Arthur L Corbin
Examiner (ID: 11454)
Most Active Art Unit | 1302 |
Art Unit(s) | 1302, 1794, 1761 |
Total Applications | 1985 |
Issued Applications | 1221 |
Pending Applications | 190 |
Abandoned Applications | 573 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 5187509
[patent_doc_number] => 20070165817
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-07-19
[patent_title] => 'METHOD AND SYSTEM FOR IMPLEMENTATION OF TERMINAL CONFIGURATION DATA PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 11/611079
[patent_app_country] => US
[patent_app_date] => 2006-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3968
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0165/20070165817.pdf
[firstpage_image] =>[orig_patent_app_number] => 11611079
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/611079 | METHOD AND SYSTEM FOR IMPLEMENTATION OF TERMINAL CONFIGURATION DATA PROTECTION | Dec 13, 2006 | Abandoned |
Array
(
[id] => 4905572
[patent_doc_number] => 20080114986
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-05-15
[patent_title] => 'Techniques for modification of access expiration conditions'
[patent_app_type] => utility
[patent_app_number] => 11/590268
[patent_app_country] => US
[patent_app_date] => 2006-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5229
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0114/20080114986.pdf
[firstpage_image] =>[orig_patent_app_number] => 11590268
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/590268 | Techniques for modification of access expiration conditions | Oct 30, 2006 | Issued |
Array
(
[id] => 4895574
[patent_doc_number] => 20080104674
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-05-01
[patent_title] => 'System and method of filtering unsolicited messages'
[patent_app_type] => utility
[patent_app_number] => 11/589249
[patent_app_country] => US
[patent_app_date] => 2006-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4529
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0104/20080104674.pdf
[firstpage_image] =>[orig_patent_app_number] => 11589249
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/589249 | System and method of filtering unsolicited messages | Oct 29, 2006 | Issued |
Array
(
[id] => 8741419
[patent_doc_number] => 08413208
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-04-02
[patent_title] => 'Access control and protocol/policy determination based on the client\'s environment'
[patent_app_type] => utility
[patent_app_number] => 11/589208
[patent_app_country] => US
[patent_app_date] => 2006-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 2413
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 284
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11589208
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/589208 | Access control and protocol/policy determination based on the client's environment | Oct 29, 2006 | Issued |
Array
(
[id] => 5571603
[patent_doc_number] => 20090254982
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-10-08
[patent_title] => 'METHODS, PROGRAMS AND A SYSTEM OF PROVIDING REMOTE ACCESS'
[patent_app_type] => utility
[patent_app_number] => 12/440306
[patent_app_country] => US
[patent_app_date] => 2006-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3408
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0254/20090254982.pdf
[firstpage_image] =>[orig_patent_app_number] => 12440306
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/440306 | METHODS, PROGRAMS AND A SYSTEM OF PROVIDING REMOTE ACCESS | Oct 22, 2006 | Abandoned |
Array
(
[id] => 5036582
[patent_doc_number] => 20070101121
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-05-03
[patent_title] => 'Secure IP access protocol framework and supporting network architecture'
[patent_app_type] => utility
[patent_app_number] => 11/522780
[patent_app_country] => US
[patent_app_date] => 2006-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5041
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0101/20070101121.pdf
[firstpage_image] =>[orig_patent_app_number] => 11522780
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/522780 | Secure IP access protocol framework and supporting network architecture | Sep 17, 2006 | Abandoned |
Array
(
[id] => 5108743
[patent_doc_number] => 20070067621
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-03-22
[patent_title] => 'Storage of digital data'
[patent_app_type] => utility
[patent_app_number] => 11/522118
[patent_app_country] => US
[patent_app_date] => 2006-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2762
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0067/20070067621.pdf
[firstpage_image] =>[orig_patent_app_number] => 11522118
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/522118 | Storage of digital data | Sep 14, 2006 | Issued |
Array
(
[id] => 5309246
[patent_doc_number] => 20090016527
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-01-15
[patent_title] => 'METHOD OF ESTABLISHING A SESSION KEY AND UNITS FOR IMPLEMENTING THE METHOD'
[patent_app_type] => utility
[patent_app_number] => 12/064781
[patent_app_country] => US
[patent_app_date] => 2006-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6960
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0016/20090016527.pdf
[firstpage_image] =>[orig_patent_app_number] => 12064781
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/064781 | METHOD OF ESTABLISHING A SESSION KEY AND UNITS FOR IMPLEMENTING THE METHOD | Aug 24, 2006 | Abandoned |
Array
(
[id] => 8899469
[patent_doc_number] => 08479003
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-02
[patent_title] => 'Electronic signature validation systems and methods for asynchronous environments'
[patent_app_type] => utility
[patent_app_number] => 11/507144
[patent_app_country] => US
[patent_app_date] => 2006-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 6374
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 282
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11507144
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/507144 | Electronic signature validation systems and methods for asynchronous environments | Aug 20, 2006 | Issued |
Array
(
[id] => 4911321
[patent_doc_number] => 20080022088
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-01-24
[patent_title] => 'Methods and systems for key escrow'
[patent_app_type] => utility
[patent_app_number] => 11/446956
[patent_app_country] => US
[patent_app_date] => 2006-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5125
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0022/20080022088.pdf
[firstpage_image] =>[orig_patent_app_number] => 11446956
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/446956 | Methods and systems for key escrow | Jun 5, 2006 | Abandoned |
Array
(
[id] => 5122144
[patent_doc_number] => 20070143859
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-06-21
[patent_title] => 'Access right management apparatus, method and storage medium'
[patent_app_type] => utility
[patent_app_number] => 11/445102
[patent_app_country] => US
[patent_app_date] => 2006-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5645
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0143/20070143859.pdf
[firstpage_image] =>[orig_patent_app_number] => 11445102
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/445102 | Access right management apparatus, method and storage medium | May 31, 2006 | Abandoned |
Array
(
[id] => 5100332
[patent_doc_number] => 20070183594
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-08-09
[patent_title] => 'Data processing apparatus for performing a cryptographic method'
[patent_app_type] => utility
[patent_app_number] => 11/440109
[patent_app_country] => US
[patent_app_date] => 2006-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 5724
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0183/20070183594.pdf
[firstpage_image] =>[orig_patent_app_number] => 11440109
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/440109 | Data processing apparatus for performing a cryptographic method | May 24, 2006 | Abandoned |
Array
(
[id] => 5641587
[patent_doc_number] => 20060280042
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-12-14
[patent_title] => 'Apparatus for reproducing copyrighted data'
[patent_app_type] => utility
[patent_app_number] => 11/438018
[patent_app_country] => US
[patent_app_date] => 2006-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2910
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0280/20060280042.pdf
[firstpage_image] =>[orig_patent_app_number] => 11438018
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/438018 | Apparatus for reproducing copyrighted data | May 18, 2006 | Abandoned |
Array
(
[id] => 5161579
[patent_doc_number] => 20070174623
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-07-26
[patent_title] => 'Detecting collusion among multiple recipients of fingerprinted information'
[patent_app_type] => utility
[patent_app_number] => 11/406066
[patent_app_country] => US
[patent_app_date] => 2006-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9985
[patent_no_of_claims] => 111
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0174/20070174623.pdf
[firstpage_image] =>[orig_patent_app_number] => 11406066
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/406066 | Detecting collusion among multiple recipients of fingerprinted information | Apr 17, 2006 | Abandoned |
Array
(
[id] => 4678440
[patent_doc_number] => 20080216071
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-09-04
[patent_title] => 'Software Protection'
[patent_app_type] => utility
[patent_app_number] => 11/910530
[patent_app_country] => US
[patent_app_date] => 2006-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2018
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0216/20080216071.pdf
[firstpage_image] =>[orig_patent_app_number] => 11910530
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/910530 | Software Protection | Apr 2, 2006 | Abandoned |
Array
(
[id] => 4650519
[patent_doc_number] => 20080037775
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-02-14
[patent_title] => 'Verifiable generation of weak symmetric keys for strong algorithms'
[patent_app_type] => utility
[patent_app_number] => 11/395877
[patent_app_country] => US
[patent_app_date] => 2006-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6255
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0037/20080037775.pdf
[firstpage_image] =>[orig_patent_app_number] => 11395877
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/395877 | Verifiable generation of weak symmetric keys for strong algorithms | Mar 30, 2006 | Abandoned |
Array
(
[id] => 883834
[patent_doc_number] => 07356143
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-04-08
[patent_title] => 'System, method, and apparatus for securely providing content viewable on a secure device'
[patent_app_type] => utility
[patent_app_number] => 11/361469
[patent_app_country] => US
[patent_app_date] => 2006-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7976
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/356/07356143.pdf
[firstpage_image] =>[orig_patent_app_number] => 11361469
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/361469 | System, method, and apparatus for securely providing content viewable on a secure device | Feb 23, 2006 | Issued |
Array
(
[id] => 5238298
[patent_doc_number] => 20070130455
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-06-07
[patent_title] => 'Series encryption in a quantum cryptographic system'
[patent_app_type] => utility
[patent_app_number] => 11/294413
[patent_app_country] => US
[patent_app_date] => 2005-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5187
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0130/20070130455.pdf
[firstpage_image] =>[orig_patent_app_number] => 11294413
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/294413 | Series encryption in a quantum cryptographic system | Dec 5, 2005 | Abandoned |
Array
(
[id] => 5081593
[patent_doc_number] => 20070124817
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-05-31
[patent_title] => 'Message security framework'
[patent_app_type] => utility
[patent_app_number] => 11/291032
[patent_app_country] => US
[patent_app_date] => 2005-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5924
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0124/20070124817.pdf
[firstpage_image] =>[orig_patent_app_number] => 11291032
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/291032 | Message security framework | Nov 29, 2005 | Issued |
Array
(
[id] => 5106065
[patent_doc_number] => 20070064941
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-03-22
[patent_title] => 'Control 3 signal synthesis'
[patent_app_type] => utility
[patent_app_number] => 11/214097
[patent_app_country] => US
[patent_app_date] => 2005-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4762
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0064/20070064941.pdf
[firstpage_image] =>[orig_patent_app_number] => 11214097
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/214097 | Control 3 signal synthesis | Aug 28, 2005 | Issued |