Search

David A. Redding

Examiner (ID: 6078, Phone: (571)272-1276 , Office: P/3723 )

Most Active Art Unit
3723
Art Unit(s)
3723, 1809, 1801, 1744, 1303, 2899, 1754, 1815
Total Applications
3382
Issued Applications
2727
Pending Applications
205
Abandoned Applications
458

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 5187509 [patent_doc_number] => 20070165817 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-07-19 [patent_title] => 'METHOD AND SYSTEM FOR IMPLEMENTATION OF TERMINAL CONFIGURATION DATA PROTECTION' [patent_app_type] => utility [patent_app_number] => 11/611079 [patent_app_country] => US [patent_app_date] => 2006-12-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3968 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0165/20070165817.pdf [firstpage_image] =>[orig_patent_app_number] => 11611079 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/611079
METHOD AND SYSTEM FOR IMPLEMENTATION OF TERMINAL CONFIGURATION DATA PROTECTION Dec 13, 2006 Abandoned
Array ( [id] => 4905572 [patent_doc_number] => 20080114986 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-05-15 [patent_title] => 'Techniques for modification of access expiration conditions' [patent_app_type] => utility [patent_app_number] => 11/590268 [patent_app_country] => US [patent_app_date] => 2006-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5229 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0114/20080114986.pdf [firstpage_image] =>[orig_patent_app_number] => 11590268 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/590268
Techniques for modification of access expiration conditions Oct 30, 2006 Issued
Array ( [id] => 4895574 [patent_doc_number] => 20080104674 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-05-01 [patent_title] => 'System and method of filtering unsolicited messages' [patent_app_type] => utility [patent_app_number] => 11/589249 [patent_app_country] => US [patent_app_date] => 2006-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4529 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0104/20080104674.pdf [firstpage_image] =>[orig_patent_app_number] => 11589249 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/589249
System and method of filtering unsolicited messages Oct 29, 2006 Issued
Array ( [id] => 8741419 [patent_doc_number] => 08413208 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-04-02 [patent_title] => 'Access control and protocol/policy determination based on the client\'s environment' [patent_app_type] => utility [patent_app_number] => 11/589208 [patent_app_country] => US [patent_app_date] => 2006-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 2413 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 284 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11589208 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/589208
Access control and protocol/policy determination based on the client's environment Oct 29, 2006 Issued
Array ( [id] => 5571603 [patent_doc_number] => 20090254982 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-10-08 [patent_title] => 'METHODS, PROGRAMS AND A SYSTEM OF PROVIDING REMOTE ACCESS' [patent_app_type] => utility [patent_app_number] => 12/440306 [patent_app_country] => US [patent_app_date] => 2006-10-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3408 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0254/20090254982.pdf [firstpage_image] =>[orig_patent_app_number] => 12440306 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/440306
METHODS, PROGRAMS AND A SYSTEM OF PROVIDING REMOTE ACCESS Oct 22, 2006 Abandoned
Array ( [id] => 5036582 [patent_doc_number] => 20070101121 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-05-03 [patent_title] => 'Secure IP access protocol framework and supporting network architecture' [patent_app_type] => utility [patent_app_number] => 11/522780 [patent_app_country] => US [patent_app_date] => 2006-09-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5041 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0101/20070101121.pdf [firstpage_image] =>[orig_patent_app_number] => 11522780 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/522780
Secure IP access protocol framework and supporting network architecture Sep 17, 2006 Abandoned
Array ( [id] => 5108743 [patent_doc_number] => 20070067621 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-03-22 [patent_title] => 'Storage of digital data' [patent_app_type] => utility [patent_app_number] => 11/522118 [patent_app_country] => US [patent_app_date] => 2006-09-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2762 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 10 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0067/20070067621.pdf [firstpage_image] =>[orig_patent_app_number] => 11522118 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/522118
Storage of digital data Sep 14, 2006 Issued
Array ( [id] => 5309246 [patent_doc_number] => 20090016527 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-15 [patent_title] => 'METHOD OF ESTABLISHING A SESSION KEY AND UNITS FOR IMPLEMENTING THE METHOD' [patent_app_type] => utility [patent_app_number] => 12/064781 [patent_app_country] => US [patent_app_date] => 2006-08-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6960 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0016/20090016527.pdf [firstpage_image] =>[orig_patent_app_number] => 12064781 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/064781
METHOD OF ESTABLISHING A SESSION KEY AND UNITS FOR IMPLEMENTING THE METHOD Aug 24, 2006 Abandoned
Array ( [id] => 8899469 [patent_doc_number] => 08479003 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-07-02 [patent_title] => 'Electronic signature validation systems and methods for asynchronous environments' [patent_app_type] => utility [patent_app_number] => 11/507144 [patent_app_country] => US [patent_app_date] => 2006-08-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 6374 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 282 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11507144 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/507144
Electronic signature validation systems and methods for asynchronous environments Aug 20, 2006 Issued
Array ( [id] => 4911321 [patent_doc_number] => 20080022088 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-01-24 [patent_title] => 'Methods and systems for key escrow' [patent_app_type] => utility [patent_app_number] => 11/446956 [patent_app_country] => US [patent_app_date] => 2006-06-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5125 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0022/20080022088.pdf [firstpage_image] =>[orig_patent_app_number] => 11446956 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/446956
Methods and systems for key escrow Jun 5, 2006 Abandoned
Array ( [id] => 5122144 [patent_doc_number] => 20070143859 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-06-21 [patent_title] => 'Access right management apparatus, method and storage medium' [patent_app_type] => utility [patent_app_number] => 11/445102 [patent_app_country] => US [patent_app_date] => 2006-06-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5645 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0143/20070143859.pdf [firstpage_image] =>[orig_patent_app_number] => 11445102 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/445102
Access right management apparatus, method and storage medium May 31, 2006 Abandoned
Array ( [id] => 5100332 [patent_doc_number] => 20070183594 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-08-09 [patent_title] => 'Data processing apparatus for performing a cryptographic method' [patent_app_type] => utility [patent_app_number] => 11/440109 [patent_app_country] => US [patent_app_date] => 2006-05-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 5724 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0183/20070183594.pdf [firstpage_image] =>[orig_patent_app_number] => 11440109 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/440109
Data processing apparatus for performing a cryptographic method May 24, 2006 Abandoned
Array ( [id] => 5641587 [patent_doc_number] => 20060280042 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-12-14 [patent_title] => 'Apparatus for reproducing copyrighted data' [patent_app_type] => utility [patent_app_number] => 11/438018 [patent_app_country] => US [patent_app_date] => 2006-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2910 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0280/20060280042.pdf [firstpage_image] =>[orig_patent_app_number] => 11438018 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/438018
Apparatus for reproducing copyrighted data May 18, 2006 Abandoned
Array ( [id] => 5161579 [patent_doc_number] => 20070174623 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-07-26 [patent_title] => 'Detecting collusion among multiple recipients of fingerprinted information' [patent_app_type] => utility [patent_app_number] => 11/406066 [patent_app_country] => US [patent_app_date] => 2006-04-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 9985 [patent_no_of_claims] => 111 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0174/20070174623.pdf [firstpage_image] =>[orig_patent_app_number] => 11406066 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/406066
Detecting collusion among multiple recipients of fingerprinted information Apr 17, 2006 Abandoned
Array ( [id] => 4678440 [patent_doc_number] => 20080216071 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-09-04 [patent_title] => 'Software Protection' [patent_app_type] => utility [patent_app_number] => 11/910530 [patent_app_country] => US [patent_app_date] => 2006-04-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2018 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0216/20080216071.pdf [firstpage_image] =>[orig_patent_app_number] => 11910530 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/910530
Software Protection Apr 2, 2006 Abandoned
Array ( [id] => 4650519 [patent_doc_number] => 20080037775 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-02-14 [patent_title] => 'Verifiable generation of weak symmetric keys for strong algorithms' [patent_app_type] => utility [patent_app_number] => 11/395877 [patent_app_country] => US [patent_app_date] => 2006-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6255 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0037/20080037775.pdf [firstpage_image] =>[orig_patent_app_number] => 11395877 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/395877
Verifiable generation of weak symmetric keys for strong algorithms Mar 30, 2006 Abandoned
Array ( [id] => 883834 [patent_doc_number] => 07356143 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2008-04-08 [patent_title] => 'System, method, and apparatus for securely providing content viewable on a secure device' [patent_app_type] => utility [patent_app_number] => 11/361469 [patent_app_country] => US [patent_app_date] => 2006-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7976 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 173 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/356/07356143.pdf [firstpage_image] =>[orig_patent_app_number] => 11361469 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/361469
System, method, and apparatus for securely providing content viewable on a secure device Feb 23, 2006 Issued
Array ( [id] => 5238298 [patent_doc_number] => 20070130455 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-06-07 [patent_title] => 'Series encryption in a quantum cryptographic system' [patent_app_type] => utility [patent_app_number] => 11/294413 [patent_app_country] => US [patent_app_date] => 2005-12-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5187 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 10 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0130/20070130455.pdf [firstpage_image] =>[orig_patent_app_number] => 11294413 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/294413
Series encryption in a quantum cryptographic system Dec 5, 2005 Abandoned
Array ( [id] => 5081593 [patent_doc_number] => 20070124817 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-05-31 [patent_title] => 'Message security framework' [patent_app_type] => utility [patent_app_number] => 11/291032 [patent_app_country] => US [patent_app_date] => 2005-11-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 5924 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0124/20070124817.pdf [firstpage_image] =>[orig_patent_app_number] => 11291032 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/291032
Message security framework Nov 29, 2005 Issued
Array ( [id] => 5106065 [patent_doc_number] => 20070064941 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-03-22 [patent_title] => 'Control 3 signal synthesis' [patent_app_type] => utility [patent_app_number] => 11/214097 [patent_app_country] => US [patent_app_date] => 2005-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4762 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0064/20070064941.pdf [firstpage_image] =>[orig_patent_app_number] => 11214097 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/214097
Control 3 signal synthesis Aug 28, 2005 Issued
Menu