Search

Arthur L Corbin

Examiner (ID: 11454)

Most Active Art Unit
1302
Art Unit(s)
1302, 1794, 1761
Total Applications
1985
Issued Applications
1221
Pending Applications
190
Abandoned Applications
573

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 5187509 [patent_doc_number] => 20070165817 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-07-19 [patent_title] => 'METHOD AND SYSTEM FOR IMPLEMENTATION OF TERMINAL CONFIGURATION DATA PROTECTION' [patent_app_type] => utility [patent_app_number] => 11/611079 [patent_app_country] => US [patent_app_date] => 2006-12-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3968 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0165/20070165817.pdf [firstpage_image] =>[orig_patent_app_number] => 11611079 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/611079
METHOD AND SYSTEM FOR IMPLEMENTATION OF TERMINAL CONFIGURATION DATA PROTECTION Dec 13, 2006 Abandoned
Array ( [id] => 4905572 [patent_doc_number] => 20080114986 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-05-15 [patent_title] => 'Techniques for modification of access expiration conditions' [patent_app_type] => utility [patent_app_number] => 11/590268 [patent_app_country] => US [patent_app_date] => 2006-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5229 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0114/20080114986.pdf [firstpage_image] =>[orig_patent_app_number] => 11590268 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/590268
Techniques for modification of access expiration conditions Oct 30, 2006 Issued
Array ( [id] => 4895574 [patent_doc_number] => 20080104674 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-05-01 [patent_title] => 'System and method of filtering unsolicited messages' [patent_app_type] => utility [patent_app_number] => 11/589249 [patent_app_country] => US [patent_app_date] => 2006-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4529 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0104/20080104674.pdf [firstpage_image] =>[orig_patent_app_number] => 11589249 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/589249
System and method of filtering unsolicited messages Oct 29, 2006 Issued
Array ( [id] => 8741419 [patent_doc_number] => 08413208 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-04-02 [patent_title] => 'Access control and protocol/policy determination based on the client\'s environment' [patent_app_type] => utility [patent_app_number] => 11/589208 [patent_app_country] => US [patent_app_date] => 2006-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 2413 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 284 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11589208 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/589208
Access control and protocol/policy determination based on the client's environment Oct 29, 2006 Issued
Array ( [id] => 5571603 [patent_doc_number] => 20090254982 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-10-08 [patent_title] => 'METHODS, PROGRAMS AND A SYSTEM OF PROVIDING REMOTE ACCESS' [patent_app_type] => utility [patent_app_number] => 12/440306 [patent_app_country] => US [patent_app_date] => 2006-10-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3408 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0254/20090254982.pdf [firstpage_image] =>[orig_patent_app_number] => 12440306 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/440306
METHODS, PROGRAMS AND A SYSTEM OF PROVIDING REMOTE ACCESS Oct 22, 2006 Abandoned
Array ( [id] => 5036582 [patent_doc_number] => 20070101121 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-05-03 [patent_title] => 'Secure IP access protocol framework and supporting network architecture' [patent_app_type] => utility [patent_app_number] => 11/522780 [patent_app_country] => US [patent_app_date] => 2006-09-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5041 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0101/20070101121.pdf [firstpage_image] =>[orig_patent_app_number] => 11522780 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/522780
Secure IP access protocol framework and supporting network architecture Sep 17, 2006 Abandoned
Array ( [id] => 5108743 [patent_doc_number] => 20070067621 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-03-22 [patent_title] => 'Storage of digital data' [patent_app_type] => utility [patent_app_number] => 11/522118 [patent_app_country] => US [patent_app_date] => 2006-09-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2762 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 10 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0067/20070067621.pdf [firstpage_image] =>[orig_patent_app_number] => 11522118 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/522118
Storage of digital data Sep 14, 2006 Issued
Array ( [id] => 5309246 [patent_doc_number] => 20090016527 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-15 [patent_title] => 'METHOD OF ESTABLISHING A SESSION KEY AND UNITS FOR IMPLEMENTING THE METHOD' [patent_app_type] => utility [patent_app_number] => 12/064781 [patent_app_country] => US [patent_app_date] => 2006-08-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6960 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0016/20090016527.pdf [firstpage_image] =>[orig_patent_app_number] => 12064781 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/064781
METHOD OF ESTABLISHING A SESSION KEY AND UNITS FOR IMPLEMENTING THE METHOD Aug 24, 2006 Abandoned
Array ( [id] => 8899469 [patent_doc_number] => 08479003 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-07-02 [patent_title] => 'Electronic signature validation systems and methods for asynchronous environments' [patent_app_type] => utility [patent_app_number] => 11/507144 [patent_app_country] => US [patent_app_date] => 2006-08-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 6374 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 282 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11507144 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/507144
Electronic signature validation systems and methods for asynchronous environments Aug 20, 2006 Issued
Array ( [id] => 4911321 [patent_doc_number] => 20080022088 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-01-24 [patent_title] => 'Methods and systems for key escrow' [patent_app_type] => utility [patent_app_number] => 11/446956 [patent_app_country] => US [patent_app_date] => 2006-06-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5125 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0022/20080022088.pdf [firstpage_image] =>[orig_patent_app_number] => 11446956 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/446956
Methods and systems for key escrow Jun 5, 2006 Abandoned
Array ( [id] => 5122144 [patent_doc_number] => 20070143859 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-06-21 [patent_title] => 'Access right management apparatus, method and storage medium' [patent_app_type] => utility [patent_app_number] => 11/445102 [patent_app_country] => US [patent_app_date] => 2006-06-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5645 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0143/20070143859.pdf [firstpage_image] =>[orig_patent_app_number] => 11445102 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/445102
Access right management apparatus, method and storage medium May 31, 2006 Abandoned
Array ( [id] => 5100332 [patent_doc_number] => 20070183594 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-08-09 [patent_title] => 'Data processing apparatus for performing a cryptographic method' [patent_app_type] => utility [patent_app_number] => 11/440109 [patent_app_country] => US [patent_app_date] => 2006-05-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 5724 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0183/20070183594.pdf [firstpage_image] =>[orig_patent_app_number] => 11440109 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/440109
Data processing apparatus for performing a cryptographic method May 24, 2006 Abandoned
Array ( [id] => 5641587 [patent_doc_number] => 20060280042 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-12-14 [patent_title] => 'Apparatus for reproducing copyrighted data' [patent_app_type] => utility [patent_app_number] => 11/438018 [patent_app_country] => US [patent_app_date] => 2006-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2910 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0280/20060280042.pdf [firstpage_image] =>[orig_patent_app_number] => 11438018 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/438018
Apparatus for reproducing copyrighted data May 18, 2006 Abandoned
Array ( [id] => 5161579 [patent_doc_number] => 20070174623 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-07-26 [patent_title] => 'Detecting collusion among multiple recipients of fingerprinted information' [patent_app_type] => utility [patent_app_number] => 11/406066 [patent_app_country] => US [patent_app_date] => 2006-04-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 9985 [patent_no_of_claims] => 111 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0174/20070174623.pdf [firstpage_image] =>[orig_patent_app_number] => 11406066 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/406066
Detecting collusion among multiple recipients of fingerprinted information Apr 17, 2006 Abandoned
Array ( [id] => 4678440 [patent_doc_number] => 20080216071 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-09-04 [patent_title] => 'Software Protection' [patent_app_type] => utility [patent_app_number] => 11/910530 [patent_app_country] => US [patent_app_date] => 2006-04-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2018 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0216/20080216071.pdf [firstpage_image] =>[orig_patent_app_number] => 11910530 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/910530
Software Protection Apr 2, 2006 Abandoned
Array ( [id] => 4650519 [patent_doc_number] => 20080037775 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-02-14 [patent_title] => 'Verifiable generation of weak symmetric keys for strong algorithms' [patent_app_type] => utility [patent_app_number] => 11/395877 [patent_app_country] => US [patent_app_date] => 2006-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6255 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0037/20080037775.pdf [firstpage_image] =>[orig_patent_app_number] => 11395877 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/395877
Verifiable generation of weak symmetric keys for strong algorithms Mar 30, 2006 Abandoned
Array ( [id] => 883834 [patent_doc_number] => 07356143 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2008-04-08 [patent_title] => 'System, method, and apparatus for securely providing content viewable on a secure device' [patent_app_type] => utility [patent_app_number] => 11/361469 [patent_app_country] => US [patent_app_date] => 2006-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7976 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 173 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/356/07356143.pdf [firstpage_image] =>[orig_patent_app_number] => 11361469 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/361469
System, method, and apparatus for securely providing content viewable on a secure device Feb 23, 2006 Issued
Array ( [id] => 5238298 [patent_doc_number] => 20070130455 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-06-07 [patent_title] => 'Series encryption in a quantum cryptographic system' [patent_app_type] => utility [patent_app_number] => 11/294413 [patent_app_country] => US [patent_app_date] => 2005-12-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5187 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 10 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0130/20070130455.pdf [firstpage_image] =>[orig_patent_app_number] => 11294413 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/294413
Series encryption in a quantum cryptographic system Dec 5, 2005 Abandoned
Array ( [id] => 5081593 [patent_doc_number] => 20070124817 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-05-31 [patent_title] => 'Message security framework' [patent_app_type] => utility [patent_app_number] => 11/291032 [patent_app_country] => US [patent_app_date] => 2005-11-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 5924 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0124/20070124817.pdf [firstpage_image] =>[orig_patent_app_number] => 11291032 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/291032
Message security framework Nov 29, 2005 Issued
Array ( [id] => 5106065 [patent_doc_number] => 20070064941 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-03-22 [patent_title] => 'Control 3 signal synthesis' [patent_app_type] => utility [patent_app_number] => 11/214097 [patent_app_country] => US [patent_app_date] => 2005-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4762 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0064/20070064941.pdf [firstpage_image] =>[orig_patent_app_number] => 11214097 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/214097
Control 3 signal synthesis Aug 28, 2005 Issued
Menu