David P Sharvin
Examiner (ID: 2699, Phone: (571)272-9863 , Office: P/3692 )
Most Active Art Unit | 3692 |
Art Unit(s) | 3692 |
Total Applications | 292 |
Issued Applications | 84 |
Pending Applications | 53 |
Abandoned Applications | 155 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 11899197
[patent_doc_number] => 09769145
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-19
[patent_title] => 'Method and apparatus for connecting to online service'
[patent_app_type] => utility
[patent_app_number] => 13/226958
[patent_app_country] => US
[patent_app_date] => 2011-09-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 3858
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 12
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13226958
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/226958 | Method and apparatus for connecting to online service | Sep 6, 2011 | Issued |
Array
(
[id] => 8985433
[patent_doc_number] => 08516563
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-20
[patent_title] => 'Methods for authenticating a user without personal information and devices thereof'
[patent_app_type] => utility
[patent_app_number] => 13/218515
[patent_app_country] => US
[patent_app_date] => 2011-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3429
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13218515
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/218515 | Methods for authenticating a user without personal information and devices thereof | Aug 25, 2011 | Issued |
Array
(
[id] => 9540489
[patent_doc_number] => 20140165137
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-12
[patent_title] => 'Data Leak Prevention Systems and Methods'
[patent_app_type] => utility
[patent_app_number] => 14/126700
[patent_app_country] => US
[patent_app_date] => 2011-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8347
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14126700
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/126700 | Data leak prevention systems and methods | Aug 25, 2011 | Issued |
Array
(
[id] => 8536098
[patent_doc_number] => 08312261
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-11-13
[patent_title] => 'Method and system for verification of an endpoint security scan'
[patent_app_type] => utility
[patent_app_number] => 13/208970
[patent_app_country] => US
[patent_app_date] => 2011-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 14
[patent_no_of_words] => 14031
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13208970
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/208970 | Method and system for verification of an endpoint security scan | Aug 11, 2011 | Issued |
Array
(
[id] => 8824204
[patent_doc_number] => 20130125250
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-16
[patent_title] => 'ANTI-TAMPER DEVICE FOR INTEGRATED CIRCUITS'
[patent_app_type] => utility
[patent_app_number] => 13/519654
[patent_app_country] => US
[patent_app_date] => 2011-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 2957
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13519654
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/519654 | Anti-tamper device for integrated circuits | Jul 14, 2011 | Issued |
Array
(
[id] => 9479760
[patent_doc_number] => 20140137223
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-15
[patent_title] => 'METHOD AND APPARATUS FOR AUTHENTICATING USERS OF A HYBRID TERMINAL'
[patent_app_type] => utility
[patent_app_number] => 14/126518
[patent_app_country] => US
[patent_app_date] => 2011-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6703
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14126518
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/126518 | METHOD AND APPARATUS FOR AUTHENTICATING USERS OF A HYBRID TERMINAL | Jun 15, 2011 | Abandoned |
Array
(
[id] => 8687075
[patent_doc_number] => 20130055359
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-02-28
[patent_title] => 'SECRET INFORMATION LEAKAGE PREVENTION SYSTEM, SECRET INFORMATION LEAKAGE PREVENTION METHOD AND SECRET INFORMATION LEAKAGE PREVENTION PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/695543
[patent_app_country] => US
[patent_app_date] => 2011-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11796
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13695543
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/695543 | Secret information leakage prevention system, secret information leakage prevention method and secret information leakage prevention program | May 31, 2011 | Issued |
Array
(
[id] => 8504879
[patent_doc_number] => 20120304287
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-29
[patent_title] => 'AUTOMATIC DETECTION OF SEARCH RESULTS POISONING ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 13/116012
[patent_app_country] => US
[patent_app_date] => 2011-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4495
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13116012
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/116012 | Automatic detection of search results poisoning attacks | May 25, 2011 | Issued |
Array
(
[id] => 9377711
[patent_doc_number] => 08681986
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-25
[patent_title] => 'Single-round password-based key exchange protocols'
[patent_app_type] => utility
[patent_app_number] => 13/115720
[patent_app_country] => US
[patent_app_date] => 2011-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 4829
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13115720
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/115720 | Single-round password-based key exchange protocols | May 24, 2011 | Issued |
Array
(
[id] => 9886302
[patent_doc_number] => 08973088
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-03-03
[patent_title] => 'Policy enforcement using host information profile'
[patent_app_type] => utility
[patent_app_number] => 13/115022
[patent_app_country] => US
[patent_app_date] => 2011-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 13
[patent_no_of_words] => 9309
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 309
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13115022
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/115022 | Policy enforcement using host information profile | May 23, 2011 | Issued |
Array
(
[id] => 9170146
[patent_doc_number] => 08595840
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-11-26
[patent_title] => 'Detection of computer network data streams from a malware and its variants'
[patent_app_type] => utility
[patent_app_number] => 13/114881
[patent_app_country] => US
[patent_app_date] => 2011-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 2674
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13114881
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/114881 | Detection of computer network data streams from a malware and its variants | May 23, 2011 | Issued |
Array
(
[id] => 8230252
[patent_doc_number] => 20120144451
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-07
[patent_title] => 'GEOLOCATING NETWORK NODES IN ATTENUATED ENVIRONMENTS FOR CYBER AND NETWORK SECURITY APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 13/114013
[patent_app_country] => US
[patent_app_date] => 2011-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8281
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13114013
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/114013 | Geolocating network nodes in attenuated environments for cyber and network security applications | May 22, 2011 | Issued |
Array
(
[id] => 8959305
[patent_doc_number] => 08505099
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-06
[patent_title] => 'Machine-implemented method and system for determining whether a to-be-analyzed software is a known malware or a variant of the known malware'
[patent_app_type] => utility
[patent_app_number] => 13/112249
[patent_app_country] => US
[patent_app_date] => 2011-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4453
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13112249
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/112249 | Machine-implemented method and system for determining whether a to-be-analyzed software is a known malware or a variant of the known malware | May 19, 2011 | Issued |
Array
(
[id] => 8722643
[patent_doc_number] => 20130073860
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-21
[patent_title] => 'ATTRIBUTE-BASED DIGITAL SIGNATURE SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/698888
[patent_app_country] => US
[patent_app_date] => 2011-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8199
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13698888
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/698888 | Attribute-based digital signature system | Apr 26, 2011 | Issued |
Array
(
[id] => 9967864
[patent_doc_number] => 09015498
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-21
[patent_title] => 'Information processing apparatus and control method thereof'
[patent_app_type] => utility
[patent_app_number] => 13/695771
[patent_app_country] => US
[patent_app_date] => 2011-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 17
[patent_no_of_words] => 8184
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13695771
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/695771 | Information processing apparatus and control method thereof | Apr 26, 2011 | Issued |
Array
(
[id] => 8912653
[patent_doc_number] => 08484730
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-07-09
[patent_title] => 'Systems and methods for reporting online behavior'
[patent_app_type] => utility
[patent_app_number] => 13/045056
[patent_app_country] => US
[patent_app_date] => 2011-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11388
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13045056
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/045056 | Systems and methods for reporting online behavior | Mar 9, 2011 | Issued |
Array
(
[id] => 8395822
[patent_doc_number] => 20120233662
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-09-13
[patent_title] => 'ENHANCING COMMUNICATION'
[patent_app_type] => utility
[patent_app_number] => 13/044842
[patent_app_country] => US
[patent_app_date] => 2011-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8186
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13044842
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/044842 | Enhancing communication | Mar 9, 2011 | Issued |
Array
(
[id] => 7512989
[patent_doc_number] => 20110258699
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-10-20
[patent_title] => 'METHOD AND APPARATUS FOR THE PREVENTION OF A SERVICE DEGRADATION ATTACK'
[patent_app_type] => utility
[patent_app_number] => 13/044089
[patent_app_country] => US
[patent_app_date] => 2011-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4880
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0258/20110258699.pdf
[firstpage_image] =>[orig_patent_app_number] => 13044089
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/044089 | Method and apparatus for the prevention of a service degradation attack | Mar 8, 2011 | Issued |
Array
(
[id] => 9276263
[patent_doc_number] => 08640214
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-01-28
[patent_title] => 'Key distribution for unconnected one-time password tokens'
[patent_app_type] => utility
[patent_app_number] => 13/042420
[patent_app_country] => US
[patent_app_date] => 2011-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 17
[patent_no_of_words] => 6768
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13042420
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/042420 | Key distribution for unconnected one-time password tokens | Mar 6, 2011 | Issued |
Array
(
[id] => 6057063
[patent_doc_number] => 20110113098
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-12
[patent_title] => 'SYSTEM AND METHOD FOR SOCIAL NETWORK TRUST ASSESSMENT'
[patent_app_type] => utility
[patent_app_number] => 13/008535
[patent_app_country] => US
[patent_app_date] => 2011-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 15204
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0113/20110113098.pdf
[firstpage_image] =>[orig_patent_app_number] => 13008535
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/008535 | System and method for social network trust assessment | Jan 17, 2011 | Issued |