Michael W Hoye
Examiner (ID: 12389)
Most Active Art Unit | 2614 |
Art Unit(s) | 2614, 2623 |
Total Applications | 84 |
Issued Applications | 54 |
Pending Applications | 0 |
Abandoned Applications | 30 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 411447
[patent_doc_number] => 07287165
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2007-10-23
[patent_title] => 'IC card, portable terminal, and access control method'
[patent_app_type] => utility
[patent_app_number] => 10/419941
[patent_app_country] => US
[patent_app_date] => 2003-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6839
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/287/07287165.pdf
[firstpage_image] =>[orig_patent_app_number] => 10419941
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/419941 | IC card, portable terminal, and access control method | Apr 21, 2003 | Issued |
Array
(
[id] => 7443385
[patent_doc_number] => 20040210770
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-10-21
[patent_title] => 'Use of pseudonyms vs. real names'
[patent_app_type] => new
[patent_app_number] => 10/418904
[patent_app_country] => US
[patent_app_date] => 2003-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3398
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 51
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0210/20040210770.pdf
[firstpage_image] =>[orig_patent_app_number] => 10418904
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/418904 | Use of pseudonyms vs. real names | Apr 16, 2003 | Issued |
Array
(
[id] => 534957
[patent_doc_number] => 07194627
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2007-03-20
[patent_title] => 'Method and system for data encryption and decryption'
[patent_app_type] => utility
[patent_app_number] => 10/414844
[patent_app_country] => US
[patent_app_date] => 2003-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4003
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 12
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/194/07194627.pdf
[firstpage_image] =>[orig_patent_app_number] => 10414844
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/414844 | Method and system for data encryption and decryption | Apr 14, 2003 | Issued |
Array
(
[id] => 478346
[patent_doc_number] => 07231516
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2007-06-12
[patent_title] => 'Networked digital video recording system with copy protection and random access playback'
[patent_app_type] => utility
[patent_app_number] => 10/411063
[patent_app_country] => US
[patent_app_date] => 2003-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9621
[patent_no_of_claims] => 38
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/231/07231516.pdf
[firstpage_image] =>[orig_patent_app_number] => 10411063
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/411063 | Networked digital video recording system with copy protection and random access playback | Apr 9, 2003 | Issued |
Array
(
[id] => 7174031
[patent_doc_number] => 20050123132
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-06-09
[patent_title] => 'Method and apparatus for preventing cloning of security elements'
[patent_app_type] => utility
[patent_app_number] => 10/496444
[patent_app_country] => US
[patent_app_date] => 2003-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3834
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0123/20050123132.pdf
[firstpage_image] =>[orig_patent_app_number] => 10496444
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/496444 | Method and apparatus for preventing cloning of security elements | Mar 30, 2003 | Issued |
Array
(
[id] => 7102280
[patent_doc_number] => 20050105006
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-05-19
[patent_title] => 'Production line boot sector lock'
[patent_app_type] => utility
[patent_app_number] => 10/507866
[patent_app_country] => US
[patent_app_date] => 2003-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2309
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0105/20050105006.pdf
[firstpage_image] =>[orig_patent_app_number] => 10507866
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/507866 | Production line boot sector lock | Mar 18, 2003 | Issued |
Array
(
[id] => 469457
[patent_doc_number] => 07240213
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2007-07-03
[patent_title] => 'System trustworthiness tool and methodology'
[patent_app_type] => utility
[patent_app_number] => 10/387419
[patent_app_country] => US
[patent_app_date] => 2003-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 17975
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 15
[patent_words_short_claim] => 43
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/240/07240213.pdf
[firstpage_image] =>[orig_patent_app_number] => 10387419
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/387419 | System trustworthiness tool and methodology | Mar 13, 2003 | Issued |
Array
(
[id] => 6710133
[patent_doc_number] => 20030169882
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2003-09-11
[patent_title] => 'Method for negotiating weakened keys in encryption systems'
[patent_app_type] => new
[patent_app_number] => 10/389364
[patent_app_country] => US
[patent_app_date] => 2003-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3670
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0169/20030169882.pdf
[firstpage_image] =>[orig_patent_app_number] => 10389364
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/389364 | Method for negotiating weakened keys in encryption systems | Mar 13, 2003 | Issued |
Array
(
[id] => 745088
[patent_doc_number] => 07036024
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2006-04-25
[patent_title] => 'Detecting collusion among multiple recipients of fingerprinted information'
[patent_app_type] => utility
[patent_app_number] => 10/378046
[patent_app_country] => US
[patent_app_date] => 2003-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 9922
[patent_no_of_claims] => 110
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/036/07036024.pdf
[firstpage_image] =>[orig_patent_app_number] => 10378046
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/378046 | Detecting collusion among multiple recipients of fingerprinted information | Feb 27, 2003 | Issued |
Array
(
[id] => 1297273
[patent_doc_number] => 06633985
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2003-10-14
[patent_title] => 'System and method for videoconferencing across networks separated by a firewall'
[patent_app_type] => B2
[patent_app_number] => 10/364963
[patent_app_country] => US
[patent_app_date] => 2003-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7033
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 68
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/633/06633985.pdf
[firstpage_image] =>[orig_patent_app_number] => 10364963
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/364963 | System and method for videoconferencing across networks separated by a firewall | Feb 10, 2003 | Issued |
Array
(
[id] => 6844551
[patent_doc_number] => 20030149898
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2003-08-07
[patent_title] => 'Network system'
[patent_app_type] => new
[patent_app_number] => 10/357346
[patent_app_country] => US
[patent_app_date] => 2003-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4966
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0149/20030149898.pdf
[firstpage_image] =>[orig_patent_app_number] => 10357346
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/357346 | Network system | Feb 3, 2003 | Issued |
Array
(
[id] => 7284382
[patent_doc_number] => 20040145773
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-07-29
[patent_title] => 'Message authorization system and method'
[patent_app_type] => new
[patent_app_number] => 10/353579
[patent_app_country] => US
[patent_app_date] => 2003-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5387
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0145/20040145773.pdf
[firstpage_image] =>[orig_patent_app_number] => 10353579
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/353579 | Message authorization system and method | Jan 28, 2003 | Issued |
Array
(
[id] => 908532
[patent_doc_number] => 07337320
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-02-26
[patent_title] => 'Streaming system for distributing encrypted data, and streaming method therefor'
[patent_app_type] => utility
[patent_app_number] => 10/473436
[patent_app_country] => US
[patent_app_date] => 2003-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 13
[patent_no_of_words] => 6990
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 61
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/337/07337320.pdf
[firstpage_image] =>[orig_patent_app_number] => 10473436
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/473436 | Streaming system for distributing encrypted data, and streaming method therefor | Jan 27, 2003 | Issued |
Array
(
[id] => 503945
[patent_doc_number] => 07213143
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2007-05-01
[patent_title] => 'Security over a network'
[patent_app_type] => utility
[patent_app_number] => 10/351935
[patent_app_country] => US
[patent_app_date] => 2003-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 5138
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 59
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/213/07213143.pdf
[firstpage_image] =>[orig_patent_app_number] => 10351935
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/351935 | Security over a network | Jan 26, 2003 | Issued |
Array
(
[id] => 485863
[patent_doc_number] => 07225343
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2007-05-29
[patent_title] => 'System and methods for adaptive model generation for detecting intrusions in computer systems'
[patent_app_type] => utility
[patent_app_number] => 10/352342
[patent_app_country] => US
[patent_app_date] => 2003-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 15350
[patent_no_of_claims] => 49
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/225/07225343.pdf
[firstpage_image] =>[orig_patent_app_number] => 10352342
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/352342 | System and methods for adaptive model generation for detecting intrusions in computer systems | Jan 26, 2003 | Issued |
Array
(
[id] => 559811
[patent_doc_number] => 07178032
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2007-02-13
[patent_title] => 'Peripheral apparatus, server, information processing system, and control method'
[patent_app_type] => utility
[patent_app_number] => 10/347935
[patent_app_country] => US
[patent_app_date] => 2003-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 5383
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/178/07178032.pdf
[firstpage_image] =>[orig_patent_app_number] => 10347935
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/347935 | Peripheral apparatus, server, information processing system, and control method | Jan 21, 2003 | Issued |
Array
(
[id] => 1279704
[patent_doc_number] => 06654884
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2003-11-25
[patent_title] => 'Hardware-level mitigation and DPA countermeasures for cryptographic devices'
[patent_app_type] => B2
[patent_app_number] => 10/346848
[patent_app_country] => US
[patent_app_date] => 2003-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 9362
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/654/06654884.pdf
[firstpage_image] =>[orig_patent_app_number] => 10346848
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/346848 | Hardware-level mitigation and DPA countermeasures for cryptographic devices | Jan 16, 2003 | Issued |
Array
(
[id] => 633394
[patent_doc_number] => 07134015
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2006-11-07
[patent_title] => 'Security enhancements for pervasive devices'
[patent_app_type] => utility
[patent_app_number] => 10/345646
[patent_app_country] => US
[patent_app_date] => 2003-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5023
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 63
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/134/07134015.pdf
[firstpage_image] =>[orig_patent_app_number] => 10345646
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/345646 | Security enhancements for pervasive devices | Jan 15, 2003 | Issued |
Array
(
[id] => 7609997
[patent_doc_number] => 06842862
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2005-01-11
[patent_title] => 'Tamper resistant software encoding'
[patent_app_type] => utility
[patent_app_number] => 10/340410
[patent_app_country] => US
[patent_app_date] => 2003-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 13443
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 54
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/842/06842862.pdf
[firstpage_image] =>[orig_patent_app_number] => 10340410
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/340410 | Tamper resistant software encoding | Jan 9, 2003 | Issued |
Array
(
[id] => 7673618
[patent_doc_number] => 20040128500
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-07-01
[patent_title] => 'Method and apparatus for strong authentication and proximity-based access retention'
[patent_app_type] => new
[patent_app_number] => 10/334740
[patent_app_country] => US
[patent_app_date] => 2002-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4455
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 50
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0128/20040128500.pdf
[firstpage_image] =>[orig_patent_app_number] => 10334740
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/334740 | Method and apparatus for strong authentication and proximity-based access retention | Dec 30, 2002 | Issued |