William P Moore
Examiner (ID: 15118)
Most Active Art Unit | 2133 |
Art Unit(s) | 2133 |
Total Applications | 4 |
Issued Applications | 4 |
Pending Applications | 0 |
Abandoned Applications | 0 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 8579653
[patent_doc_number] => 08345876
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-01-01
[patent_title] => 'Encryption/decryption system and method'
[patent_app_type] => utility
[patent_app_number] => 13/413603
[patent_app_country] => US
[patent_app_date] => 2012-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 18
[patent_no_of_words] => 9087
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13413603
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/413603 | Encryption/decryption system and method | Mar 5, 2012 | Issued |
Array
(
[id] => 8580854
[patent_doc_number] => 08347085
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-01-01
[patent_title] => 'Integrating security protection tools with computer device integrity and privacy policy'
[patent_app_type] => utility
[patent_app_number] => 13/341855
[patent_app_country] => US
[patent_app_date] => 2011-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7094
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13341855
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/341855 | Integrating security protection tools with computer device integrity and privacy policy | Dec 29, 2011 | Issued |
Array
(
[id] => 7714684
[patent_doc_number] => 20120005733
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-01-05
[patent_title] => 'VERIFICATION ENGINE FOR USER AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 13/230471
[patent_app_country] => US
[patent_app_date] => 2011-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5337
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0005/20120005733.pdf
[firstpage_image] =>[orig_patent_app_number] => 13230471
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/230471 | Verification engine for user authentication | Sep 11, 2011 | Issued |
Array
(
[id] => 7661580
[patent_doc_number] => 20110310849
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-22
[patent_title] => 'METHOD AND APPARATUS FOR UPDATING A KEY IN AN ACTIVE STATE'
[patent_app_type] => utility
[patent_app_number] => 13/229400
[patent_app_country] => US
[patent_app_date] => 2011-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5780
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0310/20110310849.pdf
[firstpage_image] =>[orig_patent_app_number] => 13229400
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/229400 | Method and apparatus for updating a key in an active state | Sep 8, 2011 | Issued |
Array
(
[id] => 7669836
[patent_doc_number] => 20110319105
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-29
[patent_title] => 'FREE-HAND MOBILE MESSAGING-METHOD AND DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/223932
[patent_app_country] => US
[patent_app_date] => 2011-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7969
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13223932
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/223932 | FREE-HAND MOBILE MESSAGING-METHOD AND DEVICE | Aug 31, 2011 | Abandoned |
Array
(
[id] => 7663083
[patent_doc_number] => 20110312352
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-22
[patent_title] => 'FREE-HAND MOBILE MESSAGING-METHOD AND DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/222545
[patent_app_country] => US
[patent_app_date] => 2011-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7971
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0312/20110312352.pdf
[firstpage_image] =>[orig_patent_app_number] => 13222545
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/222545 | FREE-HAND MOBILE MESSAGING-METHOD AND DEVICE | Aug 30, 2011 | Abandoned |
Array
(
[id] => 8438209
[patent_doc_number] => 08285993
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-10-09
[patent_title] => 'System and method for establishing a shared secret among nodes of a security appliance'
[patent_app_type] => utility
[patent_app_number] => 13/092371
[patent_app_country] => US
[patent_app_date] => 2011-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 4649
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13092371
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/092371 | System and method for establishing a shared secret among nodes of a security appliance | Apr 21, 2011 | Issued |
Array
(
[id] => 8297280
[patent_doc_number] => 08225082
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-07-17
[patent_title] => 'Card device for loading applications to a mobile device'
[patent_app_type] => utility
[patent_app_number] => 13/065626
[patent_app_country] => US
[patent_app_date] => 2011-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 16771
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13065626
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/065626 | Card device for loading applications to a mobile device | Mar 23, 2011 | Issued |
Array
(
[id] => 6030123
[patent_doc_number] => 20110081019
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-04-07
[patent_title] => 'COMPRESSED DATA SCRAMBLED DISTRIBUTION DEVICE AND PLAYBACK DEVICE THEREOF'
[patent_app_type] => utility
[patent_app_number] => 12/966402
[patent_app_country] => US
[patent_app_date] => 2010-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1944
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0081/20110081019.pdf
[firstpage_image] =>[orig_patent_app_number] => 12966402
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/966402 | Compressed data scrambled distribution device and playback device thereof | Dec 12, 2010 | Issued |
Array
(
[id] => 8530835
[patent_doc_number] => 08307419
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-11-06
[patent_title] => 'System and method for regulating communications to or from an application'
[patent_app_type] => utility
[patent_app_number] => 12/945668
[patent_app_country] => US
[patent_app_date] => 2010-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4008
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12945668
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/945668 | System and method for regulating communications to or from an application | Nov 11, 2010 | Issued |
Array
(
[id] => 6126366
[patent_doc_number] => 20110078795
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-31
[patent_title] => 'THREAT PROTECTION NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/890552
[patent_app_country] => US
[patent_app_date] => 2010-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8169
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0078/20110078795.pdf
[firstpage_image] =>[orig_patent_app_number] => 12890552
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/890552 | THREAT PROTECTION NETWORK | Sep 23, 2010 | Abandoned |
Array
(
[id] => 6032547
[patent_doc_number] => 20110055898
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-03
[patent_title] => 'Dynamic Authentication in Secured Wireless Networks'
[patent_app_type] => utility
[patent_app_number] => 12/845089
[patent_app_country] => US
[patent_app_date] => 2010-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4505
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0055/20110055898.pdf
[firstpage_image] =>[orig_patent_app_number] => 12845089
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/845089 | Dynamic authentication in secured wireless networks | Jul 27, 2010 | Issued |
Array
(
[id] => 6054164
[patent_doc_number] => 20110110524
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-12
[patent_title] => 'SYSTEM FOR ON-LINE AND OFF-LINE DECRYPTION'
[patent_app_type] => utility
[patent_app_number] => 12/839879
[patent_app_country] => US
[patent_app_date] => 2010-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5950
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0110/20110110524.pdf
[firstpage_image] =>[orig_patent_app_number] => 12839879
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/839879 | System for on-line and off-line decryption | Jul 19, 2010 | Issued |
Array
(
[id] => 6367490
[patent_doc_number] => 20100251347
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-30
[patent_title] => 'SIMPLE, SECURE LOGIN WITH MULTIPLE AUTHENTICATION PROVIDERS'
[patent_app_type] => utility
[patent_app_number] => 12/813708
[patent_app_country] => US
[patent_app_date] => 2010-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5546
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0251/20100251347.pdf
[firstpage_image] =>[orig_patent_app_number] => 12813708
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/813708 | Simple, secure login with multiple authentication providers | Jun 10, 2010 | Issued |
Array
(
[id] => 7682300
[patent_doc_number] => 20100242111
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-23
[patent_title] => 'Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing'
[patent_app_type] => utility
[patent_app_number] => 12/789339
[patent_app_country] => US
[patent_app_date] => 2010-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8427
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0242/20100242111.pdf
[firstpage_image] =>[orig_patent_app_number] => 12789339
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/789339 | Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing | May 26, 2010 | Issued |
Array
(
[id] => 6558555
[patent_doc_number] => 20100205666
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-08-12
[patent_title] => 'ELECTRONIC COMPUTER SYSTEM SECURED FROM UNAUTHORIZED ACCESS TO AND MANIPULATION OF DATA'
[patent_app_type] => utility
[patent_app_number] => 12/703508
[patent_app_country] => US
[patent_app_date] => 2010-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 8747
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0205/20100205666.pdf
[firstpage_image] =>[orig_patent_app_number] => 12703508
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/703508 | ELECTRONIC COMPUTER SYSTEM SECURED FROM UNAUTHORIZED ACCESS TO AND MANIPULATION OF DATA | Feb 9, 2010 | Abandoned |
Array
(
[id] => 6088886
[patent_doc_number] => 20110145922
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-16
[patent_title] => 'METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR MITIGATING EMAIL ADDRESS HARVEST ATTACKS BY POSITIVELY ACKNOWLEDGING EMAIL TO INVALID EMAIL ADDRESSES'
[patent_app_type] => utility
[patent_app_number] => 12/635475
[patent_app_country] => US
[patent_app_date] => 2009-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7663
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0145/20110145922.pdf
[firstpage_image] =>[orig_patent_app_number] => 12635475
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/635475 | Methods, systems, and computer program products for mitigating email address harvest attacks by positively acknowledging email to invalid email addresses | Dec 9, 2009 | Issued |
Array
(
[id] => 6620622
[patent_doc_number] => 20100050233
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-02-25
[patent_title] => 'VERIFICATION ENGINE FOR USER AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 12/613410
[patent_app_country] => US
[patent_app_date] => 2009-11-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5321
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0050/20100050233.pdf
[firstpage_image] =>[orig_patent_app_number] => 12613410
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/613410 | Verification engine for user authentication | Nov 4, 2009 | Issued |
Array
(
[id] => 8633184
[patent_doc_number] => 08365284
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-01-29
[patent_title] => 'Method for protecting a packet-based network from attacks, and security border node'
[patent_app_type] => utility
[patent_app_number] => 12/457069
[patent_app_country] => US
[patent_app_date] => 2009-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 5480
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12457069
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/457069 | Method for protecting a packet-based network from attacks, and security border node | May 31, 2009 | Issued |
Array
(
[id] => 5457444
[patent_doc_number] => 20090257596
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-10-15
[patent_title] => 'Managing Document Access'
[patent_app_type] => utility
[patent_app_number] => 12/419011
[patent_app_country] => US
[patent_app_date] => 2009-04-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3249
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0257/20090257596.pdf
[firstpage_image] =>[orig_patent_app_number] => 12419011
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/419011 | Managing document access | Apr 5, 2009 | Issued |