David P Sharvin
Examiner (ID: 2699, Phone: (571)272-9863 , Office: P/3692 )
Most Active Art Unit | 3692 |
Art Unit(s) | 3692 |
Total Applications | 292 |
Issued Applications | 84 |
Pending Applications | 53 |
Abandoned Applications | 155 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 10497162
[patent_doc_number] => 20150382185
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'METHOD AND DEVICE FOR COUPLING TWO COMMUNICATION PARTNERS'
[patent_app_type] => utility
[patent_app_number] => 14/739120
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2509
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739120
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/739120 | Method and device for coupling two communication partners | Jun 14, 2015 | Issued |
Array
(
[id] => 10496614
[patent_doc_number] => 20150381637
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'SYSTEM AND METHODS FOR MALWARE DETECTION USING LOG BASED CROWDSOURCING ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 14/738959
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11428
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738959
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738959 | System and methods for malware detection using log based crowdsourcing analysis | Jun 14, 2015 | Issued |
Array
(
[id] => 10682561
[patent_doc_number] => 20160028706
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-28
[patent_title] => 'DISPLAYING THE ACCESSIBILITY OF HYPERLINKED FILES'
[patent_app_type] => utility
[patent_app_number] => 14/739117
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7315
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739117
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/739117 | Displaying the accessibility of hyperlinked files | Jun 14, 2015 | Issued |
Array
(
[id] => 10688549
[patent_doc_number] => 20160034693
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'CERTIFICATE AUTHORITY OPERATION APPARATUS AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/738986
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 23259
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738986
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738986 | CERTIFICATE AUTHORITY OPERATION APPARATUS AND METHOD | Jun 14, 2015 | Abandoned |
Array
(
[id] => 11340370
[patent_doc_number] => 20160366126
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'SCREEN-ANALYSIS BASED DEVICE SECURITY'
[patent_app_type] => utility
[patent_app_number] => 14/739107
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12895
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739107
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/739107 | Screen-analysis based device security | Jun 14, 2015 | Issued |
Array
(
[id] => 12146891
[patent_doc_number] => 09881144
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-30
[patent_title] => 'Identifying usage of code'
[patent_app_type] => utility
[patent_app_number] => 14/738998
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7097
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738998
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738998 | Identifying usage of code | Jun 14, 2015 | Issued |
Array
(
[id] => 11340400
[patent_doc_number] => 20160366156
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'Protection of communication on a vehicular network via a remote security service'
[patent_app_type] => utility
[patent_app_number] => 14/738935
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8918
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738935
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738935 | Protection of communication on a vehicular network via a remote security service | Jun 14, 2015 | Issued |
Array
(
[id] => 11863056
[patent_doc_number] => 09742760
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-08-22
[patent_title] => 'System and method for improving login and registration efficiency to network-accessed data'
[patent_app_type] => utility
[patent_app_number] => 14/739118
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6275
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739118
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/739118 | System and method for improving login and registration efficiency to network-accessed data | Jun 14, 2015 | Issued |
Array
(
[id] => 11724484
[patent_doc_number] => 09697340
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-04
[patent_title] => 'System and methods with assured one-time, replay-resistant passwords'
[patent_app_type] => utility
[patent_app_number] => 14/738890
[patent_app_country] => US
[patent_app_date] => 2015-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5099
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738890
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738890 | System and methods with assured one-time, replay-resistant passwords | Jun 13, 2015 | Issued |
Array
(
[id] => 17637172
[patent_doc_number] => 11347896
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-05-31
[patent_title] => Horizontal scan detection
[patent_app_type] => utility
[patent_app_number] => 14/738693
[patent_app_country] => US
[patent_app_date] => 2015-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12354
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 262
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738693
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738693 | Horizontal scan detection | Jun 11, 2015 | Issued |
Array
(
[id] => 10480380
[patent_doc_number] => 20150365397
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-17
[patent_title] => 'WEB AUTHENTICATION METHOD AND SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/738657
[patent_app_country] => US
[patent_app_date] => 2015-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4306
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738657
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738657 | WEB AUTHENTICATION METHOD AND SYSTEM | Jun 11, 2015 | Abandoned |
Array
(
[id] => 11233055
[patent_doc_number] => 09460284
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-10-04
[patent_title] => 'Behavioral malware detection using an interpreter virtual machine'
[patent_app_type] => utility
[patent_app_number] => 14/738548
[patent_app_country] => US
[patent_app_date] => 2015-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 8327
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738548
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738548 | Behavioral malware detection using an interpreter virtual machine | Jun 11, 2015 | Issued |
Array
(
[id] => 11272895
[patent_doc_number] => 20160335442
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'ESTABLISHING AND USING A TRUST LEVEL IN MOBILE PHONES'
[patent_app_type] => utility
[patent_app_number] => 14/731849
[patent_app_country] => US
[patent_app_date] => 2015-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7794
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14731849
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/731849 | Establishing and using a trust level in mobile phones | Jun 4, 2015 | Issued |
Array
(
[id] => 14457627
[patent_doc_number] => 10324774
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-18
[patent_title] => Kernel program including relational database, and method and apparatus for executing said program
[patent_app_type] => utility
[patent_app_number] => 15/313997
[patent_app_country] => US
[patent_app_date] => 2015-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4867
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15313997
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/313997 | Kernel program including relational database, and method and apparatus for executing said program | Jun 4, 2015 | Issued |
Array
(
[id] => 12296820
[patent_doc_number] => 09935965
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-03
[patent_title] => Establishing and using a trust level in mobile phones
[patent_app_type] => utility
[patent_app_number] => 14/711905
[patent_app_country] => US
[patent_app_date] => 2015-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 7560
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14711905
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/711905 | Establishing and using a trust level in mobile phones | May 13, 2015 | Issued |
Array
(
[id] => 10364669
[patent_doc_number] => 20150249674
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-03
[patent_title] => 'CONTENT-BASED ISOLATION FOR COMPUTING DEVICE SECURITY'
[patent_app_type] => utility
[patent_app_number] => 14/709550
[patent_app_country] => US
[patent_app_date] => 2015-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9309
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709550
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/709550 | Content-based isolation for computing device security | May 11, 2015 | Issued |
Array
(
[id] => 10359528
[patent_doc_number] => 20150244532
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'METHOD AND TERMINAL FOR MESSAGE VERIFICATION'
[patent_app_type] => utility
[patent_app_number] => 14/707484
[patent_app_country] => US
[patent_app_date] => 2015-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9985
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14707484
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/707484 | Method and terminal for message verification | May 7, 2015 | Issued |
Array
(
[id] => 10310282
[patent_doc_number] => 20150195284
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-09
[patent_title] => 'DELEGATING AUTHORIZATION TO APPLICATIONS ON A CLIENT DEVICE IN A NETWORKED ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/662373
[patent_app_country] => US
[patent_app_date] => 2015-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6788
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14662373
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/662373 | Delegating authorization to applications on a client device in a networked environment | Mar 18, 2015 | Issued |
Array
(
[id] => 13113249
[patent_doc_number] => 10075293
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-11
[patent_title] => Information processing apparatus, information processing method, and recording medium
[patent_app_type] => utility
[patent_app_number] => 14/639361
[patent_app_country] => US
[patent_app_date] => 2015-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10899
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14639361
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/639361 | Information processing apparatus, information processing method, and recording medium | Mar 4, 2015 | Issued |
Array
(
[id] => 11933400
[patent_doc_number] => 09800409
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-24
[patent_title] => 'Cryptographic key generation using a stored input value and a stored count value'
[patent_app_type] => utility
[patent_app_number] => 14/636717
[patent_app_country] => US
[patent_app_date] => 2015-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4509
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14636717
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/636717 | Cryptographic key generation using a stored input value and a stored count value | Mar 2, 2015 | Issued |