Search

Dapinder Singh

Examiner (ID: 16500, Phone: (571)270-1774 , Office: P/3748 )

Most Active Art Unit
3746
Art Unit(s)
3746, 3748
Total Applications
1182
Issued Applications
986
Pending Applications
73
Abandoned Applications
157

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10895233 [patent_doc_number] => 08918864 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-12-23 [patent_title] => 'System, method, and computer program product for making a scan decision during communication of data over a network' [patent_app_type] => utility [patent_app_number] => 11/758494 [patent_app_country] => US [patent_app_date] => 2007-06-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5735 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 213 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11758494 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/758494
System, method, and computer program product for making a scan decision during communication of data over a network Jun 4, 2007 Issued
Array ( [id] => 9248756 [patent_doc_number] => 08613058 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-12-17 [patent_title] => 'Systems, methods and computer program products for providing additional authentication beyond user equipment authentication in an IMS network' [patent_app_type] => utility [patent_app_number] => 11/756025 [patent_app_country] => US [patent_app_date] => 2007-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5071 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11756025 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/756025
Systems, methods and computer program products for providing additional authentication beyond user equipment authentication in an IMS network May 30, 2007 Issued
Array ( [id] => 9623607 [patent_doc_number] => 08793802 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-07-29 [patent_title] => 'System, method, and computer program product for preventing data leakage utilizing a map of data' [patent_app_type] => utility [patent_app_number] => 11/752208 [patent_app_country] => US [patent_app_date] => 2007-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4520 [patent_no_of_claims] => 37 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 153 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11752208 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/752208
System, method, and computer program product for preventing data leakage utilizing a map of data May 21, 2007 Issued
Array ( [id] => 10901827 [patent_doc_number] => 08925073 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-12-30 [patent_title] => 'Method and system for preventing password theft through unauthorized keylogging' [patent_app_type] => utility [patent_app_number] => 11/750517 [patent_app_country] => US [patent_app_date] => 2007-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 2688 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 270 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11750517 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/750517
Method and system for preventing password theft through unauthorized keylogging May 17, 2007 Issued
Array ( [id] => 9999317 [patent_doc_number] => 09043935 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-05-26 [patent_title] => 'Techniques for personalizing content' [patent_app_type] => utility [patent_app_number] => 11/750778 [patent_app_country] => US [patent_app_date] => 2007-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 5801 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 241 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11750778 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/750778
Techniques for personalizing content May 17, 2007 Issued
Array ( [id] => 9358941 [patent_doc_number] => 08677498 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-03-18 [patent_title] => 'Apparatus and method of managing security data' [patent_app_type] => utility [patent_app_number] => 11/747983 [patent_app_country] => US [patent_app_date] => 2007-05-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 10 [patent_no_of_words] => 4947 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 142 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11747983 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/747983
Apparatus and method of managing security data May 13, 2007 Issued
Array ( [id] => 4841868 [patent_doc_number] => 20080282354 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-11-13 [patent_title] => 'ACCESS CONTROL BASED ON PROGRAM PROPERTIES' [patent_app_type] => utility [patent_app_number] => 11/745048 [patent_app_country] => US [patent_app_date] => 2007-05-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 10292 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0282/20080282354.pdf [firstpage_image] =>[orig_patent_app_number] => 11745048 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/745048
Access control based on program properties May 6, 2007 Issued
Array ( [id] => 4967049 [patent_doc_number] => 20080109869 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-05-08 [patent_title] => 'Authentication Rule Overrides For Service Provisioning' [patent_app_type] => utility [patent_app_number] => 11/742912 [patent_app_country] => US [patent_app_date] => 2007-05-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 28 [patent_figures_cnt] => 28 [patent_no_of_words] => 14023 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0109/20080109869.pdf [firstpage_image] =>[orig_patent_app_number] => 11742912 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/742912
Authentication Rule Overrides For Service Provisioning Apr 30, 2007 Abandoned
Array ( [id] => 8959283 [patent_doc_number] => 08505077 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-08-06 [patent_title] => 'Acquisition of authentication rules for service provisioning' [patent_app_type] => utility [patent_app_number] => 11/742940 [patent_app_country] => US [patent_app_date] => 2007-05-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 27 [patent_figures_cnt] => 27 [patent_no_of_words] => 14026 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 147 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11742940 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/742940
Acquisition of authentication rules for service provisioning Apr 30, 2007 Issued
Array ( [id] => 4967064 [patent_doc_number] => 20080109884 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-05-08 [patent_title] => 'Triggering of Authentication Rules for Service Provisioning' [patent_app_type] => utility [patent_app_number] => 11/742891 [patent_app_country] => US [patent_app_date] => 2007-05-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 28 [patent_figures_cnt] => 28 [patent_no_of_words] => 13972 [patent_no_of_claims] => 40 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0109/20080109884.pdf [firstpage_image] =>[orig_patent_app_number] => 11742891 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/742891
Triggering of Authentication Rules for Service Provisioning Apr 30, 2007 Abandoned
Array ( [id] => 8623420 [patent_doc_number] => 08356341 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-01-15 [patent_title] => 'Life cycle management of authentication rules for service provisioning' [patent_app_type] => utility [patent_app_number] => 11/742959 [patent_app_country] => US [patent_app_date] => 2007-05-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 27 [patent_figures_cnt] => 27 [patent_no_of_words] => 14015 [patent_no_of_claims] => 33 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 151 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11742959 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/742959
Life cycle management of authentication rules for service provisioning Apr 30, 2007 Issued
Array ( [id] => 7689974 [patent_doc_number] => 20070234059 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-10-04 [patent_title] => 'Communication device and medium for the same' [patent_app_type] => utility [patent_app_number] => 11/727956 [patent_app_country] => US [patent_app_date] => 2007-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7922 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0234/20070234059.pdf [firstpage_image] =>[orig_patent_app_number] => 11727956 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/727956
Communication device and medium for the same Mar 28, 2007 Issued
Array ( [id] => 4723325 [patent_doc_number] => 20080244687 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-10-02 [patent_title] => 'FEDERATED ROLE PROVISIONING' [patent_app_type] => utility [patent_app_number] => 11/693155 [patent_app_country] => US [patent_app_date] => 2007-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5989 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0244/20080244687.pdf [firstpage_image] =>[orig_patent_app_number] => 11693155 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/693155
Federated role provisioning Mar 28, 2007 Issued
Array ( [id] => 8273378 [patent_doc_number] => 08214899 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-07-03 [patent_title] => 'Identifying unauthorized access to a network resource' [patent_app_type] => utility [patent_app_number] => 11/686918 [patent_app_country] => US [patent_app_date] => 2007-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7245 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 183 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11686918 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/686918
Identifying unauthorized access to a network resource Mar 14, 2007 Issued
Array ( [id] => 5006753 [patent_doc_number] => 20070204326 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-08-30 [patent_title] => 'METHOD OF CUSTOMIZING A STANDARDIZED IT POLICY' [patent_app_type] => utility [patent_app_number] => 11/679470 [patent_app_country] => US [patent_app_date] => 2007-02-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 16729 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0204/20070204326.pdf [firstpage_image] =>[orig_patent_app_number] => 11679470 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/679470
Method of customizing a standardized IT policy Feb 26, 2007 Issued
Array ( [id] => 9348392 [patent_doc_number] => 08667555 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-03-04 [patent_title] => 'Integrity plug-in-proxy' [patent_app_type] => utility [patent_app_number] => 11/678432 [patent_app_country] => US [patent_app_date] => 2007-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7267 [patent_no_of_claims] => 31 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 304 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11678432 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/678432
Integrity plug-in-proxy Feb 22, 2007 Issued
Array ( [id] => 4923725 [patent_doc_number] => 20080072042 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-03-20 [patent_title] => 'Management system, management apparatus and management method' [patent_app_type] => utility [patent_app_number] => 11/707983 [patent_app_country] => US [patent_app_date] => 2007-02-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 12243 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0072/20080072042.pdf [firstpage_image] =>[orig_patent_app_number] => 11707983 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/707983
Management system, management apparatus and management method Feb 19, 2007 Issued
Array ( [id] => 4875032 [patent_doc_number] => 20080201766 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-08-21 [patent_title] => 'Efficient data structures for multi-dimensional security' [patent_app_type] => utility [patent_app_number] => 11/707663 [patent_app_country] => US [patent_app_date] => 2007-02-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 4659 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0201/20080201766.pdf [firstpage_image] =>[orig_patent_app_number] => 11707663 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/707663
Efficient data structures for multi-dimensional security Feb 15, 2007 Issued
Array ( [id] => 4815119 [patent_doc_number] => 20080195750 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-08-14 [patent_title] => 'SECURE CROSS PLATFORM AUDITING' [patent_app_type] => utility [patent_app_number] => 11/673473 [patent_app_country] => US [patent_app_date] => 2007-02-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 13421 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0195/20080195750.pdf [firstpage_image] =>[orig_patent_app_number] => 11673473 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/673473
SECURE CROSS PLATFORM AUDITING Feb 8, 2007 Abandoned
Array ( [id] => 9556060 [patent_doc_number] => 08763135 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-06-24 [patent_title] => 'Document processing apparatus, document processing method, and computer-executable program' [patent_app_type] => utility [patent_app_number] => 11/620941 [patent_app_country] => US [patent_app_date] => 2007-01-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 12 [patent_no_of_words] => 8963 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 126 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11620941 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/620941
Document processing apparatus, document processing method, and computer-executable program Jan 7, 2007 Issued
Menu