Search

Carolyn M. Kosowski

Examiner (ID: 5675)

Most Active Art Unit
2431
Art Unit(s)
3626, OPLA, 2431
Total Applications
241
Issued Applications
137
Pending Applications
21
Abandoned Applications
87

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 6105880 [patent_doc_number] => 20110167496 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-07-07 [patent_title] => 'ENHANCED HARDWARE COMMAND FILTER MATRIX INTEGRATED CIRCUIT' [patent_app_type] => utility [patent_app_number] => 13/045492 [patent_app_country] => US [patent_app_date] => 2011-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6117 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0167/20110167496.pdf [firstpage_image] =>[orig_patent_app_number] => 13045492 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/045492
ENHANCED HARDWARE COMMAND FILTER MATRIX INTEGRATED CIRCUIT Mar 9, 2011 Abandoned
Array ( [id] => 10885525 [patent_doc_number] => 08909928 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-12-09 [patent_title] => 'Securing customer virtual machines in a multi-tenant cloud' [patent_app_type] => utility [patent_app_number] => 13/045212 [patent_app_country] => US [patent_app_date] => 2011-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5210 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 9 [patent_words_short_claim] => 40 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13045212 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/045212
Securing customer virtual machines in a multi-tenant cloud Mar 9, 2011 Issued
Array ( [id] => 9458560 [patent_doc_number] => 08719586 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-05-06 [patent_title] => 'Digital rights management for applications' [patent_app_type] => utility [patent_app_number] => 13/044478 [patent_app_country] => US [patent_app_date] => 2011-03-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 10630 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 177 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13044478 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/044478
Digital rights management for applications Mar 8, 2011 Issued
Array ( [id] => 8395828 [patent_doc_number] => 20120233674 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-09-13 [patent_title] => 'SECURITY FOR REMOTE ACCESS VPN' [patent_app_type] => utility [patent_app_number] => 13/043222 [patent_app_country] => US [patent_app_date] => 2011-03-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7286 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13043222 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/043222
Security for remote access VPN Mar 7, 2011 Issued
Array ( [id] => 8799754 [patent_doc_number] => 08438644 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-05-07 [patent_title] => 'Information system security based on threat vectors' [patent_app_type] => utility [patent_app_number] => 13/042066 [patent_app_country] => US [patent_app_date] => 2011-03-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 11830 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 315 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13042066 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/042066
Information system security based on threat vectors Mar 6, 2011 Issued
Array ( [id] => 9089386 [patent_doc_number] => 08560833 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-10-15 [patent_title] => 'Automatic secure client access' [patent_app_type] => utility [patent_app_number] => 12/916287 [patent_app_country] => US [patent_app_date] => 2010-10-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 1982 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 126 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12916287 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/916287
Automatic secure client access Oct 28, 2010 Issued
Array ( [id] => 9707739 [patent_doc_number] => 08832835 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-09-09 [patent_title] => 'Detecting and remediating malware dropped by files' [patent_app_type] => utility [patent_app_number] => 12/914949 [patent_app_country] => US [patent_app_date] => 2010-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4333 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 195 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12914949 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/914949
Detecting and remediating malware dropped by files Oct 27, 2010 Issued
Array ( [id] => 6006111 [patent_doc_number] => 20110119487 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-19 [patent_title] => 'System and method for encryption rekeying' [patent_app_type] => utility [patent_app_number] => 12/925080 [patent_app_country] => US [patent_app_date] => 2010-10-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9714 [patent_no_of_claims] => 36 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0119/20110119487.pdf [firstpage_image] =>[orig_patent_app_number] => 12925080 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/925080
System and method for encryption rekeying Oct 12, 2010 Abandoned
Array ( [id] => 5996998 [patent_doc_number] => 20110016532 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-20 [patent_title] => 'Measure selecting apparatus and measure selecting method' [patent_app_type] => utility [patent_app_number] => 12/923409 [patent_app_country] => US [patent_app_date] => 2010-09-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 9479 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0016/20110016532.pdf [firstpage_image] =>[orig_patent_app_number] => 12923409 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/923409
Apparatus and method for selecting measure by evaluating recovery time Sep 19, 2010 Issued
Array ( [id] => 8924245 [patent_doc_number] => 08490196 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-07-16 [patent_title] => 'System and method for extending automated penetration testing to develop an intelligent and cost efficient security strategy' [patent_app_type] => utility [patent_app_number] => 12/851516 [patent_app_country] => US [patent_app_date] => 2010-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 8868 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 168 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12851516 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/851516
System and method for extending automated penetration testing to develop an intelligent and cost efficient security strategy Aug 4, 2010 Issued
Array ( [id] => 8716377 [patent_doc_number] => 08402530 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-03-19 [patent_title] => 'Dynamic load redistribution among distributed servers' [patent_app_type] => utility [patent_app_number] => 12/847363 [patent_app_country] => US [patent_app_date] => 2010-07-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5168 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12847363 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/847363
Dynamic load redistribution among distributed servers Jul 29, 2010 Issued
Array ( [id] => 7563182 [patent_doc_number] => 20110277016 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-11-10 [patent_title] => 'Method for managing shared accounts in an identity management system' [patent_app_type] => utility [patent_app_number] => 12/774082 [patent_app_country] => US [patent_app_date] => 2010-05-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6815 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0277/20110277016.pdf [firstpage_image] =>[orig_patent_app_number] => 12774082 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/774082
Method for managing shared accounts in an identity management system May 4, 2010 Issued
Array ( [id] => 9049544 [patent_doc_number] => 08544103 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-09-24 [patent_title] => 'Policy determined accuracy of transmitted information' [patent_app_type] => utility [patent_app_number] => 12/773501 [patent_app_country] => US [patent_app_date] => 2010-05-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 10 [patent_no_of_words] => 9204 [patent_no_of_claims] => 38 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 121 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12773501 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/773501
Policy determined accuracy of transmitted information May 3, 2010 Issued
Array ( [id] => 8959282 [patent_doc_number] => 08505076 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-08-06 [patent_title] => 'Proactive authentication' [patent_app_type] => utility [patent_app_number] => 12/772632 [patent_app_country] => US [patent_app_date] => 2010-05-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 19 [patent_no_of_words] => 13661 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 113 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12772632 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/772632
Proactive authentication May 2, 2010 Issued
Array ( [id] => 9612015 [patent_doc_number] => 08789205 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-07-22 [patent_title] => 'Role-based graphical user interfaces' [patent_app_type] => utility [patent_app_number] => 12/764135 [patent_app_country] => US [patent_app_date] => 2010-04-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5158 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 160 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12764135 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/764135
Role-based graphical user interfaces Apr 20, 2010 Issued
Array ( [id] => 8752121 [patent_doc_number] => 08417965 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-04-09 [patent_title] => 'Method and circuit for secure definition and integration of cores' [patent_app_type] => utility [patent_app_number] => 12/755760 [patent_app_country] => US [patent_app_date] => 2010-04-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5410 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 102 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12755760 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/755760
Method and circuit for secure definition and integration of cores Apr 6, 2010 Issued
Array ( [id] => 8655665 [patent_doc_number] => 08375433 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-02-12 [patent_title] => 'Method for multi-core processor based packet classification on multiple fields' [patent_app_type] => utility [patent_app_number] => 12/689842 [patent_app_country] => US [patent_app_date] => 2010-01-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5976 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 577 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12689842 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/689842
Method for multi-core processor based packet classification on multiple fields Jan 18, 2010 Issued
Array ( [id] => 9130534 [patent_doc_number] => 08578491 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-11-05 [patent_title] => 'Network based malware detection and reporting' [patent_app_type] => utility [patent_app_number] => 12/636435 [patent_app_country] => US [patent_app_date] => 2009-12-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 11 [patent_no_of_words] => 8115 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 233 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12636435 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/636435
Network based malware detection and reporting Dec 10, 2009 Issued
Array ( [id] => 9130534 [patent_doc_number] => 08578491 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-11-05 [patent_title] => 'Network based malware detection and reporting' [patent_app_type] => utility [patent_app_number] => 12/636435 [patent_app_country] => US [patent_app_date] => 2009-12-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 11 [patent_no_of_words] => 8115 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 233 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12636435 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/636435
Network based malware detection and reporting Dec 10, 2009 Issued
Array ( [id] => 9012739 [patent_doc_number] => 08528059 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-09-03 [patent_title] => 'Apparatuses, methods and systems for a secure resource access and placement platform' [patent_app_type] => utility [patent_app_number] => 12/574673 [patent_app_country] => US [patent_app_date] => 2009-10-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 20680 [patent_no_of_claims] => 34 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 132 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12574673 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/574673
Apparatuses, methods and systems for a secure resource access and placement platform Oct 5, 2009 Issued
Menu