
Dant B. Shaifer Harriman
Examiner (ID: 9530, Phone: (571)272-7910 , Office: P/2434 )
| Most Active Art Unit | 2434 |
| Art Unit(s) | 2134, 2434 |
| Total Applications | 855 |
| Issued Applications | 655 |
| Pending Applications | 75 |
| Abandoned Applications | 151 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17211533
[patent_doc_number] => 11171924
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-09
[patent_title] => Customized web services gateway
[patent_app_type] => utility
[patent_app_number] => 14/882819
[patent_app_country] => US
[patent_app_date] => 2015-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10549
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 240
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14882819
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/882819 | Customized web services gateway | Oct 13, 2015 | Issued |
Array
(
[id] => 11572693
[patent_doc_number] => 20170111337
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-20
[patent_title] => 'Multi-Factor User Authentication Framework Using Asymmetric Key'
[patent_app_type] => utility
[patent_app_number] => 14/883511
[patent_app_country] => US
[patent_app_date] => 2015-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11081
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14883511
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/883511 | Multi-factor user authentication framework using asymmetric key | Oct 13, 2015 | Issued |
Array
(
[id] => 11386903
[patent_doc_number] => 20170012959
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-12
[patent_title] => 'Combined Authorization Process'
[patent_app_type] => utility
[patent_app_number] => 14/871782
[patent_app_country] => US
[patent_app_date] => 2015-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15328
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14871782
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/871782 | Combined authorization process | Sep 29, 2015 | Issued |
Array
(
[id] => 14395927
[patent_doc_number] => 10311247
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-04
[patent_title] => Method and system for isolating secure communication events from a non-secure application
[patent_app_type] => utility
[patent_app_number] => 14/865329
[patent_app_country] => US
[patent_app_date] => 2015-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 6198
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14865329
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/865329 | Method and system for isolating secure communication events from a non-secure application | Sep 24, 2015 | Issued |
Array
(
[id] => 10674940
[patent_doc_number] => 20160021085
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-21
[patent_title] => 'Streaming Music Using Authentication Information'
[patent_app_type] => utility
[patent_app_number] => 14/859426
[patent_app_country] => US
[patent_app_date] => 2015-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12364
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14859426
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/859426 | Streaming music using authentication information | Sep 20, 2015 | Issued |
Array
(
[id] => 12971587
[patent_doc_number] => 09876787
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-23
[patent_title] => Streaming music using authentication information
[patent_app_type] => utility
[patent_app_number] => 14/859448
[patent_app_country] => US
[patent_app_date] => 2015-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 12132
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14859448
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/859448 | Streaming music using authentication information | Sep 20, 2015 | Issued |
Array
(
[id] => 11501887
[patent_doc_number] => 20170076072
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-16
[patent_title] => 'METHOD AND APPARATUS FOR PREVENTING AND INVESTIGATING SOFTWARE PIRACY'
[patent_app_type] => utility
[patent_app_number] => 14/852206
[patent_app_country] => US
[patent_app_date] => 2015-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9155
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14852206
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/852206 | Method and apparatus for preventing and investigating software piracy | Sep 10, 2015 | Issued |
Array
(
[id] => 11682388
[patent_doc_number] => 09680938
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-06-13
[patent_title] => 'System, method, and computer program product for tracking user activity during a logon session'
[patent_app_type] => utility
[patent_app_number] => 14/845943
[patent_app_country] => US
[patent_app_date] => 2015-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 31
[patent_no_of_words] => 10876
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 386
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14845943
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/845943 | System, method, and computer program product for tracking user activity during a logon session | Sep 3, 2015 | Issued |
Array
(
[id] => 12316920
[patent_doc_number] => 09942031
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-10
[patent_title] => System and method for private-key fully homomorphic encryption and private search between rings
[patent_app_type] => utility
[patent_app_number] => 14/835019
[patent_app_country] => US
[patent_app_date] => 2015-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 15546
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14835019
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/835019 | System and method for private-key fully homomorphic encryption and private search between rings | Aug 24, 2015 | Issued |
Array
(
[id] => 10497165
[patent_doc_number] => 20150382188
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'METHOD AND APPARATUS FOR PROVIDING BROADCAST CHANNEL ENCRYPTION TO ENHANCE CELLULAR NETWORK SECURITY'
[patent_app_type] => utility
[patent_app_number] => 14/834107
[patent_app_country] => US
[patent_app_date] => 2015-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9759
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14834107
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/834107 | Method and apparatus for providing broadcast channel encryption to enhance cellular network security | Aug 23, 2015 | Issued |
Array
(
[id] => 10741859
[patent_doc_number] => 20160088010
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'REAL-TIME VULNERABILITY MONITORING'
[patent_app_type] => utility
[patent_app_number] => 14/834102
[patent_app_country] => US
[patent_app_date] => 2015-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13783
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14834102
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/834102 | Real-time vulnerability monitoring | Aug 23, 2015 | Issued |
Array
(
[id] => 11314451
[patent_doc_number] => 20160350561
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-01
[patent_title] => 'POLICIES FOR SECRETS IN TRUSTED EXECUTION ENVIRONMENTS'
[patent_app_type] => utility
[patent_app_number] => 14/832446
[patent_app_country] => US
[patent_app_date] => 2015-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8535
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14832446
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/832446 | Policies for secrets in trusted execution environments | Aug 20, 2015 | Issued |
Array
(
[id] => 10496634
[patent_doc_number] => 20150381657
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'SELECTIVE MODIFICATION OF ENCRYPTED APPLICATION LAYER DATA IN A TRANSPARENT SECURITY GATEWAY'
[patent_app_type] => utility
[patent_app_number] => 14/833013
[patent_app_country] => US
[patent_app_date] => 2015-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 16286
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14833013
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/833013 | Selective modification of encrypted application layer data in a transparent security gateway | Aug 20, 2015 | Issued |
Array
(
[id] => 10496633
[patent_doc_number] => 20150381656
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'SELECTIVE MODIFICATION OF ENCRYPTED APPLICATION LAYER DATA IN A TRANSPARENT SECURITY GATEWAY'
[patent_app_type] => utility
[patent_app_number] => 14/833012
[patent_app_country] => US
[patent_app_date] => 2015-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 16277
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14833012
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/833012 | Selective modification of encrypted application layer data in a transparent security gateway | Aug 20, 2015 | Issued |
Array
(
[id] => 12115652
[patent_doc_number] => 09871652
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-16
[patent_title] => 'Cryptographic processing method and cryptographic processing device'
[patent_app_type] => utility
[patent_app_number] => 14/831179
[patent_app_country] => US
[patent_app_date] => 2015-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 9795
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14831179
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/831179 | Cryptographic processing method and cryptographic processing device | Aug 19, 2015 | Issued |
Array
(
[id] => 13241311
[patent_doc_number] => 10133858
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-20
[patent_title] => Applications login using a mechanism relating sub-tokens to the quality of a master token
[patent_app_type] => utility
[patent_app_number] => 14/828239
[patent_app_country] => US
[patent_app_date] => 2015-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5336
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14828239
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/828239 | Applications login using a mechanism relating sub-tokens to the quality of a master token | Aug 16, 2015 | Issued |
Array
(
[id] => 11447180
[patent_doc_number] => 20170048200
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'Providing a Basic Firewall Using a Virtual Networking Function'
[patent_app_type] => utility
[patent_app_number] => 14/823466
[patent_app_country] => US
[patent_app_date] => 2015-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 17853
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14823466
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/823466 | Providing a basic firewall using a virtual networking function | Aug 10, 2015 | Issued |
Array
(
[id] => 11447048
[patent_doc_number] => 20170048069
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'DETECTION OF UNKNOWN CODE PAGE INDEXING TOKENS'
[patent_app_type] => utility
[patent_app_number] => 14/823431
[patent_app_country] => US
[patent_app_date] => 2015-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8767
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14823431
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/823431 | Detection of unknown code page indexing tokens | Aug 10, 2015 | Issued |
Array
(
[id] => 11892021
[patent_doc_number] => 09762595
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-12
[patent_title] => 'Secure cross domain solution systems and methods'
[patent_app_type] => utility
[patent_app_number] => 14/823417
[patent_app_country] => US
[patent_app_date] => 2015-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7826
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14823417
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/823417 | Secure cross domain solution systems and methods | Aug 10, 2015 | Issued |
Array
(
[id] => 11447198
[patent_doc_number] => 20170048219
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'SYSTEMS AND METHODS FOR MODIFYING ACCESS CREDENTIALS USING IMPERSONATION IN COMPUTER SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 14/823404
[patent_app_country] => US
[patent_app_date] => 2015-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12350
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14823404
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/823404 | SYSTEMS AND METHODS FOR MODIFYING ACCESS CREDENTIALS USING IMPERSONATION IN COMPUTER SYSTEMS | Aug 10, 2015 | Abandoned |