Search

David P Sharvin

Examiner (ID: 2699, Phone: (571)272-9863 , Office: P/3692 )

Most Active Art Unit
3692
Art Unit(s)
3692
Total Applications
292
Issued Applications
84
Pending Applications
53
Abandoned Applications
155

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11688256 [patent_doc_number] => 09686312 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-06-20 [patent_title] => 'Verifying network attack detector effectiveness' [patent_app_type] => utility [patent_app_number] => 14/338852 [patent_app_country] => US [patent_app_date] => 2014-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 23 [patent_no_of_words] => 10844 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 14 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14338852 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/338852
Verifying network attack detector effectiveness Jul 22, 2014 Issued
Array ( [id] => 10682610 [patent_doc_number] => 20160028755 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-01-28 [patent_title] => 'TRAFFIC SEGREGATION IN DDOS ATTACK ARCHITECTURE' [patent_app_type] => utility [patent_app_number] => 14/339255 [patent_app_country] => US [patent_app_date] => 2014-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8806 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14339255 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/339255
Traffic segregation in DDoS attack architecture Jul 22, 2014 Issued
Array ( [id] => 10934856 [patent_doc_number] => 20140337877 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-11-13 [patent_title] => 'IPTV Follow Me Content System and Method' [patent_app_type] => utility [patent_app_number] => 14/331145 [patent_app_country] => US [patent_app_date] => 2014-07-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 11498 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 12 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14331145 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/331145
IPTV follow me content system and method Jul 13, 2014 Issued
Array ( [id] => 10146084 [patent_doc_number] => 09178906 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-11-03 [patent_title] => 'Detecting and remediating malware dropped by files' [patent_app_type] => utility [patent_app_number] => 14/329624 [patent_app_country] => US [patent_app_date] => 2014-07-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4377 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 155 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14329624 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/329624
Detecting and remediating malware dropped by files Jul 10, 2014 Issued
Array ( [id] => 9974230 [patent_doc_number] => 09021267 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-04-28 [patent_title] => 'System and method for using digital signatures to assign permissions' [patent_app_type] => utility [patent_app_number] => 14/325635 [patent_app_country] => US [patent_app_date] => 2014-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 12 [patent_no_of_words] => 3136 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14325635 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/325635
System and method for using digital signatures to assign permissions Jul 7, 2014 Issued
Array ( [id] => 11724519 [patent_doc_number] => 09697375 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-07-04 [patent_title] => 'Fast data protection using dual file systems' [patent_app_type] => utility [patent_app_number] => 14/401062 [patent_app_country] => US [patent_app_date] => 2014-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 12 [patent_no_of_words] => 13048 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 237 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14401062 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/401062
Fast data protection using dual file systems Jun 26, 2014 Issued
Array ( [id] => 11352764 [patent_doc_number] => 20160371504 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-22 [patent_title] => 'DATA PROTECTION BASED ON USER AND GESTURE RECOGNITION' [patent_app_type] => utility [patent_app_number] => 14/403024 [patent_app_country] => US [patent_app_date] => 2014-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 16569 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14403024 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/403024
Data protection based on user and gesture recognition Jun 26, 2014 Issued
Array ( [id] => 10772980 [patent_doc_number] => 20160119135 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-04-28 [patent_title] => 'SYSTEM AND METHOD FOR SECURING MULTIPLE DATA SEGMENTS HAVING DIFFERENT LENGTHS USING PATTERN KEYS HAVING MULTIPLE DIFFERENT STRENGTHS' [patent_app_type] => utility [patent_app_number] => 14/274090 [patent_app_country] => US [patent_app_date] => 2014-05-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 7985 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14274090 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/274090
SYSTEM AND METHOD FOR SECURING MULTIPLE DATA SEGMENTS HAVING DIFFERENT LENGTHS USING PATTERN KEYS HAVING MULTIPLE DIFFERENT STRENGTHS May 8, 2014 Abandoned
Array ( [id] => 10425203 [patent_doc_number] => 20150310215 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-29 [patent_title] => 'DISCOVERY AND CLASSIFICATION OF ENTERPRISE ASSETS VIA HOST CHARACTERISTICS' [patent_app_type] => utility [patent_app_number] => 14/262349 [patent_app_country] => US [patent_app_date] => 2014-04-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4938 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14262349 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/262349
Discovery and classification of enterprise assets via host characteristics Apr 24, 2014 Issued
Array ( [id] => 10379077 [patent_doc_number] => 20150264084 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'SYSTEMS AND METHODS FOR PROTECTING ORGANIZATIONS AGAINST SPEAR PHISHING ATTACKS' [patent_app_type] => utility [patent_app_number] => 14/262422 [patent_app_country] => US [patent_app_date] => 2014-04-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 10815 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14262422 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/262422
Systems and methods for protecting organizations against spear phishing attacks Apr 24, 2014 Issued
Array ( [id] => 10922650 [patent_doc_number] => 20140325670 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-10-30 [patent_title] => 'SYSTEM AND METHOD FOR PROVIDING RISK SCORE BASED ON SENSITIVE INFORMATION INSIDE USER DEVICE' [patent_app_type] => utility [patent_app_number] => 14/262305 [patent_app_country] => US [patent_app_date] => 2014-04-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 4054 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14262305 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/262305
SYSTEM AND METHOD FOR PROVIDING RISK SCORE BASED ON SENSITIVE INFORMATION INSIDE USER DEVICE Apr 24, 2014 Abandoned
Array ( [id] => 13684525 [patent_doc_number] => 20160380999 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-29 [patent_title] => User Identifier Based Device, Identity and Activity Management System [patent_app_type] => utility [patent_app_number] => 14/385645 [patent_app_country] => US [patent_app_date] => 2014-03-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7544 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14385645 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/385645
User Identifier Based Device, Identity and Activity Management System Mar 16, 2014 Abandoned
Array ( [id] => 9604843 [patent_doc_number] => 20140201525 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-17 [patent_title] => 'SYSTEM AND METHOD FOR MULTI-LAYERED SENSITIVE DATA PROTECTION IN A VIRTUAL COMPUTING ENVIRONMENT' [patent_app_type] => utility [patent_app_number] => 14/213881 [patent_app_country] => US [patent_app_date] => 2014-03-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 12198 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14213881 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/213881
System and method for multi-layered sensitive data protection in a virtual computing environment Mar 13, 2014 Issued
Array ( [id] => 9599474 [patent_doc_number] => 20140196155 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-10 [patent_title] => 'DIGITAL RIGHTS MANAGEMENT (DRM) LOCKER' [patent_app_type] => utility [patent_app_number] => 14/204924 [patent_app_country] => US [patent_app_date] => 2014-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5621 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14204924 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/204924
Digital rights management (DRM) locker Mar 10, 2014 Issued
Array ( [id] => 9841240 [patent_doc_number] => 20150033322 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-29 [patent_title] => 'LOGGING ATTACK CONTEXT DATA' [patent_app_type] => utility [patent_app_number] => 14/155008 [patent_app_country] => US [patent_app_date] => 2014-01-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6352 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14155008 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/155008
LOGGING ATTACK CONTEXT DATA Jan 13, 2014 Abandoned
Array ( [id] => 9903438 [patent_doc_number] => 20150058639 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-26 [patent_title] => 'ENCRYPTION PROCESSING DEVICE AND STORAGE DEVICE' [patent_app_type] => utility [patent_app_number] => 14/108659 [patent_app_country] => US [patent_app_date] => 2013-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2793 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14108659 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/108659
ENCRYPTION PROCESSING DEVICE AND STORAGE DEVICE Dec 16, 2013 Abandoned
Array ( [id] => 11207196 [patent_doc_number] => 09436823 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-09-06 [patent_title] => 'System and method for detecting malicious code' [patent_app_type] => utility [patent_app_number] => 14/109005 [patent_app_country] => US [patent_app_date] => 2013-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3310 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 128 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14109005 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/109005
System and method for detecting malicious code Dec 16, 2013 Issued
Array ( [id] => 10287306 [patent_doc_number] => 20150172304 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-06-18 [patent_title] => 'SECURE BACKUP WITH ANTI-MALWARE SCAN' [patent_app_type] => utility [patent_app_number] => 14/108285 [patent_app_country] => US [patent_app_date] => 2013-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4086 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14108285 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/108285
SECURE BACKUP WITH ANTI-MALWARE SCAN Dec 15, 2013 Abandoned
Array ( [id] => 10132934 [patent_doc_number] => 09166785 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-20 [patent_title] => 'Cryptography processing device and cryptography processing method' [patent_app_type] => utility [patent_app_number] => 14/104409 [patent_app_country] => US [patent_app_date] => 2013-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 10775 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 246 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14104409 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/104409
Cryptography processing device and cryptography processing method Dec 11, 2013 Issued
Array ( [id] => 11316588 [patent_doc_number] => 20160352698 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-01 [patent_title] => 'SECURITY CONTROL METHOD FOR EUICC AND EUICC' [patent_app_type] => utility [patent_app_number] => 15/101882 [patent_app_country] => US [patent_app_date] => 2013-12-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7186 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15101882 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/101882
SECURITY CONTROL METHOD FOR EUICC AND EUICC Dec 4, 2013 Abandoned
Menu