
Carolyn M. Kosowski
Examiner (ID: 5675)
| Most Active Art Unit | 2431 |
| Art Unit(s) | 3626, OPLA, 2431 |
| Total Applications | 241 |
| Issued Applications | 137 |
| Pending Applications | 21 |
| Abandoned Applications | 87 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 6105880
[patent_doc_number] => 20110167496
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-07-07
[patent_title] => 'ENHANCED HARDWARE COMMAND FILTER MATRIX INTEGRATED CIRCUIT'
[patent_app_type] => utility
[patent_app_number] => 13/045492
[patent_app_country] => US
[patent_app_date] => 2011-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6117
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0167/20110167496.pdf
[firstpage_image] =>[orig_patent_app_number] => 13045492
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/045492 | ENHANCED HARDWARE COMMAND FILTER MATRIX INTEGRATED CIRCUIT | Mar 9, 2011 | Abandoned |
Array
(
[id] => 10885525
[patent_doc_number] => 08909928
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-09
[patent_title] => 'Securing customer virtual machines in a multi-tenant cloud'
[patent_app_type] => utility
[patent_app_number] => 13/045212
[patent_app_country] => US
[patent_app_date] => 2011-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5210
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 40
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13045212
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/045212 | Securing customer virtual machines in a multi-tenant cloud | Mar 9, 2011 | Issued |
Array
(
[id] => 9458560
[patent_doc_number] => 08719586
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-05-06
[patent_title] => 'Digital rights management for applications'
[patent_app_type] => utility
[patent_app_number] => 13/044478
[patent_app_country] => US
[patent_app_date] => 2011-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10630
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13044478
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/044478 | Digital rights management for applications | Mar 8, 2011 | Issued |
Array
(
[id] => 8395828
[patent_doc_number] => 20120233674
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-09-13
[patent_title] => 'SECURITY FOR REMOTE ACCESS VPN'
[patent_app_type] => utility
[patent_app_number] => 13/043222
[patent_app_country] => US
[patent_app_date] => 2011-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7286
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13043222
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/043222 | Security for remote access VPN | Mar 7, 2011 | Issued |
Array
(
[id] => 8799754
[patent_doc_number] => 08438644
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-05-07
[patent_title] => 'Information system security based on threat vectors'
[patent_app_type] => utility
[patent_app_number] => 13/042066
[patent_app_country] => US
[patent_app_date] => 2011-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11830
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 315
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13042066
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/042066 | Information system security based on threat vectors | Mar 6, 2011 | Issued |
Array
(
[id] => 9089386
[patent_doc_number] => 08560833
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-10-15
[patent_title] => 'Automatic secure client access'
[patent_app_type] => utility
[patent_app_number] => 12/916287
[patent_app_country] => US
[patent_app_date] => 2010-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1982
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12916287
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/916287 | Automatic secure client access | Oct 28, 2010 | Issued |
Array
(
[id] => 9707739
[patent_doc_number] => 08832835
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-09-09
[patent_title] => 'Detecting and remediating malware dropped by files'
[patent_app_type] => utility
[patent_app_number] => 12/914949
[patent_app_country] => US
[patent_app_date] => 2010-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4333
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12914949
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/914949 | Detecting and remediating malware dropped by files | Oct 27, 2010 | Issued |
Array
(
[id] => 6006111
[patent_doc_number] => 20110119487
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-19
[patent_title] => 'System and method for encryption rekeying'
[patent_app_type] => utility
[patent_app_number] => 12/925080
[patent_app_country] => US
[patent_app_date] => 2010-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9714
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0119/20110119487.pdf
[firstpage_image] =>[orig_patent_app_number] => 12925080
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/925080 | System and method for encryption rekeying | Oct 12, 2010 | Abandoned |
Array
(
[id] => 5996998
[patent_doc_number] => 20110016532
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-20
[patent_title] => 'Measure selecting apparatus and measure selecting method'
[patent_app_type] => utility
[patent_app_number] => 12/923409
[patent_app_country] => US
[patent_app_date] => 2010-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 9479
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0016/20110016532.pdf
[firstpage_image] =>[orig_patent_app_number] => 12923409
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/923409 | Apparatus and method for selecting measure by evaluating recovery time | Sep 19, 2010 | Issued |
Array
(
[id] => 8924245
[patent_doc_number] => 08490196
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-16
[patent_title] => 'System and method for extending automated penetration testing to develop an intelligent and cost efficient security strategy'
[patent_app_type] => utility
[patent_app_number] => 12/851516
[patent_app_country] => US
[patent_app_date] => 2010-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8868
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12851516
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/851516 | System and method for extending automated penetration testing to develop an intelligent and cost efficient security strategy | Aug 4, 2010 | Issued |
Array
(
[id] => 8716377
[patent_doc_number] => 08402530
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-03-19
[patent_title] => 'Dynamic load redistribution among distributed servers'
[patent_app_type] => utility
[patent_app_number] => 12/847363
[patent_app_country] => US
[patent_app_date] => 2010-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5168
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12847363
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/847363 | Dynamic load redistribution among distributed servers | Jul 29, 2010 | Issued |
Array
(
[id] => 7563182
[patent_doc_number] => 20110277016
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-10
[patent_title] => 'Method for managing shared accounts in an identity management system'
[patent_app_type] => utility
[patent_app_number] => 12/774082
[patent_app_country] => US
[patent_app_date] => 2010-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6815
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0277/20110277016.pdf
[firstpage_image] =>[orig_patent_app_number] => 12774082
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/774082 | Method for managing shared accounts in an identity management system | May 4, 2010 | Issued |
Array
(
[id] => 9049544
[patent_doc_number] => 08544103
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-09-24
[patent_title] => 'Policy determined accuracy of transmitted information'
[patent_app_type] => utility
[patent_app_number] => 12/773501
[patent_app_country] => US
[patent_app_date] => 2010-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 9204
[patent_no_of_claims] => 38
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12773501
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/773501 | Policy determined accuracy of transmitted information | May 3, 2010 | Issued |
Array
(
[id] => 8959282
[patent_doc_number] => 08505076
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-06
[patent_title] => 'Proactive authentication'
[patent_app_type] => utility
[patent_app_number] => 12/772632
[patent_app_country] => US
[patent_app_date] => 2010-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 19
[patent_no_of_words] => 13661
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12772632
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/772632 | Proactive authentication | May 2, 2010 | Issued |
Array
(
[id] => 9612015
[patent_doc_number] => 08789205
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-22
[patent_title] => 'Role-based graphical user interfaces'
[patent_app_type] => utility
[patent_app_number] => 12/764135
[patent_app_country] => US
[patent_app_date] => 2010-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5158
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12764135
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/764135 | Role-based graphical user interfaces | Apr 20, 2010 | Issued |
Array
(
[id] => 8752121
[patent_doc_number] => 08417965
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-04-09
[patent_title] => 'Method and circuit for secure definition and integration of cores'
[patent_app_type] => utility
[patent_app_number] => 12/755760
[patent_app_country] => US
[patent_app_date] => 2010-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5410
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12755760
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/755760 | Method and circuit for secure definition and integration of cores | Apr 6, 2010 | Issued |
Array
(
[id] => 8655665
[patent_doc_number] => 08375433
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-02-12
[patent_title] => 'Method for multi-core processor based packet classification on multiple fields'
[patent_app_type] => utility
[patent_app_number] => 12/689842
[patent_app_country] => US
[patent_app_date] => 2010-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5976
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 577
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12689842
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/689842 | Method for multi-core processor based packet classification on multiple fields | Jan 18, 2010 | Issued |
Array
(
[id] => 9130534
[patent_doc_number] => 08578491
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-11-05
[patent_title] => 'Network based malware detection and reporting'
[patent_app_type] => utility
[patent_app_number] => 12/636435
[patent_app_country] => US
[patent_app_date] => 2009-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 11
[patent_no_of_words] => 8115
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12636435
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/636435 | Network based malware detection and reporting | Dec 10, 2009 | Issued |
Array
(
[id] => 9130534
[patent_doc_number] => 08578491
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-11-05
[patent_title] => 'Network based malware detection and reporting'
[patent_app_type] => utility
[patent_app_number] => 12/636435
[patent_app_country] => US
[patent_app_date] => 2009-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 11
[patent_no_of_words] => 8115
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12636435
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/636435 | Network based malware detection and reporting | Dec 10, 2009 | Issued |
Array
(
[id] => 9012739
[patent_doc_number] => 08528059
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-09-03
[patent_title] => 'Apparatuses, methods and systems for a secure resource access and placement platform'
[patent_app_type] => utility
[patent_app_number] => 12/574673
[patent_app_country] => US
[patent_app_date] => 2009-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 20680
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12574673
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/574673 | Apparatuses, methods and systems for a secure resource access and placement platform | Oct 5, 2009 | Issued |