950837
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/950837 | Object graph editing context and methods of use | Nov 18, 2010 | Issued |