David P Sharvin
Examiner (ID: 2699, Phone: (571)272-9863 , Office: P/3692 )
Most Active Art Unit | 3692 |
Art Unit(s) | 3692 |
Total Applications | 292 |
Issued Applications | 84 |
Pending Applications | 53 |
Abandoned Applications | 155 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 11556967
[patent_doc_number] => 20170103213
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-13
[patent_title] => 'VERIFYING NETWORK ATTACK DETECTOR EFFECTIVENESS'
[patent_app_type] => utility
[patent_app_number] => 15/386873
[patent_app_country] => US
[patent_app_date] => 2016-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 10847
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15386873
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/386873 | Verifying network attack detector effectiveness | Dec 20, 2016 | Issued |
Array
(
[id] => 12201723
[patent_doc_number] => 09904790
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-27
[patent_title] => 'Recording data and using the recorded data'
[patent_app_type] => utility
[patent_app_number] => 15/373624
[patent_app_country] => US
[patent_app_date] => 2016-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 15
[patent_no_of_words] => 11138
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 261
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15373624
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/373624 | Recording data and using the recorded data | Dec 8, 2016 | Issued |
Array
(
[id] => 15231683
[patent_doc_number] => 10503564
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-10
[patent_title] => Method and apparatus for handling security of an application and its extension
[patent_app_type] => utility
[patent_app_number] => 15/374078
[patent_app_country] => US
[patent_app_date] => 2016-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 24
[patent_no_of_words] => 14422
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15374078
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/374078 | Method and apparatus for handling security of an application and its extension | Dec 8, 2016 | Issued |
Array
(
[id] => 11474342
[patent_doc_number] => 20170061125
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'SYSTEM AND METHOD FOR STATISTICAL ANALYSIS OF COMPARATIVE ENTROPY'
[patent_app_type] => utility
[patent_app_number] => 15/352158
[patent_app_country] => US
[patent_app_date] => 2016-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8913
[patent_no_of_claims] => 38
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15352158
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/352158 | System and method for statistical analysis of comparative entropy | Nov 14, 2016 | Issued |
Array
(
[id] => 14314961
[patent_doc_number] => 20190147184
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-16
[patent_title] => METHOD AND APPARATUS FOR SECURELY CALLING FINGERPRINT INFORMATION AND MOBILE TERMINAL
[patent_app_type] => utility
[patent_app_number] => 15/759512
[patent_app_country] => US
[patent_app_date] => 2016-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7884
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15759512
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/759512 | METHOD AND APPARATUS FOR SECURELY CALLING FINGERPRINT INFORMATION AND MOBILE TERMINAL | Aug 4, 2016 | Abandoned |
Array
(
[id] => 14127617
[patent_doc_number] => 10250689
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-02
[patent_title] => Security monitor for a vehicle
[patent_app_type] => utility
[patent_app_number] => 15/229228
[patent_app_country] => US
[patent_app_date] => 2016-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2198
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15229228
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/229228 | Security monitor for a vehicle | Aug 4, 2016 | Issued |
Array
(
[id] => 13351467
[patent_doc_number] => 20180227273
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-09
[patent_title] => SYSTEMS AND METHODS FOR MANAGING TELECOMMUNICATIONS
[patent_app_type] => utility
[patent_app_number] => 15/885595
[patent_app_country] => US
[patent_app_date] => 2016-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20560
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15885595
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/885595 | Systems and methods for managing telecommunications | Aug 3, 2016 | Issued |
Array
(
[id] => 12163591
[patent_doc_number] => 20180034857
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'SYSTEM, METHOD AND APPARATUS FOR FINE-GRAINED PRIVACY SPECIFICATION AND VERIFICATION'
[patent_app_type] => utility
[patent_app_number] => 15/223848
[patent_app_country] => US
[patent_app_date] => 2016-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5790
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15223848
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/223848 | System, method and apparatus for fine-grained privacy specification and verification | Jul 28, 2016 | Issued |
Array
(
[id] => 15924479
[patent_doc_number] => 10659495
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-05-19
[patent_title] => Dynamic authorization in a multi-tenancy environment via tenant policy profiles
[patent_app_type] => utility
[patent_app_number] => 15/216193
[patent_app_country] => US
[patent_app_date] => 2016-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 7088
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 208
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15216193
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/216193 | Dynamic authorization in a multi-tenancy environment via tenant policy profiles | Jul 20, 2016 | Issued |
Array
(
[id] => 12121359
[patent_doc_number] => 20180004946
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-04
[patent_title] => 'REGULATING CONTROL TRANSFERS FOR EXECUTE-ONLY CODE EXECUTION'
[patent_app_type] => utility
[patent_app_number] => 15/201018
[patent_app_country] => US
[patent_app_date] => 2016-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 13584
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15201018
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/201018 | REGULATING CONTROL TRANSFERS FOR EXECUTE-ONLY CODE EXECUTION | Jun 30, 2016 | Abandoned |
Array
(
[id] => 14918579
[patent_doc_number] => 10430610
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-01
[patent_title] => Adaptive data obfuscation
[patent_app_type] => utility
[patent_app_number] => 15/199176
[patent_app_country] => US
[patent_app_date] => 2016-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8529
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15199176
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/199176 | Adaptive data obfuscation | Jun 29, 2016 | Issued |
Array
(
[id] => 13684581
[patent_doc_number] => 20160381027
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-29
[patent_title] => SYSTEM AND METHOD FOR DETECTING AND REPORTING SURREPTITIOUS USAGE
[patent_app_type] => utility
[patent_app_number] => 15/196036
[patent_app_country] => US
[patent_app_date] => 2016-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6229
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15196036
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/196036 | SYSTEM AND METHOD FOR DETECTING AND REPORTING SURREPTITIOUS USAGE | Jun 28, 2016 | Abandoned |
Array
(
[id] => 15521463
[patent_doc_number] => 10567342
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-18
[patent_title] => Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens
[patent_app_type] => utility
[patent_app_number] => 15/187657
[patent_app_country] => US
[patent_app_date] => 2016-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 15212
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 406
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15187657
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/187657 | Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens | Jun 19, 2016 | Issued |
Array
(
[id] => 15402707
[patent_doc_number] => 10542021
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-01-21
[patent_title] => Automated extraction of behavioral profile features
[patent_app_type] => utility
[patent_app_number] => 15/187532
[patent_app_country] => US
[patent_app_date] => 2016-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 8582
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15187532
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/187532 | Automated extraction of behavioral profile features | Jun 19, 2016 | Issued |
Array
(
[id] => 15521463
[patent_doc_number] => 10567342
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-18
[patent_title] => Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens
[patent_app_type] => utility
[patent_app_number] => 15/187657
[patent_app_country] => US
[patent_app_date] => 2016-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 15212
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 406
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15187657
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/187657 | Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens | Jun 19, 2016 | Issued |
Array
(
[id] => 11317059
[patent_doc_number] => 20160353170
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-01
[patent_title] => 'IPTV Follow Me Content System and Method'
[patent_app_type] => utility
[patent_app_number] => 15/180788
[patent_app_country] => US
[patent_app_date] => 2016-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11644
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15180788
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/180788 | IPTV follow me content system and method | Jun 12, 2016 | Issued |
Array
(
[id] => 11338813
[patent_doc_number] => 20160364569
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'DEVICE AND METHOD FOR PROTECTION OF IOS SOFTWARE MODULES'
[patent_app_type] => utility
[patent_app_number] => 15/177067
[patent_app_country] => US
[patent_app_date] => 2016-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3207
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15177067
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/177067 | DEVICE AND METHOD FOR PROTECTION OF IOS SOFTWARE MODULES | Jun 7, 2016 | Abandoned |
Array
(
[id] => 14709343
[patent_doc_number] => 10382444
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-13
[patent_title] => Device blocking tool
[patent_app_type] => utility
[patent_app_number] => 15/161911
[patent_app_country] => US
[patent_app_date] => 2016-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7611
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15161911
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/161911 | Device blocking tool | May 22, 2016 | Issued |
Array
(
[id] => 12061007
[patent_doc_number] => 20170337351
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-23
[patent_title] => 'SUBSET-DIFFERENCE BROADCAST ENCRYPTION WITH BLACKLISTING'
[patent_app_type] => utility
[patent_app_number] => 15/158296
[patent_app_country] => US
[patent_app_date] => 2016-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6203
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15158296
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/158296 | Subset-difference broadcast encryption with blacklisting | May 17, 2016 | Issued |
Array
(
[id] => 12055451
[patent_doc_number] => 20170331795
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-16
[patent_title] => 'VEHICLE DATA ENCRYPTION'
[patent_app_type] => utility
[patent_app_number] => 15/154085
[patent_app_country] => US
[patent_app_date] => 2016-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5868
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15154085
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/154085 | VEHICLE DATA ENCRYPTION | May 12, 2016 | Abandoned |