
Dant B. Shaifer Harriman
Examiner (ID: 9530, Phone: (571)272-7910 , Office: P/2434 )
| Most Active Art Unit | 2434 |
| Art Unit(s) | 2134, 2434 |
| Total Applications | 855 |
| Issued Applications | 655 |
| Pending Applications | 75 |
| Abandoned Applications | 151 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11285775
[patent_doc_number] => 09501630
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-22
[patent_title] => 'Method for generating a human likeness score'
[patent_app_type] => utility
[patent_app_number] => 14/292266
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 31
[patent_no_of_words] => 10107
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 295
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292266
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/292266 | Method for generating a human likeness score | May 29, 2014 | Issued |
Array
(
[id] => 10956771
[patent_doc_number] => 20140359793
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-04
[patent_title] => 'METHOD AND SYSTEM FOR ISOLATING SECURE COMMUNICATION EVENTS FROM A NON-SECURE APPLICATION'
[patent_app_type] => utility
[patent_app_number] => 14/291905
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6304
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291905
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/291905 | Method and system for isolating secure communication events from a non-secure application | May 29, 2014 | Issued |
Array
(
[id] => 10462735
[patent_doc_number] => 20150347750
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'METHOD AND APPARATUS FOR A SCORING SERVICE FOR SECURITY THREAT MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 14/292700
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 9110
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292700
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/292700 | Method and apparatus for a scoring service for security threat management | May 29, 2014 | Issued |
Array
(
[id] => 10530596
[patent_doc_number] => 09256731
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-09
[patent_title] => 'System, information processing apparatus, secure module, and verification method'
[patent_app_type] => utility
[patent_app_number] => 14/292053
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 16
[patent_no_of_words] => 11844
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292053
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/292053 | System, information processing apparatus, secure module, and verification method | May 29, 2014 | Issued |
Array
(
[id] => 10465189
[patent_doc_number] => 20150350204
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'CLOUD-BASED DEVICE AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/292214
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4429
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292214
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/292214 | CLOUD-BASED DEVICE AUTHENTICATION | May 29, 2014 | Abandoned |
Array
(
[id] => 10021606
[patent_doc_number] => 09064094
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-06-23
[patent_title] => 'Protected resource access control utilizing intermediate values of a hash chain'
[patent_app_type] => utility
[patent_app_number] => 14/289831
[patent_app_country] => US
[patent_app_date] => 2014-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 6517
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14289831
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/289831 | Protected resource access control utilizing intermediate values of a hash chain | May 28, 2014 | Issued |
Array
(
[id] => 10918630
[patent_doc_number] => 20140321649
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-30
[patent_title] => 'METHOD AND APPARATUS FOR DISTRIBUTING A QUANTUM KEY'
[patent_app_type] => utility
[patent_app_number] => 14/263436
[patent_app_country] => US
[patent_app_date] => 2014-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4548
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14263436
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/263436 | METHOD AND APPARATUS FOR DISTRIBUTING A QUANTUM KEY | Apr 27, 2014 | Abandoned |
Array
(
[id] => 12537369
[patent_doc_number] => 10009321
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-26
[patent_title] => Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end encryption communication
[patent_app_type] => utility
[patent_app_number] => 14/786526
[patent_app_country] => US
[patent_app_date] => 2014-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6808
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14786526
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/786526 | Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end encryption communication | Apr 22, 2014 | Issued |
Array
(
[id] => 10803746
[patent_doc_number] => 20160149903
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'METHOD FOR SUPPORTING SUBSCRIBER\'S SERVICE PROVIDER CHANGE RESTRICTION POLICY IN MOBILE COMMUNICATIONS AND APPARATUS THEREFOR'
[patent_app_type] => utility
[patent_app_number] => 14/784906
[patent_app_country] => US
[patent_app_date] => 2014-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 16908
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14784906
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/784906 | Method for supporting subscriber's service provider change restriction policy in mobile communications and apparatus therefor | Apr 14, 2014 | Issued |
Array
(
[id] => 12089840
[patent_doc_number] => 09843582
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-12-12
[patent_title] => 'Identity verification systems and methods'
[patent_app_type] => utility
[patent_app_number] => 14/246991
[patent_app_country] => US
[patent_app_date] => 2014-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 6351
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14246991
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/246991 | Identity verification systems and methods | Apr 6, 2014 | Issued |
Array
(
[id] => 9998998
[patent_doc_number] => 09043615
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-05-26
[patent_title] => 'Method and apparatus for a trust processor'
[patent_app_type] => utility
[patent_app_number] => 14/196249
[patent_app_country] => US
[patent_app_date] => 2014-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 10522
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14196249
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/196249 | Method and apparatus for a trust processor | Mar 3, 2014 | Issued |
Array
(
[id] => 10873260
[patent_doc_number] => 08898481
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-25
[patent_title] => 'Auditable cryptographic protected cloud computing communications system'
[patent_app_type] => utility
[patent_app_number] => 14/197023
[patent_app_country] => US
[patent_app_date] => 2014-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 6258
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 1018
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14197023
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/197023 | Auditable cryptographic protected cloud computing communications system | Mar 3, 2014 | Issued |
Array
(
[id] => 10072723
[patent_doc_number] => 09111083
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-18
[patent_title] => 'Applications login using a mechanism relating sub-tokens to the quality of a master token'
[patent_app_type] => utility
[patent_app_number] => 14/178716
[patent_app_country] => US
[patent_app_date] => 2014-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5464
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14178716
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/178716 | Applications login using a mechanism relating sub-tokens to the quality of a master token | Feb 11, 2014 | Issued |
Array
(
[id] => 9618256
[patent_doc_number] => 20140208114
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-24
[patent_title] => 'SYSTEM AND METHOD FOR MASSIVE CONTROLLED AND SECURED UPDATE OF DEVICES FIRMWARE'
[patent_app_type] => utility
[patent_app_number] => 14/157059
[patent_app_country] => US
[patent_app_date] => 2014-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3437
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14157059
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/157059 | System and method for massive controlled and secured update of devices firmware | Jan 15, 2014 | Issued |
Array
(
[id] => 11801666
[patent_doc_number] => 09542548
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-10
[patent_title] => 'Computer application security'
[patent_app_type] => utility
[patent_app_number] => 14/157250
[patent_app_country] => US
[patent_app_date] => 2014-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 13
[patent_no_of_words] => 7132
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14157250
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/157250 | Computer application security | Jan 15, 2014 | Issued |
Array
(
[id] => 11117338
[patent_doc_number] => 20160314312
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-27
[patent_title] => 'METHOD FOR CAUSING OPERATING SYSTEM TO HAVE IMMUNE FUNCTION'
[patent_app_type] => utility
[patent_app_number] => 15/103525
[patent_app_country] => US
[patent_app_date] => 2014-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1240
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15103525
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/103525 | METHOD FOR CAUSING OPERATING SYSTEM TO HAVE IMMUNE FUNCTION | Jan 15, 2014 | Abandoned |
Array
(
[id] => 9714369
[patent_doc_number] => 08838970
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-09-16
[patent_title] => 'Identity verification for online education'
[patent_app_type] => utility
[patent_app_number] => 14/149603
[patent_app_country] => US
[patent_app_date] => 2014-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 11990
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14149603
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/149603 | Identity verification for online education | Jan 6, 2014 | Issued |
Array
(
[id] => 9884750
[patent_doc_number] => 08971529
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-03-03
[patent_title] => 'Information recording device'
[patent_app_type] => utility
[patent_app_number] => 14/146544
[patent_app_country] => US
[patent_app_date] => 2014-01-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7493
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14146544
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/146544 | Information recording device | Jan 1, 2014 | Issued |
Array
(
[id] => 9424579
[patent_doc_number] => 20140109230
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-17
[patent_title] => 'REAL-TIME VULNERABILITY MONITORING'
[patent_app_type] => utility
[patent_app_number] => 14/138014
[patent_app_country] => US
[patent_app_date] => 2013-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2569
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14138014
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/138014 | Real-time vulnerability monitoring | Dec 20, 2013 | Issued |
Array
(
[id] => 9410466
[patent_doc_number] => 20140101718
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-10
[patent_title] => 'CROSS-DOMAIN AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/101822
[patent_app_country] => US
[patent_app_date] => 2013-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 15618
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14101822
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/101822 | CROSS-DOMAIN AUTHENTICATION | Dec 9, 2013 | Abandoned |