
Dapinder Singh
Examiner (ID: 16500, Phone: (571)270-1774 , Office: P/3748 )
| Most Active Art Unit | 3746 |
| Art Unit(s) | 3746, 3748 |
| Total Applications | 1182 |
| Issued Applications | 986 |
| Pending Applications | 73 |
| Abandoned Applications | 157 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10895233
[patent_doc_number] => 08918864
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-23
[patent_title] => 'System, method, and computer program product for making a scan decision during communication of data over a network'
[patent_app_type] => utility
[patent_app_number] => 11/758494
[patent_app_country] => US
[patent_app_date] => 2007-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5735
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11758494
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/758494 | System, method, and computer program product for making a scan decision during communication of data over a network | Jun 4, 2007 | Issued |
Array
(
[id] => 9248756
[patent_doc_number] => 08613058
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-12-17
[patent_title] => 'Systems, methods and computer program products for providing additional authentication beyond user equipment authentication in an IMS network'
[patent_app_type] => utility
[patent_app_number] => 11/756025
[patent_app_country] => US
[patent_app_date] => 2007-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5071
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11756025
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/756025 | Systems, methods and computer program products for providing additional authentication beyond user equipment authentication in an IMS network | May 30, 2007 | Issued |
Array
(
[id] => 9623607
[patent_doc_number] => 08793802
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-29
[patent_title] => 'System, method, and computer program product for preventing data leakage utilizing a map of data'
[patent_app_type] => utility
[patent_app_number] => 11/752208
[patent_app_country] => US
[patent_app_date] => 2007-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4520
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11752208
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/752208 | System, method, and computer program product for preventing data leakage utilizing a map of data | May 21, 2007 | Issued |
Array
(
[id] => 10901827
[patent_doc_number] => 08925073
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-30
[patent_title] => 'Method and system for preventing password theft through unauthorized keylogging'
[patent_app_type] => utility
[patent_app_number] => 11/750517
[patent_app_country] => US
[patent_app_date] => 2007-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 2688
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 270
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11750517
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/750517 | Method and system for preventing password theft through unauthorized keylogging | May 17, 2007 | Issued |
Array
(
[id] => 9999317
[patent_doc_number] => 09043935
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-05-26
[patent_title] => 'Techniques for personalizing content'
[patent_app_type] => utility
[patent_app_number] => 11/750778
[patent_app_country] => US
[patent_app_date] => 2007-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 5801
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11750778
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/750778 | Techniques for personalizing content | May 17, 2007 | Issued |
Array
(
[id] => 9358941
[patent_doc_number] => 08677498
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-18
[patent_title] => 'Apparatus and method of managing security data'
[patent_app_type] => utility
[patent_app_number] => 11/747983
[patent_app_country] => US
[patent_app_date] => 2007-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 4947
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11747983
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/747983 | Apparatus and method of managing security data | May 13, 2007 | Issued |
Array
(
[id] => 4841868
[patent_doc_number] => 20080282354
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-11-13
[patent_title] => 'ACCESS CONTROL BASED ON PROGRAM PROPERTIES'
[patent_app_type] => utility
[patent_app_number] => 11/745048
[patent_app_country] => US
[patent_app_date] => 2007-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 10292
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0282/20080282354.pdf
[firstpage_image] =>[orig_patent_app_number] => 11745048
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/745048 | Access control based on program properties | May 6, 2007 | Issued |
Array
(
[id] => 4967049
[patent_doc_number] => 20080109869
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-05-08
[patent_title] => 'Authentication Rule Overrides For Service Provisioning'
[patent_app_type] => utility
[patent_app_number] => 11/742912
[patent_app_country] => US
[patent_app_date] => 2007-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 14023
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0109/20080109869.pdf
[firstpage_image] =>[orig_patent_app_number] => 11742912
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/742912 | Authentication Rule Overrides For Service Provisioning | Apr 30, 2007 | Abandoned |
Array
(
[id] => 8959283
[patent_doc_number] => 08505077
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-06
[patent_title] => 'Acquisition of authentication rules for service provisioning'
[patent_app_type] => utility
[patent_app_number] => 11/742940
[patent_app_country] => US
[patent_app_date] => 2007-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 14026
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11742940
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/742940 | Acquisition of authentication rules for service provisioning | Apr 30, 2007 | Issued |
Array
(
[id] => 4967064
[patent_doc_number] => 20080109884
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-05-08
[patent_title] => 'Triggering of Authentication Rules for Service Provisioning'
[patent_app_type] => utility
[patent_app_number] => 11/742891
[patent_app_country] => US
[patent_app_date] => 2007-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 13972
[patent_no_of_claims] => 40
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0109/20080109884.pdf
[firstpage_image] =>[orig_patent_app_number] => 11742891
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/742891 | Triggering of Authentication Rules for Service Provisioning | Apr 30, 2007 | Abandoned |
Array
(
[id] => 8623420
[patent_doc_number] => 08356341
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-01-15
[patent_title] => 'Life cycle management of authentication rules for service provisioning'
[patent_app_type] => utility
[patent_app_number] => 11/742959
[patent_app_country] => US
[patent_app_date] => 2007-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 14015
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11742959
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/742959 | Life cycle management of authentication rules for service provisioning | Apr 30, 2007 | Issued |
Array
(
[id] => 7689974
[patent_doc_number] => 20070234059
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-10-04
[patent_title] => 'Communication device and medium for the same'
[patent_app_type] => utility
[patent_app_number] => 11/727956
[patent_app_country] => US
[patent_app_date] => 2007-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7922
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0234/20070234059.pdf
[firstpage_image] =>[orig_patent_app_number] => 11727956
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/727956 | Communication device and medium for the same | Mar 28, 2007 | Issued |
Array
(
[id] => 4723325
[patent_doc_number] => 20080244687
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-10-02
[patent_title] => 'FEDERATED ROLE PROVISIONING'
[patent_app_type] => utility
[patent_app_number] => 11/693155
[patent_app_country] => US
[patent_app_date] => 2007-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5989
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0244/20080244687.pdf
[firstpage_image] =>[orig_patent_app_number] => 11693155
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/693155 | Federated role provisioning | Mar 28, 2007 | Issued |
Array
(
[id] => 8273378
[patent_doc_number] => 08214899
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-07-03
[patent_title] => 'Identifying unauthorized access to a network resource'
[patent_app_type] => utility
[patent_app_number] => 11/686918
[patent_app_country] => US
[patent_app_date] => 2007-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7245
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11686918
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/686918 | Identifying unauthorized access to a network resource | Mar 14, 2007 | Issued |
Array
(
[id] => 5006753
[patent_doc_number] => 20070204326
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-08-30
[patent_title] => 'METHOD OF CUSTOMIZING A STANDARDIZED IT POLICY'
[patent_app_type] => utility
[patent_app_number] => 11/679470
[patent_app_country] => US
[patent_app_date] => 2007-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 16729
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0204/20070204326.pdf
[firstpage_image] =>[orig_patent_app_number] => 11679470
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/679470 | Method of customizing a standardized IT policy | Feb 26, 2007 | Issued |
Array
(
[id] => 9348392
[patent_doc_number] => 08667555
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-03-04
[patent_title] => 'Integrity plug-in-proxy'
[patent_app_type] => utility
[patent_app_number] => 11/678432
[patent_app_country] => US
[patent_app_date] => 2007-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7267
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 304
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11678432
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/678432 | Integrity plug-in-proxy | Feb 22, 2007 | Issued |
Array
(
[id] => 4923725
[patent_doc_number] => 20080072042
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-03-20
[patent_title] => 'Management system, management apparatus and management method'
[patent_app_type] => utility
[patent_app_number] => 11/707983
[patent_app_country] => US
[patent_app_date] => 2007-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12243
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0072/20080072042.pdf
[firstpage_image] =>[orig_patent_app_number] => 11707983
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/707983 | Management system, management apparatus and management method | Feb 19, 2007 | Issued |
Array
(
[id] => 4875032
[patent_doc_number] => 20080201766
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-08-21
[patent_title] => 'Efficient data structures for multi-dimensional security'
[patent_app_type] => utility
[patent_app_number] => 11/707663
[patent_app_country] => US
[patent_app_date] => 2007-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 4659
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0201/20080201766.pdf
[firstpage_image] =>[orig_patent_app_number] => 11707663
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/707663 | Efficient data structures for multi-dimensional security | Feb 15, 2007 | Issued |
Array
(
[id] => 4815119
[patent_doc_number] => 20080195750
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-08-14
[patent_title] => 'SECURE CROSS PLATFORM AUDITING'
[patent_app_type] => utility
[patent_app_number] => 11/673473
[patent_app_country] => US
[patent_app_date] => 2007-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13421
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0195/20080195750.pdf
[firstpage_image] =>[orig_patent_app_number] => 11673473
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/673473 | SECURE CROSS PLATFORM AUDITING | Feb 8, 2007 | Abandoned |
Array
(
[id] => 9556060
[patent_doc_number] => 08763135
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-06-24
[patent_title] => 'Document processing apparatus, document processing method, and computer-executable program'
[patent_app_type] => utility
[patent_app_number] => 11/620941
[patent_app_country] => US
[patent_app_date] => 2007-01-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 8963
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11620941
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/620941 | Document processing apparatus, document processing method, and computer-executable program | Jan 7, 2007 | Issued |