David J Walczak
Examiner (ID: 15568, Phone: (571)272-4895 , Office: P/3754 )
Most Active Art Unit | 3754 |
Art Unit(s) | 2403, 2832, 2899, 3751, 3105, 3754 |
Total Applications | 4576 |
Issued Applications | 3558 |
Pending Applications | 210 |
Abandoned Applications | 807 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 10994563
[patent_doc_number] => 20160191509
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-30
[patent_title] => 'Methods and Systems for Key Sharding of Objects Stored in Distributed Storage System'
[patent_app_type] => utility
[patent_app_number] => 14/821697
[patent_app_country] => US
[patent_app_date] => 2015-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 60
[patent_figures_cnt] => 60
[patent_no_of_words] => 53620
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14821697
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/821697 | Methods and systems for key sharding of objects stored in distributed storage system | Aug 7, 2015 | Issued |
Array
(
[id] => 11440326
[patent_doc_number] => 20170041347
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'Application-based security rights in cloud environments'
[patent_app_type] => utility
[patent_app_number] => 14/821707
[patent_app_country] => US
[patent_app_date] => 2015-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 14229
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14821707
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/821707 | Application-based security rights in cloud environments | Aug 7, 2015 | Issued |
Array
(
[id] => 11272876
[patent_doc_number] => 20160335422
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'APPARATUS AND METHOD FOR MANAGING UNITY FILE IN A MOBILE PLATFORM'
[patent_app_type] => utility
[patent_app_number] => 14/821669
[patent_app_country] => US
[patent_app_date] => 2015-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 2960
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14821669
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/821669 | Apparatus and method for managing gaming engine file in a mobile platform | Aug 6, 2015 | Issued |
Array
(
[id] => 17079384
[patent_doc_number] => 11115814
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-07
[patent_title] => Use of encryption to provide positioning support services
[patent_app_type] => utility
[patent_app_number] => 15/739619
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 12
[patent_no_of_words] => 21980
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15739619
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/739619 | Use of encryption to provide positioning support services | Jun 28, 2015 | Issued |
Array
(
[id] => 10486042
[patent_doc_number] => 20150371061
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-24
[patent_title] => 'ENCRYPTION KEY GENERATION IN ENCRYPTED STORAGE DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/749627
[patent_app_country] => US
[patent_app_date] => 2015-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3853
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14749627
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/749627 | Encryption key generation in encrypted storage devices | Jun 23, 2015 | Issued |
Array
(
[id] => 10427219
[patent_doc_number] => 20150312229
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-29
[patent_title] => 'STREAMING SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/746326
[patent_app_country] => US
[patent_app_date] => 2015-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8210
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14746326
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/746326 | Streaming system and method | Jun 21, 2015 | Issued |
Array
(
[id] => 13308011
[patent_doc_number] => 20180205542
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-19
[patent_title] => RESOURCE MANAGEMENT IN A CELLULAR NETWORK
[patent_app_type] => utility
[patent_app_number] => 15/314906
[patent_app_country] => US
[patent_app_date] => 2015-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8324
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -38
[patent_words_short_claim] => 14
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15314906
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/314906 | Resource management in a cellular network | May 28, 2015 | Issued |
Array
(
[id] => 11905121
[patent_doc_number] => 09774572
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-26
[patent_title] => 'Obfuscation of references to network resources'
[patent_app_type] => utility
[patent_app_number] => 14/708925
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 5522
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14708925
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/708925 | Obfuscation of references to network resources | May 10, 2015 | Issued |
Array
(
[id] => 14254775
[patent_doc_number] => 10277601
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-04-30
[patent_title] => System and method for recursive propagating application access control
[patent_app_type] => utility
[patent_app_number] => 14/709179
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7366
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 448
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709179
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/709179 | System and method for recursive propagating application access control | May 10, 2015 | Issued |
Array
(
[id] => 11274782
[patent_doc_number] => 20160337329
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'TECHNOLOGIES FOR SECURE BOOTSTRAPPING OF VIRTUAL NETWORK FUNCTIONS'
[patent_app_type] => utility
[patent_app_number] => 14/709170
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 17275
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709170
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/709170 | Technologies for secure bootstrapping of virtual network functions | May 10, 2015 | Issued |
Array
(
[id] => 11274856
[patent_doc_number] => 20160337403
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'SYSTEM AND METHOD FOR IDENTITY AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/708974
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7520
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14708974
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/708974 | System and method for identity authentication | May 10, 2015 | Issued |
Array
(
[id] => 11274767
[patent_doc_number] => 20160337314
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'Firewall Authentication Of Controller-Generated Internet Control Message Protocol (ICMP) Echo Requests'
[patent_app_type] => utility
[patent_app_number] => 14/709180
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7917
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709180
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/709180 | Firewall authentication of controller-generated internet control message protocol (ICMP) echo requests | May 10, 2015 | Issued |
Array
(
[id] => 11412753
[patent_doc_number] => 09560078
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-31
[patent_title] => 'Technologies for scalable security architecture of virtualized networks'
[patent_app_type] => utility
[patent_app_number] => 14/709168
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 20118
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709168
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/709168 | Technologies for scalable security architecture of virtualized networks | May 10, 2015 | Issued |
Array
(
[id] => 11917586
[patent_doc_number] => 09785773
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-10
[patent_title] => 'Malware data item analysis'
[patent_app_type] => utility
[patent_app_number] => 14/668833
[patent_app_country] => US
[patent_app_date] => 2015-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 15499
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 427
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14668833
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/668833 | Malware data item analysis | Mar 24, 2015 | Issued |
Array
(
[id] => 11207185
[patent_doc_number] => 09436812
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-06
[patent_title] => 'Platform-hardened digital rights management key provisioning'
[patent_app_type] => utility
[patent_app_number] => 14/641986
[patent_app_country] => US
[patent_app_date] => 2015-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3792
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14641986
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/641986 | Platform-hardened digital rights management key provisioning | Mar 8, 2015 | Issued |
Array
(
[id] => 12556743
[patent_doc_number] => 10015148
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-03
[patent_title] => Physics-based key generation
[patent_app_type] => utility
[patent_app_number] => 14/639733
[patent_app_country] => US
[patent_app_date] => 2015-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 19209
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14639733
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/639733 | Physics-based key generation | Mar 4, 2015 | Issued |
Array
(
[id] => 10605155
[patent_doc_number] => 09325730
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-26
[patent_title] => 'Collaborative phishing attack detection'
[patent_app_type] => utility
[patent_app_number] => 14/620245
[patent_app_country] => US
[patent_app_date] => 2015-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7331
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620245
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/620245 | Collaborative phishing attack detection | Feb 11, 2015 | Issued |
Array
(
[id] => 10786202
[patent_doc_number] => 20160132358
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-12
[patent_title] => 'PERIPHERAL DEVICE SHARING ACROSS VIRTUAL MACHINES RUNNING ON DIFFERENT HOST COMPUTING SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 14/602297
[patent_app_country] => US
[patent_app_date] => 2015-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4172
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602297
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/602297 | Peripheral device sharing across virtual machines running on different host computing systems | Jan 21, 2015 | Issued |
Array
(
[id] => 11682311
[patent_doc_number] => 09680862
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-13
[patent_title] => 'Trusted threat-aware microvisor'
[patent_app_type] => utility
[patent_app_number] => 14/602023
[patent_app_country] => US
[patent_app_date] => 2015-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 11753
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602023
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/602023 | Trusted threat-aware microvisor | Jan 20, 2015 | Issued |
Array
(
[id] => 10320958
[patent_doc_number] => 20150205962
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-23
[patent_title] => 'BEHAVIORAL ANALYTICS DRIVEN HOST-BASED MALICIOUS BEHAVIOR AND DATA EXFILTRATION DISRUPTION'
[patent_app_type] => utility
[patent_app_number] => 14/602011
[patent_app_country] => US
[patent_app_date] => 2015-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8920
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602011
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/602011 | BEHAVIORAL ANALYTICS DRIVEN HOST-BASED MALICIOUS BEHAVIOR AND DATA EXFILTRATION DISRUPTION | Jan 20, 2015 | Abandoned |