Search

Dant B. Shaifer Harriman

Examiner (ID: 9530, Phone: (571)272-7910 , Office: P/2434 )

Most Active Art Unit
2434
Art Unit(s)
2134, 2434
Total Applications
855
Issued Applications
655
Pending Applications
75
Abandoned Applications
151

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11285775 [patent_doc_number] => 09501630 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-11-22 [patent_title] => 'Method for generating a human likeness score' [patent_app_type] => utility [patent_app_number] => 14/292266 [patent_app_country] => US [patent_app_date] => 2014-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 31 [patent_no_of_words] => 10107 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 295 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292266 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/292266
Method for generating a human likeness score May 29, 2014 Issued
Array ( [id] => 10956771 [patent_doc_number] => 20140359793 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-04 [patent_title] => 'METHOD AND SYSTEM FOR ISOLATING SECURE COMMUNICATION EVENTS FROM A NON-SECURE APPLICATION' [patent_app_type] => utility [patent_app_number] => 14/291905 [patent_app_country] => US [patent_app_date] => 2014-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 6304 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291905 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/291905
Method and system for isolating secure communication events from a non-secure application May 29, 2014 Issued
Array ( [id] => 10462735 [patent_doc_number] => 20150347750 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-03 [patent_title] => 'METHOD AND APPARATUS FOR A SCORING SERVICE FOR SECURITY THREAT MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 14/292700 [patent_app_country] => US [patent_app_date] => 2014-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 9110 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292700 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/292700
Method and apparatus for a scoring service for security threat management May 29, 2014 Issued
Array ( [id] => 10530596 [patent_doc_number] => 09256731 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-02-09 [patent_title] => 'System, information processing apparatus, secure module, and verification method' [patent_app_type] => utility [patent_app_number] => 14/292053 [patent_app_country] => US [patent_app_date] => 2014-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 16 [patent_no_of_words] => 11844 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 174 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292053 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/292053
System, information processing apparatus, secure module, and verification method May 29, 2014 Issued
Array ( [id] => 10465189 [patent_doc_number] => 20150350204 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-03 [patent_title] => 'CLOUD-BASED DEVICE AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 14/292214 [patent_app_country] => US [patent_app_date] => 2014-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4429 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292214 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/292214
CLOUD-BASED DEVICE AUTHENTICATION May 29, 2014 Abandoned
Array ( [id] => 10021606 [patent_doc_number] => 09064094 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-06-23 [patent_title] => 'Protected resource access control utilizing intermediate values of a hash chain' [patent_app_type] => utility [patent_app_number] => 14/289831 [patent_app_country] => US [patent_app_date] => 2014-05-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 6517 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 105 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14289831 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/289831
Protected resource access control utilizing intermediate values of a hash chain May 28, 2014 Issued
Array ( [id] => 10918630 [patent_doc_number] => 20140321649 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-10-30 [patent_title] => 'METHOD AND APPARATUS FOR DISTRIBUTING A QUANTUM KEY' [patent_app_type] => utility [patent_app_number] => 14/263436 [patent_app_country] => US [patent_app_date] => 2014-04-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4548 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14263436 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/263436
METHOD AND APPARATUS FOR DISTRIBUTING A QUANTUM KEY Apr 27, 2014 Abandoned
Array ( [id] => 12537369 [patent_doc_number] => 10009321 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-06-26 [patent_title] => Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end encryption communication [patent_app_type] => utility [patent_app_number] => 14/786526 [patent_app_country] => US [patent_app_date] => 2014-04-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6808 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14786526 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/786526
Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end encryption communication Apr 22, 2014 Issued
Array ( [id] => 10803746 [patent_doc_number] => 20160149903 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-05-26 [patent_title] => 'METHOD FOR SUPPORTING SUBSCRIBER\'S SERVICE PROVIDER CHANGE RESTRICTION POLICY IN MOBILE COMMUNICATIONS AND APPARATUS THEREFOR' [patent_app_type] => utility [patent_app_number] => 14/784906 [patent_app_country] => US [patent_app_date] => 2014-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 16908 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14784906 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/784906
Method for supporting subscriber's service provider change restriction policy in mobile communications and apparatus therefor Apr 14, 2014 Issued
Array ( [id] => 12089840 [patent_doc_number] => 09843582 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-12-12 [patent_title] => 'Identity verification systems and methods' [patent_app_type] => utility [patent_app_number] => 14/246991 [patent_app_country] => US [patent_app_date] => 2014-04-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 6351 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 214 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14246991 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/246991
Identity verification systems and methods Apr 6, 2014 Issued
Array ( [id] => 9998998 [patent_doc_number] => 09043615 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-05-26 [patent_title] => 'Method and apparatus for a trust processor' [patent_app_type] => utility [patent_app_number] => 14/196249 [patent_app_country] => US [patent_app_date] => 2014-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 10522 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 265 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14196249 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/196249
Method and apparatus for a trust processor Mar 3, 2014 Issued
Array ( [id] => 10873260 [patent_doc_number] => 08898481 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-11-25 [patent_title] => 'Auditable cryptographic protected cloud computing communications system' [patent_app_type] => utility [patent_app_number] => 14/197023 [patent_app_country] => US [patent_app_date] => 2014-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 11 [patent_no_of_words] => 6258 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 1018 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14197023 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/197023
Auditable cryptographic protected cloud computing communications system Mar 3, 2014 Issued
Array ( [id] => 10072723 [patent_doc_number] => 09111083 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-08-18 [patent_title] => 'Applications login using a mechanism relating sub-tokens to the quality of a master token' [patent_app_type] => utility [patent_app_number] => 14/178716 [patent_app_country] => US [patent_app_date] => 2014-02-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5464 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 226 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14178716 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/178716
Applications login using a mechanism relating sub-tokens to the quality of a master token Feb 11, 2014 Issued
Array ( [id] => 9618256 [patent_doc_number] => 20140208114 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-24 [patent_title] => 'SYSTEM AND METHOD FOR MASSIVE CONTROLLED AND SECURED UPDATE OF DEVICES FIRMWARE' [patent_app_type] => utility [patent_app_number] => 14/157059 [patent_app_country] => US [patent_app_date] => 2014-01-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3437 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14157059 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/157059
System and method for massive controlled and secured update of devices firmware Jan 15, 2014 Issued
Array ( [id] => 11801666 [patent_doc_number] => 09542548 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-01-10 [patent_title] => 'Computer application security' [patent_app_type] => utility [patent_app_number] => 14/157250 [patent_app_country] => US [patent_app_date] => 2014-01-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 13 [patent_no_of_words] => 7132 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 182 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14157250 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/157250
Computer application security Jan 15, 2014 Issued
Array ( [id] => 11117338 [patent_doc_number] => 20160314312 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-27 [patent_title] => 'METHOD FOR CAUSING OPERATING SYSTEM TO HAVE IMMUNE FUNCTION' [patent_app_type] => utility [patent_app_number] => 15/103525 [patent_app_country] => US [patent_app_date] => 2014-01-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 1240 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15103525 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/103525
METHOD FOR CAUSING OPERATING SYSTEM TO HAVE IMMUNE FUNCTION Jan 15, 2014 Abandoned
Array ( [id] => 9714369 [patent_doc_number] => 08838970 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-09-16 [patent_title] => 'Identity verification for online education' [patent_app_type] => utility [patent_app_number] => 14/149603 [patent_app_country] => US [patent_app_date] => 2014-01-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 21 [patent_no_of_words] => 11990 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 148 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14149603 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/149603
Identity verification for online education Jan 6, 2014 Issued
Array ( [id] => 9884750 [patent_doc_number] => 08971529 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-03-03 [patent_title] => 'Information recording device' [patent_app_type] => utility [patent_app_number] => 14/146544 [patent_app_country] => US [patent_app_date] => 2014-01-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7493 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 265 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14146544 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/146544
Information recording device Jan 1, 2014 Issued
Array ( [id] => 9424579 [patent_doc_number] => 20140109230 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-04-17 [patent_title] => 'REAL-TIME VULNERABILITY MONITORING' [patent_app_type] => utility [patent_app_number] => 14/138014 [patent_app_country] => US [patent_app_date] => 2013-12-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2569 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14138014 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/138014
Real-time vulnerability monitoring Dec 20, 2013 Issued
Array ( [id] => 9410466 [patent_doc_number] => 20140101718 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-04-10 [patent_title] => 'CROSS-DOMAIN AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 14/101822 [patent_app_country] => US [patent_app_date] => 2013-12-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 15618 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14101822 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/101822
CROSS-DOMAIN AUTHENTICATION Dec 9, 2013 Abandoned
Menu