Search

Benjamin A. Kaplan

Examiner (ID: 9890, Phone: (571)270-3170 , Office: P/2434 )

Most Active Art Unit
2434
Art Unit(s)
2434, 2439, 2139
Total Applications
734
Issued Applications
624
Pending Applications
46
Abandoned Applications
82

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 6052768 [patent_doc_number] => 20110209200 [patent_country] => US [patent_kind] => A2 [patent_issue_date] => 2011-08-25 [patent_title] => 'METHODS AND SYSTEMS FOR AUTHENTICATING USERS' [patent_app_type] => utility [patent_app_number] => 12/535720 [patent_app_country] => US [patent_app_date] => 2009-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 16362 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A2/0209/20110209200.pdf [firstpage_image] =>[orig_patent_app_number] => 12535720 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/535720
Methods and systems for authenticating users Aug 4, 2009 Issued
Array ( [id] => 9242532 [patent_doc_number] => 08607338 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-12-10 [patent_title] => 'Malicious advertisement management' [patent_app_type] => utility [patent_app_number] => 12/535514 [patent_app_country] => US [patent_app_date] => 2009-08-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3086 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 284 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12535514 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/535514
Malicious advertisement management Aug 3, 2009 Issued
Array ( [id] => 5957320 [patent_doc_number] => 20110035796 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-02-10 [patent_title] => 'Providing Differentiated Network Services and Priorities to VPN Routers/Clients' [patent_app_type] => utility [patent_app_number] => 12/535555 [patent_app_country] => US [patent_app_date] => 2009-08-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5065 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0035/20110035796.pdf [firstpage_image] =>[orig_patent_app_number] => 12535555 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/535555
Providing differentiated network services and priorities to VPN routers/clients Aug 3, 2009 Issued
Array ( [id] => 9218678 [patent_doc_number] => 08631488 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-01-14 [patent_title] => 'Systems and methods for providing security services during power management mode' [patent_app_type] => utility [patent_app_number] => 12/535650 [patent_app_country] => US [patent_app_date] => 2009-08-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 22 [patent_no_of_words] => 17838 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 112 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12535650 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/535650
Systems and methods for providing security services during power management mode Aug 3, 2009 Issued
Array ( [id] => 6109259 [patent_doc_number] => 20110188658 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-08-04 [patent_title] => 'COMMUNICATION APPARATUS, COMMUNICATION METHOD, AND COMPUTER PROGRAM' [patent_app_type] => utility [patent_app_number] => 13/061124 [patent_app_country] => US [patent_app_date] => 2009-07-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 21 [patent_no_of_words] => 12463 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0188/20110188658.pdf [firstpage_image] =>[orig_patent_app_number] => 13061124 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/061124
Communication apparatus, communication method, and computer program Jul 16, 2009 Issued
Array ( [id] => 5967902 [patent_doc_number] => 20110150225 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-06-23 [patent_title] => 'ENCRYPTION DEVICES FOR BLOCK HAVING DOUBLE BLOCK LENGTH, DECRYPTION DEVICES, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAMS THEREOF' [patent_app_type] => utility [patent_app_number] => 13/060580 [patent_app_country] => US [patent_app_date] => 2009-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 7207 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0150/20110150225.pdf [firstpage_image] =>[orig_patent_app_number] => 13060580 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/060580
ENCRYPTION DEVICES FOR BLOCK HAVING DOUBLE BLOCK LENGTH, DECRYPTION DEVICES, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAMS THEREOF May 21, 2009 Abandoned
Array ( [id] => 9652550 [patent_doc_number] => 08806587 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-08-12 [patent_title] => 'Method and system for authenticating a network node in a UAM-based WLAN network' [patent_app_type] => utility [patent_app_number] => 13/059898 [patent_app_country] => US [patent_app_date] => 2009-04-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9458 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 398 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13059898 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/059898
Method and system for authenticating a network node in a UAM-based WLAN network Apr 6, 2009 Issued
Array ( [id] => 9029979 [patent_doc_number] => 08539577 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-09-17 [patent_title] => 'System and method for fast flux detection' [patent_app_type] => utility [patent_app_number] => 12/393913 [patent_app_country] => US [patent_app_date] => 2009-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6380 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 119 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12393913 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/393913
System and method for fast flux detection Feb 25, 2009 Issued
Array ( [id] => 6494847 [patent_doc_number] => 20100215172 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-08-26 [patent_title] => 'SHARING A SECRET WITH MODULAR INVERSES' [patent_app_type] => utility [patent_app_number] => 12/393967 [patent_app_country] => US [patent_app_date] => 2009-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6368 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0215/20100215172.pdf [firstpage_image] =>[orig_patent_app_number] => 12393967 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/393967
Sharing a secret with modular inverses Feb 25, 2009 Issued
Array ( [id] => 6536485 [patent_doc_number] => 20100218241 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-08-26 [patent_title] => 'AUTHENTICATION USING A WIRELESS MOBILE COMMUNICATION DEVICE' [patent_app_type] => utility [patent_app_number] => 12/393905 [patent_app_country] => US [patent_app_date] => 2009-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 9765 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0218/20100218241.pdf [firstpage_image] =>[orig_patent_app_number] => 12393905 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/393905
Authentication using a wireless mobile communication device Feb 25, 2009 Issued
Array ( [id] => 8546632 [patent_doc_number] => 08321935 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-11-27 [patent_title] => 'Identifying originators of malware' [patent_app_type] => utility [patent_app_number] => 12/393957 [patent_app_country] => US [patent_app_date] => 2009-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 2873 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12393957 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/393957
Identifying originators of malware Feb 25, 2009 Issued
Array ( [id] => 6640200 [patent_doc_number] => 20100005319 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-01-07 [patent_title] => 'HARDWARE PROTECTION FOR ENCRYPTED STRINGS AND PROTECTION OF SECURITY PARAMETERS' [patent_app_type] => utility [patent_app_number] => 12/394026 [patent_app_country] => US [patent_app_date] => 2009-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 1354 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0005/20100005319.pdf [firstpage_image] =>[orig_patent_app_number] => 12394026 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/394026
Hardware protection for encrypted strings and protection of security parameters Feb 25, 2009 Issued
Array ( [id] => 9404997 [patent_doc_number] => 08695062 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-04-08 [patent_title] => 'Authentication/authorization protocol for media processing components' [patent_app_type] => utility [patent_app_number] => 12/358828 [patent_app_country] => US [patent_app_date] => 2009-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5234 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 230 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12358828 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/358828
Authentication/authorization protocol for media processing components Jan 22, 2009 Issued
Array ( [id] => 5381674 [patent_doc_number] => 20090193513 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-07-30 [patent_title] => 'POLICY DRIVEN FINE GRAIN URL ENCODING MECHANISM FOR SSL VPN CLIENTLESS ACCESS' [patent_app_type] => utility [patent_app_number] => 12/359101 [patent_app_country] => US [patent_app_date] => 2009-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 25530 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0193/20090193513.pdf [firstpage_image] =>[orig_patent_app_number] => 12359101 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/359101
Policy driven fine grain URL encoding mechanism for SSL VPN clientless access Jan 22, 2009 Issued
Array ( [id] => 11239277 [patent_doc_number] => 09465922 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-10-11 [patent_title] => 'Methods for secure data distribution' [patent_app_type] => utility [patent_app_number] => 12/357745 [patent_app_country] => US [patent_app_date] => 2009-01-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 4447 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 246 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12357745 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/357745
Methods for secure data distribution Jan 21, 2009 Issued
Array ( [id] => 6467377 [patent_doc_number] => 20100146601 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-06-10 [patent_title] => 'Method for Exercising Digital Rights via a Proxy' [patent_app_type] => utility [patent_app_number] => 12/330867 [patent_app_country] => US [patent_app_date] => 2008-12-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4502 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0146/20100146601.pdf [firstpage_image] =>[orig_patent_app_number] => 12330867 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/330867
Method for Exercising Digital Rights via a Proxy Dec 8, 2008 Abandoned
Array ( [id] => 9650922 [patent_doc_number] => 08804950 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-08-12 [patent_title] => 'Methods and apparatus for producing a hash value based on a hash function' [patent_app_type] => utility [patent_app_number] => 12/242158 [patent_app_country] => US [patent_app_date] => 2008-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 9 [patent_no_of_words] => 9787 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 77 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12242158 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/242158
Methods and apparatus for producing a hash value based on a hash function Sep 29, 2008 Issued
Array ( [id] => 5292361 [patent_doc_number] => 20090025091 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-22 [patent_title] => 'ELECTRONIC APPARATUS AND INFORMATION PROCESSING APPARATUS' [patent_app_type] => utility [patent_app_number] => 12/239948 [patent_app_country] => US [patent_app_date] => 2008-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 21548 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0025/20090025091.pdf [firstpage_image] =>[orig_patent_app_number] => 12239948 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/239948
Electronic apparatus and information processing apparatus Sep 28, 2008 Issued
Array ( [id] => 8631755 [patent_doc_number] => 08363839 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-01-29 [patent_title] => 'Image forming apparatus' [patent_app_type] => utility [patent_app_number] => 12/239043 [patent_app_country] => US [patent_app_date] => 2008-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 12 [patent_no_of_words] => 6585 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 397 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12239043 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/239043
Image forming apparatus Sep 25, 2008 Issued
Array ( [id] => 6386274 [patent_doc_number] => 20100077467 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-03-25 [patent_title] => 'AUTHENTICATION SERVICE FOR SEAMLESS APPLICATION OPERATION' [patent_app_type] => utility [patent_app_number] => 12/233825 [patent_app_country] => US [patent_app_date] => 2008-09-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5260 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0077/20100077467.pdf [firstpage_image] =>[orig_patent_app_number] => 12233825 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/233825
AUTHENTICATION SERVICE FOR SEAMLESS APPLICATION OPERATION Sep 18, 2008 Abandoned
Menu