
Benjamin A. Kaplan
Examiner (ID: 9890, Phone: (571)270-3170 , Office: P/2434 )
| Most Active Art Unit | 2434 |
| Art Unit(s) | 2434, 2439, 2139 |
| Total Applications | 734 |
| Issued Applications | 624 |
| Pending Applications | 46 |
| Abandoned Applications | 82 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 6052768
[patent_doc_number] => 20110209200
[patent_country] => US
[patent_kind] => A2
[patent_issue_date] => 2011-08-25
[patent_title] => 'METHODS AND SYSTEMS FOR AUTHENTICATING USERS'
[patent_app_type] => utility
[patent_app_number] => 12/535720
[patent_app_country] => US
[patent_app_date] => 2009-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 16362
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A2/0209/20110209200.pdf
[firstpage_image] =>[orig_patent_app_number] => 12535720
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/535720 | Methods and systems for authenticating users | Aug 4, 2009 | Issued |
Array
(
[id] => 9242532
[patent_doc_number] => 08607338
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-12-10
[patent_title] => 'Malicious advertisement management'
[patent_app_type] => utility
[patent_app_number] => 12/535514
[patent_app_country] => US
[patent_app_date] => 2009-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3086
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 284
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12535514
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/535514 | Malicious advertisement management | Aug 3, 2009 | Issued |
Array
(
[id] => 5957320
[patent_doc_number] => 20110035796
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-02-10
[patent_title] => 'Providing Differentiated Network Services and Priorities to VPN Routers/Clients'
[patent_app_type] => utility
[patent_app_number] => 12/535555
[patent_app_country] => US
[patent_app_date] => 2009-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5065
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0035/20110035796.pdf
[firstpage_image] =>[orig_patent_app_number] => 12535555
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/535555 | Providing differentiated network services and priorities to VPN routers/clients | Aug 3, 2009 | Issued |
Array
(
[id] => 9218678
[patent_doc_number] => 08631488
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-01-14
[patent_title] => 'Systems and methods for providing security services during power management mode'
[patent_app_type] => utility
[patent_app_number] => 12/535650
[patent_app_country] => US
[patent_app_date] => 2009-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 22
[patent_no_of_words] => 17838
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12535650
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/535650 | Systems and methods for providing security services during power management mode | Aug 3, 2009 | Issued |
Array
(
[id] => 6109259
[patent_doc_number] => 20110188658
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-08-04
[patent_title] => 'COMMUNICATION APPARATUS, COMMUNICATION METHOD, AND COMPUTER PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/061124
[patent_app_country] => US
[patent_app_date] => 2009-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 12463
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0188/20110188658.pdf
[firstpage_image] =>[orig_patent_app_number] => 13061124
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/061124 | Communication apparatus, communication method, and computer program | Jul 16, 2009 | Issued |
Array
(
[id] => 5967902
[patent_doc_number] => 20110150225
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-23
[patent_title] => 'ENCRYPTION DEVICES FOR BLOCK HAVING DOUBLE BLOCK LENGTH, DECRYPTION DEVICES, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAMS THEREOF'
[patent_app_type] => utility
[patent_app_number] => 13/060580
[patent_app_country] => US
[patent_app_date] => 2009-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7207
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0150/20110150225.pdf
[firstpage_image] =>[orig_patent_app_number] => 13060580
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/060580 | ENCRYPTION DEVICES FOR BLOCK HAVING DOUBLE BLOCK LENGTH, DECRYPTION DEVICES, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAMS THEREOF | May 21, 2009 | Abandoned |
Array
(
[id] => 9652550
[patent_doc_number] => 08806587
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-08-12
[patent_title] => 'Method and system for authenticating a network node in a UAM-based WLAN network'
[patent_app_type] => utility
[patent_app_number] => 13/059898
[patent_app_country] => US
[patent_app_date] => 2009-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9458
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 398
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13059898
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/059898 | Method and system for authenticating a network node in a UAM-based WLAN network | Apr 6, 2009 | Issued |
Array
(
[id] => 9029979
[patent_doc_number] => 08539577
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-09-17
[patent_title] => 'System and method for fast flux detection'
[patent_app_type] => utility
[patent_app_number] => 12/393913
[patent_app_country] => US
[patent_app_date] => 2009-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6380
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12393913
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/393913 | System and method for fast flux detection | Feb 25, 2009 | Issued |
Array
(
[id] => 6494847
[patent_doc_number] => 20100215172
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-08-26
[patent_title] => 'SHARING A SECRET WITH MODULAR INVERSES'
[patent_app_type] => utility
[patent_app_number] => 12/393967
[patent_app_country] => US
[patent_app_date] => 2009-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6368
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0215/20100215172.pdf
[firstpage_image] =>[orig_patent_app_number] => 12393967
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/393967 | Sharing a secret with modular inverses | Feb 25, 2009 | Issued |
Array
(
[id] => 6536485
[patent_doc_number] => 20100218241
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-08-26
[patent_title] => 'AUTHENTICATION USING A WIRELESS MOBILE COMMUNICATION DEVICE'
[patent_app_type] => utility
[patent_app_number] => 12/393905
[patent_app_country] => US
[patent_app_date] => 2009-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 9765
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0218/20100218241.pdf
[firstpage_image] =>[orig_patent_app_number] => 12393905
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/393905 | Authentication using a wireless mobile communication device | Feb 25, 2009 | Issued |
Array
(
[id] => 8546632
[patent_doc_number] => 08321935
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-11-27
[patent_title] => 'Identifying originators of malware'
[patent_app_type] => utility
[patent_app_number] => 12/393957
[patent_app_country] => US
[patent_app_date] => 2009-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2873
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12393957
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/393957 | Identifying originators of malware | Feb 25, 2009 | Issued |
Array
(
[id] => 6640200
[patent_doc_number] => 20100005319
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-01-07
[patent_title] => 'HARDWARE PROTECTION FOR ENCRYPTED STRINGS AND PROTECTION OF SECURITY PARAMETERS'
[patent_app_type] => utility
[patent_app_number] => 12/394026
[patent_app_country] => US
[patent_app_date] => 2009-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1354
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0005/20100005319.pdf
[firstpage_image] =>[orig_patent_app_number] => 12394026
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/394026 | Hardware protection for encrypted strings and protection of security parameters | Feb 25, 2009 | Issued |
Array
(
[id] => 9404997
[patent_doc_number] => 08695062
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-04-08
[patent_title] => 'Authentication/authorization protocol for media processing components'
[patent_app_type] => utility
[patent_app_number] => 12/358828
[patent_app_country] => US
[patent_app_date] => 2009-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5234
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12358828
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/358828 | Authentication/authorization protocol for media processing components | Jan 22, 2009 | Issued |
Array
(
[id] => 5381674
[patent_doc_number] => 20090193513
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-07-30
[patent_title] => 'POLICY DRIVEN FINE GRAIN URL ENCODING MECHANISM FOR SSL VPN CLIENTLESS ACCESS'
[patent_app_type] => utility
[patent_app_number] => 12/359101
[patent_app_country] => US
[patent_app_date] => 2009-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 25530
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0193/20090193513.pdf
[firstpage_image] =>[orig_patent_app_number] => 12359101
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/359101 | Policy driven fine grain URL encoding mechanism for SSL VPN clientless access | Jan 22, 2009 | Issued |
Array
(
[id] => 11239277
[patent_doc_number] => 09465922
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-11
[patent_title] => 'Methods for secure data distribution'
[patent_app_type] => utility
[patent_app_number] => 12/357745
[patent_app_country] => US
[patent_app_date] => 2009-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4447
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12357745
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/357745 | Methods for secure data distribution | Jan 21, 2009 | Issued |
Array
(
[id] => 6467377
[patent_doc_number] => 20100146601
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-10
[patent_title] => 'Method for Exercising Digital Rights via a Proxy'
[patent_app_type] => utility
[patent_app_number] => 12/330867
[patent_app_country] => US
[patent_app_date] => 2008-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4502
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0146/20100146601.pdf
[firstpage_image] =>[orig_patent_app_number] => 12330867
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/330867 | Method for Exercising Digital Rights via a Proxy | Dec 8, 2008 | Abandoned |
Array
(
[id] => 9650922
[patent_doc_number] => 08804950
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-08-12
[patent_title] => 'Methods and apparatus for producing a hash value based on a hash function'
[patent_app_type] => utility
[patent_app_number] => 12/242158
[patent_app_country] => US
[patent_app_date] => 2008-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 9787
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12242158
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/242158 | Methods and apparatus for producing a hash value based on a hash function | Sep 29, 2008 | Issued |
Array
(
[id] => 5292361
[patent_doc_number] => 20090025091
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-01-22
[patent_title] => 'ELECTRONIC APPARATUS AND INFORMATION PROCESSING APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 12/239948
[patent_app_country] => US
[patent_app_date] => 2008-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 21548
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0025/20090025091.pdf
[firstpage_image] =>[orig_patent_app_number] => 12239948
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/239948 | Electronic apparatus and information processing apparatus | Sep 28, 2008 | Issued |
Array
(
[id] => 8631755
[patent_doc_number] => 08363839
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-01-29
[patent_title] => 'Image forming apparatus'
[patent_app_type] => utility
[patent_app_number] => 12/239043
[patent_app_country] => US
[patent_app_date] => 2008-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 12
[patent_no_of_words] => 6585
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 397
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12239043
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/239043 | Image forming apparatus | Sep 25, 2008 | Issued |
Array
(
[id] => 6386274
[patent_doc_number] => 20100077467
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-03-25
[patent_title] => 'AUTHENTICATION SERVICE FOR SEAMLESS APPLICATION OPERATION'
[patent_app_type] => utility
[patent_app_number] => 12/233825
[patent_app_country] => US
[patent_app_date] => 2008-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5260
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0077/20100077467.pdf
[firstpage_image] =>[orig_patent_app_number] => 12233825
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/233825 | AUTHENTICATION SERVICE FOR SEAMLESS APPLICATION OPERATION | Sep 18, 2008 | Abandoned |