David J Walczak
Examiner (ID: 15568, Phone: (571)272-4895 , Office: P/3754 )
Most Active Art Unit | 3754 |
Art Unit(s) | 2403, 2832, 2899, 3751, 3105, 3754 |
Total Applications | 4576 |
Issued Applications | 3558 |
Pending Applications | 210 |
Abandoned Applications | 807 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 17909393
[patent_doc_number] => 11463267
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-04
[patent_title] => Network function virtualization system and verifying method
[patent_app_type] => utility
[patent_app_number] => 16/331581
[patent_app_country] => US
[patent_app_date] => 2017-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 38
[patent_figures_cnt] => 38
[patent_no_of_words] => 14308
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16331581
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/331581 | Network function virtualization system and verifying method | Apr 17, 2017 | Issued |
Array
(
[id] => 13501725
[patent_doc_number] => 20180302405
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-18
[patent_title] => ORGANIZATIONAL SIGN-IN ACROSS SOVEREIGN ENVIRONMENTS
[patent_app_type] => utility
[patent_app_number] => 15/490675
[patent_app_country] => US
[patent_app_date] => 2017-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6088
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15490675
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/490675 | ORGANIZATIONAL SIGN-IN ACROSS SOVEREIGN ENVIRONMENTS | Apr 17, 2017 | Abandoned |
Array
(
[id] => 12163522
[patent_doc_number] => 20180034788
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'COOPERATION MANAGEMENT APPARATUS AND COMMUNICATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/490331
[patent_app_country] => US
[patent_app_date] => 2017-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3892
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15490331
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/490331 | COOPERATION MANAGEMENT APPARATUS AND COMMUNICATION SYSTEM | Apr 17, 2017 | Abandoned |
Array
(
[id] => 14890337
[patent_doc_number] => 10425228
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-24
[patent_title] => Receipt, data reduction, and storage of encrypted data
[patent_app_type] => utility
[patent_app_number] => 15/445174
[patent_app_country] => US
[patent_app_date] => 2017-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8356
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15445174
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/445174 | Receipt, data reduction, and storage of encrypted data | Feb 27, 2017 | Issued |
Array
(
[id] => 14601449
[patent_doc_number] => 10353917
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-16
[patent_title] => Method and apparatus for analyzing a transmission signal
[patent_app_type] => utility
[patent_app_number] => 15/443035
[patent_app_country] => US
[patent_app_date] => 2017-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 13
[patent_no_of_words] => 5430
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15443035
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/443035 | Method and apparatus for analyzing a transmission signal | Feb 26, 2017 | Issued |
Array
(
[id] => 16610441
[patent_doc_number] => 10911472
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-02
[patent_title] => Techniques for targeted botnet protection
[patent_app_type] => utility
[patent_app_number] => 15/442560
[patent_app_country] => US
[patent_app_date] => 2017-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 12798
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 566
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15442560
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/442560 | Techniques for targeted botnet protection | Feb 23, 2017 | Issued |
Array
(
[id] => 15986753
[patent_doc_number] => 10673719
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-02
[patent_title] => Techniques for botnet detection and member identification
[patent_app_type] => utility
[patent_app_number] => 15/442582
[patent_app_country] => US
[patent_app_date] => 2017-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 12800
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 488
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15442582
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/442582 | Techniques for botnet detection and member identification | Feb 23, 2017 | Issued |
Array
(
[id] => 11674964
[patent_doc_number] => 20170163688
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-08
[patent_title] => 'Segmented Networks that Implement Scanning'
[patent_app_type] => utility
[patent_app_number] => 15/441156
[patent_app_country] => US
[patent_app_date] => 2017-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9502
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15441156
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/441156 | Segmented networks that implement scanning | Feb 22, 2017 | Issued |
Array
(
[id] => 12108374
[patent_doc_number] => 09864859
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-09
[patent_title] => 'Technologies for secure bootstrapping of virtual network functions'
[patent_app_type] => utility
[patent_app_number] => 15/437754
[patent_app_country] => US
[patent_app_date] => 2017-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 17312
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15437754
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/437754 | Technologies for secure bootstrapping of virtual network functions | Feb 20, 2017 | Issued |
Array
(
[id] => 11631974
[patent_doc_number] => 20170142163
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-18
[patent_title] => 'TECHNOLOGIES FOR SCALABLE SECURITY ARCHITECTURE OF VIRTUALIZED NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 15/420858
[patent_app_country] => US
[patent_app_date] => 2017-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 20150
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15420858
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/420858 | Technologies for scalable security architecture of virtualized networks | Jan 30, 2017 | Issued |
Array
(
[id] => 11661199
[patent_doc_number] => 09674221
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-06-06
[patent_title] => 'Collaborative phishing attack detection'
[patent_app_type] => utility
[patent_app_number] => 15/418709
[patent_app_country] => US
[patent_app_date] => 2017-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7383
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 583
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15418709
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/418709 | Collaborative phishing attack detection | Jan 27, 2017 | Issued |
Array
(
[id] => 11621972
[patent_doc_number] => 20170132159
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-11
[patent_title] => 'SYSTEM AND METHOD FOR INTERCEPT OF UEFI BLOCK I/O PROTOCOL SERVICES FOR BIOS BASED HARD DRIVE ENCRYPTION SUPPORT'
[patent_app_type] => utility
[patent_app_number] => 15/414887
[patent_app_country] => US
[patent_app_date] => 2017-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7427
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15414887
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/414887 | System and method for intercept of UEFI block I/O protocol services for BIOS based hard drive encryption support | Jan 24, 2017 | Issued |
Array
(
[id] => 13322459
[patent_doc_number] => 20180212767
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-26
[patent_title] => METHOD OF GENERATING CRYPTOGRAPHIC KEY PAIRS
[patent_app_type] => utility
[patent_app_number] => 15/414391
[patent_app_country] => US
[patent_app_date] => 2017-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4358
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15414391
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/414391 | Method of generating cryptographic key pairs | Jan 23, 2017 | Issued |
Array
(
[id] => 18577910
[patent_doc_number] => 11734443
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-08-22
[patent_title] => Information control program, information control system, and information control method
[patent_app_type] => utility
[patent_app_number] => 16/479477
[patent_app_country] => US
[patent_app_date] => 2017-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 12494
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 309
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16479477
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/479477 | Information control program, information control system, and information control method | Jan 18, 2017 | Issued |
Array
(
[id] => 12899575
[patent_doc_number] => 20180191700
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-05
[patent_title] => TWO-TOKEN BASED AUTHENTICATED SESSION MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 15/395448
[patent_app_country] => US
[patent_app_date] => 2016-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10496
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15395448
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/395448 | Two-token based authenticated session management | Dec 29, 2016 | Issued |
Array
(
[id] => 14645769
[patent_doc_number] => 10367639
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-30
[patent_title] => Graphics processor with encrypted kernels
[patent_app_type] => utility
[patent_app_number] => 15/394324
[patent_app_country] => US
[patent_app_date] => 2016-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 10280
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15394324
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/394324 | Graphics processor with encrypted kernels | Dec 28, 2016 | Issued |
Array
(
[id] => 12696556
[patent_doc_number] => 20180124018
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-03
[patent_title] => COORDINATED APPLICATION FIREWALL
[patent_app_type] => utility
[patent_app_number] => 15/388934
[patent_app_country] => US
[patent_app_date] => 2016-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5856
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 59
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15388934
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/388934 | COORDINATED APPLICATION FIREWALL | Dec 21, 2016 | Abandoned |
Array
(
[id] => 11825740
[patent_doc_number] => 20170214677
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-27
[patent_title] => 'METHODS OF COLLABORATIVE HARDWARE AND SOFTWARE DNS ACCELERATION AND DDOS PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 15/382018
[patent_app_country] => US
[patent_app_date] => 2016-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 15972
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15382018
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/382018 | Methods of collaborative hardware and software DNS acceleration and DDOS protection | Dec 15, 2016 | Issued |
Array
(
[id] => 11533593
[patent_doc_number] => 20170093573
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'Shared Data Encryption and Confidentiality'
[patent_app_type] => utility
[patent_app_number] => 15/374180
[patent_app_country] => US
[patent_app_date] => 2016-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7458
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15374180
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/374180 | Shared data encryption and confidentiality | Dec 8, 2016 | Issued |
Array
(
[id] => 11761195
[patent_doc_number] => 20170208064
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-20
[patent_title] => 'METHODS AND SYSTEMS FOR TRANSFERRING SECURE DATA AND FACILITATING NEW CLIENT ACQUISITIONS'
[patent_app_type] => utility
[patent_app_number] => 15/361320
[patent_app_country] => US
[patent_app_date] => 2016-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 13088
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15361320
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/361320 | Methods and systems for transferring secure data and facilitating new client acquisitions | Nov 24, 2016 | Issued |