Search

David P Sharvin

Examiner (ID: 2699, Phone: (571)272-9863 , Office: P/3692 )

Most Active Art Unit
3692
Art Unit(s)
3692
Total Applications
292
Issued Applications
84
Pending Applications
53
Abandoned Applications
155

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9507062 [patent_doc_number] => 08745390 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-06-03 [patent_title] => 'Mutual authentication and key exchange for inter-application communication' [patent_app_type] => utility [patent_app_number] => 14/079240 [patent_app_country] => US [patent_app_date] => 2013-11-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9439 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 292 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14079240 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/079240
Mutual authentication and key exchange for inter-application communication Nov 12, 2013 Issued
Array ( [id] => 9320931 [patent_doc_number] => 20140053269 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-02-20 [patent_title] => 'ATTACK RESISTANT CONTINUOUS NETWORK SERVICE TRUSTWORTHINESS CONTROLLER' [patent_app_type] => utility [patent_app_number] => 14/061914 [patent_app_country] => US [patent_app_date] => 2013-10-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 12599 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14061914 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/061914
ATTACK RESISTANT CONTINUOUS NETWORK SERVICE TRUSTWORTHINESS CONTROLLER Oct 23, 2013 Abandoned
Array ( [id] => 11340217 [patent_doc_number] => 20160365973 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-15 [patent_title] => 'Secure Distribution of Watermarked Content' [patent_app_type] => utility [patent_app_number] => 14/060867 [patent_app_country] => US [patent_app_date] => 2013-10-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 22354 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14060867 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/060867
Secure Distribution of Watermarked Content Oct 22, 2013 Abandoned
Array ( [id] => 11359404 [patent_doc_number] => 09536057 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-01-03 [patent_title] => 'Premises aware security' [patent_app_type] => utility [patent_app_number] => 14/126707 [patent_app_country] => US [patent_app_date] => 2013-10-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 7073 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14126707 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/126707
Premises aware security Oct 17, 2013 Issued
Array ( [id] => 9486840 [patent_doc_number] => 08732803 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-05-20 [patent_title] => 'Automated entity verification' [patent_app_type] => utility [patent_app_number] => 14/045127 [patent_app_country] => US [patent_app_date] => 2013-10-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 16506 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 176 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14045127 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/045127
Automated entity verification Oct 2, 2013 Issued
Array ( [id] => 11797555 [patent_doc_number] => 09407435 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-08-02 [patent_title] => 'Cryptographic key generation based on multiple biometrics' [patent_app_type] => utility [patent_app_number] => 14/126469 [patent_app_country] => US [patent_app_date] => 2013-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 13 [patent_no_of_words] => 7025 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 188 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14126469 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/126469
Cryptographic key generation based on multiple biometrics Sep 29, 2013 Issued
Array ( [id] => 10503518 [patent_doc_number] => 09231921 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-01-05 [patent_title] => 'System and architecture for secure computer devices' [patent_app_type] => utility [patent_app_number] => 13/971677 [patent_app_country] => US [patent_app_date] => 2013-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 4499 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971677 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/971677
System and architecture for secure computer devices Aug 19, 2013 Issued
Array ( [id] => 9966745 [patent_doc_number] => 09014370 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-04-21 [patent_title] => 'High performance hardware-based execution unit for performing C2 block cipher encryption/decryption' [patent_app_type] => utility [patent_app_number] => 13/971399 [patent_app_country] => US [patent_app_date] => 2013-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9408 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 177 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971399 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/971399
High performance hardware-based execution unit for performing C2 block cipher encryption/decryption Aug 19, 2013 Issued
Array ( [id] => 9961242 [patent_doc_number] => 09009465 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-04-14 [patent_title] => 'Augmenting name/prefix based routing protocols with trust anchor in information-centric networks' [patent_app_type] => utility [patent_app_number] => 13/970713 [patent_app_country] => US [patent_app_date] => 2013-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 8 [patent_no_of_words] => 5022 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 106 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13970713 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/970713
Augmenting name/prefix based routing protocols with trust anchor in information-centric networks Aug 19, 2013 Issued
Array ( [id] => 10124579 [patent_doc_number] => 09158939 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-13 [patent_title] => 'Security chip, program, information processing apparatus, and information processing system' [patent_app_type] => utility [patent_app_number] => 13/970692 [patent_app_country] => US [patent_app_date] => 2013-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 21 [patent_no_of_words] => 14853 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 125 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13970692 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/970692
Security chip, program, information processing apparatus, and information processing system Aug 19, 2013 Issued
Array ( [id] => 10152813 [patent_doc_number] => 09185120 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-10 [patent_title] => 'Method and system for mitigating interest flooding attacks in content-centric networks' [patent_app_type] => utility [patent_app_number] => 13/971321 [patent_app_country] => US [patent_app_date] => 2013-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6628 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 101 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971321 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/971321
Method and system for mitigating interest flooding attacks in content-centric networks Aug 19, 2013 Issued
Array ( [id] => 9903712 [patent_doc_number] => 20150058912 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-26 [patent_title] => 'METHOD AND APPARATUS FOR SECURING COMPUTER INTERFACES' [patent_app_type] => utility [patent_app_number] => 13/971582 [patent_app_country] => US [patent_app_date] => 2013-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5633 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971582 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/971582
Method and apparatus for securing computer interfaces Aug 19, 2013 Issued
Array ( [id] => 10105996 [patent_doc_number] => 09141778 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-09-22 [patent_title] => 'Controlling access to an accessible object with an online access control list' [patent_app_type] => utility [patent_app_number] => 13/970568 [patent_app_country] => US [patent_app_date] => 2013-08-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6771 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 98 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13970568 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/970568
Controlling access to an accessible object with an online access control list Aug 18, 2013 Issued
Array ( [id] => 9856803 [patent_doc_number] => 20150036820 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-05 [patent_title] => 'Probability Durable Entropic Advantage' [patent_app_type] => utility [patent_app_number] => 13/954741 [patent_app_country] => US [patent_app_date] => 2013-07-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 34027 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13954741 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/954741
Probability Durable Entropic Advantage Jul 29, 2013 Abandoned
Array ( [id] => 10074306 [patent_doc_number] => 09112679 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-08-18 [patent_title] => 'Storing a key in a remote security module' [patent_app_type] => utility [patent_app_number] => 13/948286 [patent_app_country] => US [patent_app_date] => 2013-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 9204 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 158 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13948286 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/948286
Storing a key in a remote security module Jul 22, 2013 Issued
Array ( [id] => 9150851 [patent_doc_number] => 20130305374 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-11-14 [patent_title] => 'CONTROLLING MALICIOUS ACTIVITY DETECTION USING BEHAVIORAL MODELS' [patent_app_type] => utility [patent_app_number] => 13/942099 [patent_app_country] => US [patent_app_date] => 2013-07-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 8341 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13942099 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/942099
Controlling malicious activity detection using behavioral models Jul 14, 2013 Issued
Array ( [id] => 10894242 [patent_doc_number] => 08917870 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-12-23 [patent_title] => 'Methods and devices for computing a shared encryption key' [patent_app_type] => utility [patent_app_number] => 13/936478 [patent_app_country] => US [patent_app_date] => 2013-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 11936 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 221 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13936478 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/936478
Methods and devices for computing a shared encryption key Jul 7, 2013 Issued
Array ( [id] => 10803711 [patent_doc_number] => 20160149869 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-05-26 [patent_title] => 'KEY ESTABLISHMENT FOR CONSTRAINED RESOURCE DEVICES' [patent_app_type] => utility [patent_app_number] => 14/902296 [patent_app_country] => US [patent_app_date] => 2013-07-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5909 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 16 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14902296 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/902296
Key establishment for constrained resource devices Jul 1, 2013 Issued
Array ( [id] => 9947857 [patent_doc_number] => 08997187 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-03-31 [patent_title] => 'Delegating authorization to applications on a client device in a networked environment' [patent_app_type] => utility [patent_app_number] => 13/840595 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6734 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 117 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13840595 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/840595
Delegating authorization to applications on a client device in a networked environment Mar 14, 2013 Issued
Array ( [id] => 9747113 [patent_doc_number] => 20140282832 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-09-18 [patent_title] => 'METHOD, APPARATUS, SYSTEM, AND COMPUTER READABLE MEDIUM FOR PROVIDING APPARATUS SECURITY' [patent_app_type] => utility [patent_app_number] => 13/840799 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10179 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13840799 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/840799
Method, apparatus, system, and computer readable medium for providing apparatus security Mar 14, 2013 Issued
Menu