David P Sharvin
Examiner (ID: 2699, Phone: (571)272-9863 , Office: P/3692 )
Most Active Art Unit | 3692 |
Art Unit(s) | 3692 |
Total Applications | 292 |
Issued Applications | 84 |
Pending Applications | 53 |
Abandoned Applications | 155 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 11688256
[patent_doc_number] => 09686312
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-20
[patent_title] => 'Verifying network attack detector effectiveness'
[patent_app_type] => utility
[patent_app_number] => 14/338852
[patent_app_country] => US
[patent_app_date] => 2014-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 23
[patent_no_of_words] => 10844
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 14
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14338852
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/338852 | Verifying network attack detector effectiveness | Jul 22, 2014 | Issued |
Array
(
[id] => 10682610
[patent_doc_number] => 20160028755
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-28
[patent_title] => 'TRAFFIC SEGREGATION IN DDOS ATTACK ARCHITECTURE'
[patent_app_type] => utility
[patent_app_number] => 14/339255
[patent_app_country] => US
[patent_app_date] => 2014-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8806
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14339255
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/339255 | Traffic segregation in DDoS attack architecture | Jul 22, 2014 | Issued |
Array
(
[id] => 10934856
[patent_doc_number] => 20140337877
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-13
[patent_title] => 'IPTV Follow Me Content System and Method'
[patent_app_type] => utility
[patent_app_number] => 14/331145
[patent_app_country] => US
[patent_app_date] => 2014-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11498
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 12
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14331145
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/331145 | IPTV follow me content system and method | Jul 13, 2014 | Issued |
Array
(
[id] => 10146084
[patent_doc_number] => 09178906
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-11-03
[patent_title] => 'Detecting and remediating malware dropped by files'
[patent_app_type] => utility
[patent_app_number] => 14/329624
[patent_app_country] => US
[patent_app_date] => 2014-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4377
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14329624
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/329624 | Detecting and remediating malware dropped by files | Jul 10, 2014 | Issued |
Array
(
[id] => 9974230
[patent_doc_number] => 09021267
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-28
[patent_title] => 'System and method for using digital signatures to assign permissions'
[patent_app_type] => utility
[patent_app_number] => 14/325635
[patent_app_country] => US
[patent_app_date] => 2014-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 12
[patent_no_of_words] => 3136
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14325635
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/325635 | System and method for using digital signatures to assign permissions | Jul 7, 2014 | Issued |
Array
(
[id] => 11724519
[patent_doc_number] => 09697375
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-04
[patent_title] => 'Fast data protection using dual file systems'
[patent_app_type] => utility
[patent_app_number] => 14/401062
[patent_app_country] => US
[patent_app_date] => 2014-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 12
[patent_no_of_words] => 13048
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14401062
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/401062 | Fast data protection using dual file systems | Jun 26, 2014 | Issued |
Array
(
[id] => 11352764
[patent_doc_number] => 20160371504
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'DATA PROTECTION BASED ON USER AND GESTURE RECOGNITION'
[patent_app_type] => utility
[patent_app_number] => 14/403024
[patent_app_country] => US
[patent_app_date] => 2014-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 16569
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14403024
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/403024 | Data protection based on user and gesture recognition | Jun 26, 2014 | Issued |
Array
(
[id] => 10772980
[patent_doc_number] => 20160119135
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'SYSTEM AND METHOD FOR SECURING MULTIPLE DATA SEGMENTS HAVING DIFFERENT LENGTHS USING PATTERN KEYS HAVING MULTIPLE DIFFERENT STRENGTHS'
[patent_app_type] => utility
[patent_app_number] => 14/274090
[patent_app_country] => US
[patent_app_date] => 2014-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7985
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14274090
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/274090 | SYSTEM AND METHOD FOR SECURING MULTIPLE DATA SEGMENTS HAVING DIFFERENT LENGTHS USING PATTERN KEYS HAVING MULTIPLE DIFFERENT STRENGTHS | May 8, 2014 | Abandoned |
Array
(
[id] => 10425203
[patent_doc_number] => 20150310215
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-29
[patent_title] => 'DISCOVERY AND CLASSIFICATION OF ENTERPRISE ASSETS VIA HOST CHARACTERISTICS'
[patent_app_type] => utility
[patent_app_number] => 14/262349
[patent_app_country] => US
[patent_app_date] => 2014-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4938
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14262349
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/262349 | Discovery and classification of enterprise assets via host characteristics | Apr 24, 2014 | Issued |
Array
(
[id] => 10379077
[patent_doc_number] => 20150264084
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'SYSTEMS AND METHODS FOR PROTECTING ORGANIZATIONS AGAINST SPEAR PHISHING ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 14/262422
[patent_app_country] => US
[patent_app_date] => 2014-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10815
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14262422
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/262422 | Systems and methods for protecting organizations against spear phishing attacks | Apr 24, 2014 | Issued |
Array
(
[id] => 10922650
[patent_doc_number] => 20140325670
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-30
[patent_title] => 'SYSTEM AND METHOD FOR PROVIDING RISK SCORE BASED ON SENSITIVE INFORMATION INSIDE USER DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/262305
[patent_app_country] => US
[patent_app_date] => 2014-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4054
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14262305
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/262305 | SYSTEM AND METHOD FOR PROVIDING RISK SCORE BASED ON SENSITIVE INFORMATION INSIDE USER DEVICE | Apr 24, 2014 | Abandoned |
Array
(
[id] => 13684525
[patent_doc_number] => 20160380999
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-29
[patent_title] => User Identifier Based Device, Identity and Activity Management System
[patent_app_type] => utility
[patent_app_number] => 14/385645
[patent_app_country] => US
[patent_app_date] => 2014-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7544
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14385645
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/385645 | User Identifier Based Device, Identity and Activity Management System | Mar 16, 2014 | Abandoned |
Array
(
[id] => 9604843
[patent_doc_number] => 20140201525
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-17
[patent_title] => 'SYSTEM AND METHOD FOR MULTI-LAYERED SENSITIVE DATA PROTECTION IN A VIRTUAL COMPUTING ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/213881
[patent_app_country] => US
[patent_app_date] => 2014-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 12198
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14213881
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/213881 | System and method for multi-layered sensitive data protection in a virtual computing environment | Mar 13, 2014 | Issued |
Array
(
[id] => 9599474
[patent_doc_number] => 20140196155
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-10
[patent_title] => 'DIGITAL RIGHTS MANAGEMENT (DRM) LOCKER'
[patent_app_type] => utility
[patent_app_number] => 14/204924
[patent_app_country] => US
[patent_app_date] => 2014-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5621
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14204924
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/204924 | Digital rights management (DRM) locker | Mar 10, 2014 | Issued |
Array
(
[id] => 9841240
[patent_doc_number] => 20150033322
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-29
[patent_title] => 'LOGGING ATTACK CONTEXT DATA'
[patent_app_type] => utility
[patent_app_number] => 14/155008
[patent_app_country] => US
[patent_app_date] => 2014-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6352
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14155008
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/155008 | LOGGING ATTACK CONTEXT DATA | Jan 13, 2014 | Abandoned |
Array
(
[id] => 9903438
[patent_doc_number] => 20150058639
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-26
[patent_title] => 'ENCRYPTION PROCESSING DEVICE AND STORAGE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/108659
[patent_app_country] => US
[patent_app_date] => 2013-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2793
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14108659
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/108659 | ENCRYPTION PROCESSING DEVICE AND STORAGE DEVICE | Dec 16, 2013 | Abandoned |
Array
(
[id] => 11207196
[patent_doc_number] => 09436823
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-09-06
[patent_title] => 'System and method for detecting malicious code'
[patent_app_type] => utility
[patent_app_number] => 14/109005
[patent_app_country] => US
[patent_app_date] => 2013-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3310
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14109005
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/109005 | System and method for detecting malicious code | Dec 16, 2013 | Issued |
Array
(
[id] => 10287306
[patent_doc_number] => 20150172304
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-18
[patent_title] => 'SECURE BACKUP WITH ANTI-MALWARE SCAN'
[patent_app_type] => utility
[patent_app_number] => 14/108285
[patent_app_country] => US
[patent_app_date] => 2013-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4086
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14108285
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/108285 | SECURE BACKUP WITH ANTI-MALWARE SCAN | Dec 15, 2013 | Abandoned |
Array
(
[id] => 10132934
[patent_doc_number] => 09166785
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-20
[patent_title] => 'Cryptography processing device and cryptography processing method'
[patent_app_type] => utility
[patent_app_number] => 14/104409
[patent_app_country] => US
[patent_app_date] => 2013-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10775
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14104409
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/104409 | Cryptography processing device and cryptography processing method | Dec 11, 2013 | Issued |
Array
(
[id] => 11316588
[patent_doc_number] => 20160352698
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-01
[patent_title] => 'SECURITY CONTROL METHOD FOR EUICC AND EUICC'
[patent_app_type] => utility
[patent_app_number] => 15/101882
[patent_app_country] => US
[patent_app_date] => 2013-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7186
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15101882
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/101882 | SECURITY CONTROL METHOD FOR EUICC AND EUICC | Dec 4, 2013 | Abandoned |