David P Sharvin
Examiner (ID: 2699, Phone: (571)272-9863 , Office: P/3692 )
Most Active Art Unit | 3692 |
Art Unit(s) | 3692 |
Total Applications | 292 |
Issued Applications | 84 |
Pending Applications | 53 |
Abandoned Applications | 155 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 9416845
[patent_doc_number] => 08700898
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-04-15
[patent_title] => 'System and method for multi-layered sensitive data protection in a virtual computing environment'
[patent_app_type] => utility
[patent_app_number] => 13/633454
[patent_app_country] => US
[patent_app_date] => 2012-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10610
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13633454
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/633454 | System and method for multi-layered sensitive data protection in a virtual computing environment | Oct 1, 2012 | Issued |
Array
(
[id] => 8746953
[patent_doc_number] => 20130086670
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-04
[patent_title] => 'PROVIDING THIRD PARTY AUTHENTICATION IN AN ON-DEMAND SERVICE ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 13/633521
[patent_app_country] => US
[patent_app_date] => 2012-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10463
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13633521
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/633521 | Providing third party authentication in an on-demand service environment | Oct 1, 2012 | Issued |
Array
(
[id] => 9083223
[patent_doc_number] => 20130268753
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-10
[patent_title] => 'ANTI-TAMPER DEVICE, SYSTEM, METHOD, AND COMPUTER-READABLE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 13/633289
[patent_app_country] => US
[patent_app_date] => 2012-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8931
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13633289
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/633289 | Anti-tamper device, system, method, and computer-readable medium | Oct 1, 2012 | Issued |
Array
(
[id] => 8930004
[patent_doc_number] => 20130185764
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-18
[patent_title] => 'FILE SYSTEM ACCESS FOR ONE OR MORE SANDBOXED APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 13/631715
[patent_app_country] => US
[patent_app_date] => 2012-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4499
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13631715
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/631715 | File system access for one or more sandboxed applications | Sep 27, 2012 | Issued |
Array
(
[id] => 10867539
[patent_doc_number] => 08893269
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-18
[patent_title] => 'Import authorities for backup system'
[patent_app_type] => utility
[patent_app_number] => 13/631678
[patent_app_country] => US
[patent_app_date] => 2012-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 4805
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13631678
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/631678 | Import authorities for backup system | Sep 27, 2012 | Issued |
Array
(
[id] => 9395672
[patent_doc_number] => 20140093078
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-03
[patent_title] => 'DYNAMIC LOSS PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 13/630441
[patent_app_country] => US
[patent_app_date] => 2012-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4453
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13630441
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/630441 | DYNAMIC LOSS PROTECTION | Sep 27, 2012 | Abandoned |
Array
(
[id] => 9257798
[patent_doc_number] => 08621239
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-12-31
[patent_title] => 'Method for strengthening the implementation of ECDSA against power analysis'
[patent_app_type] => utility
[patent_app_number] => 13/619557
[patent_app_country] => US
[patent_app_date] => 2012-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3552
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13619557
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/619557 | Method for strengthening the implementation of ECDSA against power analysis | Sep 13, 2012 | Issued |
Array
(
[id] => 10885528
[patent_doc_number] => 08909932
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-09
[patent_title] => 'Method and apparatus for security over multiple interfaces'
[patent_app_type] => utility
[patent_app_number] => 13/620375
[patent_app_country] => US
[patent_app_date] => 2012-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5282
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13620375
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/620375 | Method and apparatus for security over multiple interfaces | Sep 13, 2012 | Issued |
Array
(
[id] => 9352128
[patent_doc_number] => 08671030
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-03-11
[patent_title] => 'Electronic vouchers and a system and method for issuing the same'
[patent_app_type] => utility
[patent_app_number] => 13/595337
[patent_app_country] => US
[patent_app_date] => 2012-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 3031
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13595337
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/595337 | Electronic vouchers and a system and method for issuing the same | Aug 26, 2012 | Issued |
Array
(
[id] => 9578831
[patent_doc_number] => 08769267
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-01
[patent_title] => 'Geothentication based on new network packet structure'
[patent_app_type] => utility
[patent_app_number] => 13/586705
[patent_app_country] => US
[patent_app_date] => 2012-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 18
[patent_no_of_words] => 15985
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 24
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13586705
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/586705 | Geothentication based on new network packet structure | Aug 14, 2012 | Issued |
Array
(
[id] => 9308890
[patent_doc_number] => 20140047564
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-13
[patent_title] => 'MANAGING CONTACT RECORDS IN A DEVICE WITH MULTIPLE OPERATION PERIMETERS'
[patent_app_type] => utility
[patent_app_number] => 13/635110
[patent_app_country] => US
[patent_app_date] => 2012-08-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4137
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13635110
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/635110 | MANAGING CONTACT RECORDS IN A DEVICE WITH MULTIPLE OPERATION PERIMETERS | Aug 9, 2012 | Abandoned |
Array
(
[id] => 9297411
[patent_doc_number] => 20140041045
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-06
[patent_title] => 'DIGITAL RIGHTS MANAGEMENT (DRM) LOCKER'
[patent_app_type] => utility
[patent_app_number] => 13/566223
[patent_app_country] => US
[patent_app_date] => 2012-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5561
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13566223
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/566223 | Digital rights management (DRM) locker | Aug 2, 2012 | Issued |
Array
(
[id] => 9980779
[patent_doc_number] => 09027111
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-05-05
[patent_title] => 'Relay node authentication method, apparatus, and system'
[patent_app_type] => utility
[patent_app_number] => 13/564173
[patent_app_country] => US
[patent_app_date] => 2012-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 16
[patent_no_of_words] => 11376
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13564173
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/564173 | Relay node authentication method, apparatus, and system | Jul 31, 2012 | Issued |
Array
(
[id] => 9297410
[patent_doc_number] => 20140041044
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-06
[patent_title] => 'CONTROLLING ACCESS TO A SHARED FILE'
[patent_app_type] => utility
[patent_app_number] => 13/564560
[patent_app_country] => US
[patent_app_date] => 2012-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5775
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13564560
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/564560 | Controlling access to a shared file | Jul 31, 2012 | Issued |
Array
(
[id] => 8491730
[patent_doc_number] => 20120291137
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-15
[patent_title] => 'SYSTEM AND METHOD FOR SOCIAL NETWORK TRUST ASSESSMENT'
[patent_app_type] => utility
[patent_app_number] => 13/561361
[patent_app_country] => US
[patent_app_date] => 2012-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 15235
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13561361
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/561361 | System and method for social network trust assessment | Jul 29, 2012 | Issued |
Array
(
[id] => 8491444
[patent_doc_number] => 20120290851
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-15
[patent_title] => 'METHOD AND COMPUTER PROGRAM FOR SECURELY STORING DATA'
[patent_app_type] => utility
[patent_app_number] => 13/557690
[patent_app_country] => US
[patent_app_date] => 2012-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2990
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13557690
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/557690 | Method and computer program for securely storing data | Jul 24, 2012 | Issued |
Array
(
[id] => 8479488
[patent_doc_number] => 20120278895
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-01
[patent_title] => 'METHODS AND APPARATUS FOR DEALING WITH MALWARE'
[patent_app_type] => utility
[patent_app_number] => 13/543866
[patent_app_country] => US
[patent_app_date] => 2012-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 12297
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13543866
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/543866 | Methods and apparatus for dealing with malware | Jul 7, 2012 | Issued |
Array
(
[id] => 9680793
[patent_doc_number] => 08819720
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-08-26
[patent_title] => 'IPTV follow me content system and method'
[patent_app_type] => utility
[patent_app_number] => 13/539712
[patent_app_country] => US
[patent_app_date] => 2012-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 11544
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13539712
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/539712 | IPTV follow me content system and method | Jul 1, 2012 | Issued |
Array
(
[id] => 10564549
[patent_doc_number] => 09288233
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-15
[patent_title] => 'Communication control apparatus, communication control method, and program'
[patent_app_type] => utility
[patent_app_number] => 14/126744
[patent_app_country] => US
[patent_app_date] => 2012-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 5151
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14126744
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/126744 | Communication control apparatus, communication control method, and program | Jun 14, 2012 | Issued |
Array
(
[id] => 9505755
[patent_doc_number] => 08744078
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-06-03
[patent_title] => 'System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths'
[patent_app_type] => utility
[patent_app_number] => 13/489388
[patent_app_country] => US
[patent_app_date] => 2012-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6915
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13489388
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/489388 | System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths | Jun 4, 2012 | Issued |