David P Sharvin
Examiner (ID: 2699, Phone: (571)272-9863 , Office: P/3692 )
Most Active Art Unit | 3692 |
Art Unit(s) | 3692 |
Total Applications | 292 |
Issued Applications | 84 |
Pending Applications | 53 |
Abandoned Applications | 155 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 9507062
[patent_doc_number] => 08745390
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-06-03
[patent_title] => 'Mutual authentication and key exchange for inter-application communication'
[patent_app_type] => utility
[patent_app_number] => 14/079240
[patent_app_country] => US
[patent_app_date] => 2013-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9439
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 292
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14079240
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/079240 | Mutual authentication and key exchange for inter-application communication | Nov 12, 2013 | Issued |
Array
(
[id] => 9320931
[patent_doc_number] => 20140053269
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-20
[patent_title] => 'ATTACK RESISTANT CONTINUOUS NETWORK SERVICE TRUSTWORTHINESS CONTROLLER'
[patent_app_type] => utility
[patent_app_number] => 14/061914
[patent_app_country] => US
[patent_app_date] => 2013-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 12599
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14061914
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/061914 | ATTACK RESISTANT CONTINUOUS NETWORK SERVICE TRUSTWORTHINESS CONTROLLER | Oct 23, 2013 | Abandoned |
Array
(
[id] => 11340217
[patent_doc_number] => 20160365973
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'Secure Distribution of Watermarked Content'
[patent_app_type] => utility
[patent_app_number] => 14/060867
[patent_app_country] => US
[patent_app_date] => 2013-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 22354
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14060867
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/060867 | Secure Distribution of Watermarked Content | Oct 22, 2013 | Abandoned |
Array
(
[id] => 11359404
[patent_doc_number] => 09536057
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-03
[patent_title] => 'Premises aware security'
[patent_app_type] => utility
[patent_app_number] => 14/126707
[patent_app_country] => US
[patent_app_date] => 2013-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 7073
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14126707
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/126707 | Premises aware security | Oct 17, 2013 | Issued |
Array
(
[id] => 9486840
[patent_doc_number] => 08732803
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-05-20
[patent_title] => 'Automated entity verification'
[patent_app_type] => utility
[patent_app_number] => 14/045127
[patent_app_country] => US
[patent_app_date] => 2013-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 16506
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14045127
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/045127 | Automated entity verification | Oct 2, 2013 | Issued |
Array
(
[id] => 11797555
[patent_doc_number] => 09407435
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-02
[patent_title] => 'Cryptographic key generation based on multiple biometrics'
[patent_app_type] => utility
[patent_app_number] => 14/126469
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 7025
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14126469
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/126469 | Cryptographic key generation based on multiple biometrics | Sep 29, 2013 | Issued |
Array
(
[id] => 10503518
[patent_doc_number] => 09231921
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-05
[patent_title] => 'System and architecture for secure computer devices'
[patent_app_type] => utility
[patent_app_number] => 13/971677
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 4499
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971677
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/971677 | System and architecture for secure computer devices | Aug 19, 2013 | Issued |
Array
(
[id] => 9966745
[patent_doc_number] => 09014370
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-21
[patent_title] => 'High performance hardware-based execution unit for performing C2 block cipher encryption/decryption'
[patent_app_type] => utility
[patent_app_number] => 13/971399
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9408
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971399
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/971399 | High performance hardware-based execution unit for performing C2 block cipher encryption/decryption | Aug 19, 2013 | Issued |
Array
(
[id] => 9961242
[patent_doc_number] => 09009465
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-14
[patent_title] => 'Augmenting name/prefix based routing protocols with trust anchor in information-centric networks'
[patent_app_type] => utility
[patent_app_number] => 13/970713
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 5022
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13970713
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/970713 | Augmenting name/prefix based routing protocols with trust anchor in information-centric networks | Aug 19, 2013 | Issued |
Array
(
[id] => 10124579
[patent_doc_number] => 09158939
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-13
[patent_title] => 'Security chip, program, information processing apparatus, and information processing system'
[patent_app_type] => utility
[patent_app_number] => 13/970692
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 14853
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13970692
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/970692 | Security chip, program, information processing apparatus, and information processing system | Aug 19, 2013 | Issued |
Array
(
[id] => 10152813
[patent_doc_number] => 09185120
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-10
[patent_title] => 'Method and system for mitigating interest flooding attacks in content-centric networks'
[patent_app_type] => utility
[patent_app_number] => 13/971321
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6628
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971321
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/971321 | Method and system for mitigating interest flooding attacks in content-centric networks | Aug 19, 2013 | Issued |
Array
(
[id] => 9903712
[patent_doc_number] => 20150058912
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-26
[patent_title] => 'METHOD AND APPARATUS FOR SECURING COMPUTER INTERFACES'
[patent_app_type] => utility
[patent_app_number] => 13/971582
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5633
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971582
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/971582 | Method and apparatus for securing computer interfaces | Aug 19, 2013 | Issued |
Array
(
[id] => 10105996
[patent_doc_number] => 09141778
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-22
[patent_title] => 'Controlling access to an accessible object with an online access control list'
[patent_app_type] => utility
[patent_app_number] => 13/970568
[patent_app_country] => US
[patent_app_date] => 2013-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6771
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13970568
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/970568 | Controlling access to an accessible object with an online access control list | Aug 18, 2013 | Issued |
Array
(
[id] => 9856803
[patent_doc_number] => 20150036820
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-05
[patent_title] => 'Probability Durable Entropic Advantage'
[patent_app_type] => utility
[patent_app_number] => 13/954741
[patent_app_country] => US
[patent_app_date] => 2013-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 34027
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13954741
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/954741 | Probability Durable Entropic Advantage | Jul 29, 2013 | Abandoned |
Array
(
[id] => 10074306
[patent_doc_number] => 09112679
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-18
[patent_title] => 'Storing a key in a remote security module'
[patent_app_type] => utility
[patent_app_number] => 13/948286
[patent_app_country] => US
[patent_app_date] => 2013-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9204
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13948286
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/948286 | Storing a key in a remote security module | Jul 22, 2013 | Issued |
Array
(
[id] => 9150851
[patent_doc_number] => 20130305374
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-14
[patent_title] => 'CONTROLLING MALICIOUS ACTIVITY DETECTION USING BEHAVIORAL MODELS'
[patent_app_type] => utility
[patent_app_number] => 13/942099
[patent_app_country] => US
[patent_app_date] => 2013-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 8341
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13942099
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/942099 | Controlling malicious activity detection using behavioral models | Jul 14, 2013 | Issued |
Array
(
[id] => 10894242
[patent_doc_number] => 08917870
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-23
[patent_title] => 'Methods and devices for computing a shared encryption key'
[patent_app_type] => utility
[patent_app_number] => 13/936478
[patent_app_country] => US
[patent_app_date] => 2013-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11936
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13936478
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/936478 | Methods and devices for computing a shared encryption key | Jul 7, 2013 | Issued |
Array
(
[id] => 10803711
[patent_doc_number] => 20160149869
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'KEY ESTABLISHMENT FOR CONSTRAINED RESOURCE DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/902296
[patent_app_country] => US
[patent_app_date] => 2013-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5909
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 16
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14902296
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/902296 | Key establishment for constrained resource devices | Jul 1, 2013 | Issued |
Array
(
[id] => 9947857
[patent_doc_number] => 08997187
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-03-31
[patent_title] => 'Delegating authorization to applications on a client device in a networked environment'
[patent_app_type] => utility
[patent_app_number] => 13/840595
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6734
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13840595
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/840595 | Delegating authorization to applications on a client device in a networked environment | Mar 14, 2013 | Issued |
Array
(
[id] => 9747113
[patent_doc_number] => 20140282832
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'METHOD, APPARATUS, SYSTEM, AND COMPUTER READABLE MEDIUM FOR PROVIDING APPARATUS SECURITY'
[patent_app_type] => utility
[patent_app_number] => 13/840799
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10179
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13840799
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/840799 | Method, apparatus, system, and computer readable medium for providing apparatus security | Mar 14, 2013 | Issued |