
Dennis Haszko
Examiner (ID: 3114)
| Most Active Art Unit | 2102 |
| Art Unit(s) | 2102 |
| Total Applications | 235 |
| Issued Applications | 204 |
| Pending Applications | 0 |
| Abandoned Applications | 31 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9096787
[patent_doc_number] => 20130276098
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-17
[patent_title] => 'Method and Computer Device for Handling COM Objects'
[patent_app_type] => utility
[patent_app_number] => 13/847406
[patent_app_country] => US
[patent_app_date] => 2013-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4199
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13847406
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/847406 | Method and computer device for handling COM objects having elevated privileges | Mar 18, 2013 | Issued |
Array
(
[id] => 12532755
[patent_doc_number] => 10007773
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-26
[patent_title] => Method for generating public identity for authenticating an individual carrying an identification object
[patent_app_type] => utility
[patent_app_number] => 14/382920
[patent_app_country] => US
[patent_app_date] => 2013-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 4287
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14382920
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/382920 | Method for generating public identity for authenticating an individual carrying an identification object | Mar 17, 2013 | Issued |
Array
(
[id] => 8965535
[patent_doc_number] => 20130205137
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-08
[patent_title] => 'ZERO-KNOWLEDGE BASED AUTHENTICATION METHOD, SYSTEM, AND APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 13/802508
[patent_app_country] => US
[patent_app_date] => 2013-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3631
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13802508
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/802508 | Zero-knowledge based authentication method, system, and apparatus | Mar 12, 2013 | Issued |
Array
(
[id] => 11812128
[patent_doc_number] => 09716707
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-25
[patent_title] => 'Mutual authentication with anonymity'
[patent_app_type] => utility
[patent_app_number] => 14/384432
[patent_app_country] => US
[patent_app_date] => 2013-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 8171
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 314
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14384432
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/384432 | Mutual authentication with anonymity | Mar 11, 2013 | Issued |
Array
(
[id] => 8886965
[patent_doc_number] => 20130160148
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-20
[patent_title] => 'SYSTEMS, METHODS, AND PROGRAM APPLICATIONS FOR SELECTIVELY RESTRICTING THE PLACESHIFTING OF COPY PROTECTED DIGITAL MEDIA CONTENT'
[patent_app_type] => utility
[patent_app_number] => 13/768465
[patent_app_country] => US
[patent_app_date] => 2013-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7138
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13768465
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/768465 | Systems, methods, and program applications for selectively restricting the placeshifting of copy protected digital media content | Feb 14, 2013 | Issued |
Array
(
[id] => 9858101
[patent_doc_number] => 20150038118
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-05
[patent_title] => 'METHOD FOR VERIFYING THE IDENTITY OF A USER OF A COMMUNICATING TERMINAL AND ASSOCIATED SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/380535
[patent_app_country] => US
[patent_app_date] => 2013-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3004
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14380535
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/380535 | Method for verifying the identity of a user of a communicating terminal and associated system | Jan 30, 2013 | Issued |
Array
(
[id] => 15824915
[patent_doc_number] => 10637663
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-28
[patent_title] => Signature verification system, signature-device, verification device, and signature verification method
[patent_app_type] => utility
[patent_app_number] => 14/371110
[patent_app_country] => US
[patent_app_date] => 2013-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5472
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 302
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14371110
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/371110 | Signature verification system, signature-device, verification device, and signature verification method | Jan 17, 2013 | Issued |
Array
(
[id] => 8886921
[patent_doc_number] => 20130160105
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-20
[patent_title] => 'CONFIGURING IDENTITY FEDERATION CONFIGURATION'
[patent_app_type] => utility
[patent_app_number] => 13/719305
[patent_app_country] => US
[patent_app_date] => 2012-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9989
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13719305
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/719305 | Configuring identity federation configuration | Dec 18, 2012 | Issued |
Array
(
[id] => 9549100
[patent_doc_number] => 20140173748
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-19
[patent_title] => 'SOCIAL NETWORKING WITH DEPTH AND SECURITY FACTORS'
[patent_app_type] => utility
[patent_app_number] => 13/717953
[patent_app_country] => US
[patent_app_date] => 2012-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7207
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13717953
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/717953 | Social networking with depth and security factors | Dec 17, 2012 | Issued |
Array
(
[id] => 12358086
[patent_doc_number] => 09954883
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-24
[patent_title] => Automated asset criticality assessment
[patent_app_type] => utility
[patent_app_number] => 13/718970
[patent_app_country] => US
[patent_app_date] => 2012-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 13504
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13718970
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/718970 | Automated asset criticality assessment | Dec 17, 2012 | Issued |
Array
(
[id] => 9289705
[patent_doc_number] => 08646063
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-04
[patent_title] => 'Methods, apparatus, and computer program products for subscriber authentication and temporary code generation'
[patent_app_type] => utility
[patent_app_number] => 13/716868
[patent_app_country] => US
[patent_app_date] => 2012-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9455
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 398
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13716868
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/716868 | Methods, apparatus, and computer program products for subscriber authentication and temporary code generation | Dec 16, 2012 | Issued |
Array
(
[id] => 11659341
[patent_doc_number] => 09672344
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-06
[patent_title] => 'Computing apparatus and method for operating application using retrieved login information'
[patent_app_type] => utility
[patent_app_number] => 13/716642
[patent_app_country] => US
[patent_app_date] => 2012-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5689
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13716642
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/716642 | Computing apparatus and method for operating application using retrieved login information | Dec 16, 2012 | Issued |
Array
(
[id] => 10603371
[patent_doc_number] => 09323939
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-26
[patent_title] => 'Multi-tenancy governance in a cloud computing environment'
[patent_app_type] => utility
[patent_app_number] => 13/717381
[patent_app_country] => US
[patent_app_date] => 2012-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5740
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 333
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13717381
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/717381 | Multi-tenancy governance in a cloud computing environment | Dec 16, 2012 | Issued |
Array
(
[id] => 9549111
[patent_doc_number] => 20140173759
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-19
[patent_title] => 'RIGHTS-MANAGED CODE'
[patent_app_type] => utility
[patent_app_number] => 13/716887
[patent_app_country] => US
[patent_app_date] => 2012-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9451
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13716887
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/716887 | RIGHTS-MANAGED CODE | Dec 16, 2012 | Abandoned |
Array
(
[id] => 8918329
[patent_doc_number] => 20130179954
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-11
[patent_title] => 'Computer Implemented System and Method for Providing Users with Secured Access to Application Servers'
[patent_app_type] => utility
[patent_app_number] => 13/716114
[patent_app_country] => US
[patent_app_date] => 2012-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11563
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13716114
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/716114 | Secure access to application servers using out-of-band communication | Dec 14, 2012 | Issued |
Array
(
[id] => 9261613
[patent_doc_number] => 20130343542
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-26
[patent_title] => 'METHODS AND DEVICES FOR ESTABLISHING TRUST ON FIRST USE FOR CLOSE PROXIMITY COMMUNICATIONS'
[patent_app_type] => utility
[patent_app_number] => 13/715610
[patent_app_country] => US
[patent_app_date] => 2012-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8731
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13715610
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/715610 | METHODS AND DEVICES FOR ESTABLISHING TRUST ON FIRST USE FOR CLOSE PROXIMITY COMMUNICATIONS | Dec 13, 2012 | Abandoned |
Array
(
[id] => 8852078
[patent_doc_number] => 20130141753
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-06
[patent_title] => 'INFORMATION PROCESSING APPARATUS HAVING WIRELESS COMMUNICATION FUNCTION AND METHOD OF CONTROLLING THE APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 13/691140
[patent_app_country] => US
[patent_app_date] => 2012-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7947
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13691140
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/691140 | Information processing apparatus having wireless communication function and method of controlling the apparatus | Nov 29, 2012 | Issued |
Array
(
[id] => 12201710
[patent_doc_number] => 09904777
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-27
[patent_title] => 'System for automated login initialization on detection of identification device'
[patent_app_type] => utility
[patent_app_number] => 13/616483
[patent_app_country] => US
[patent_app_date] => 2012-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 7112
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13616483
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/616483 | System for automated login initialization on detection of identification device | Sep 13, 2012 | Issued |
Array
(
[id] => 8962416
[patent_doc_number] => 20130202018
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-08
[patent_title] => 'POWER LINE COMMUNCATION METHOD AND POWER LINE COMMUNICATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/620266
[patent_app_country] => US
[patent_app_date] => 2012-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3728
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13620266
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/620266 | POWER LINE COMMUNCATION METHOD AND POWER LINE COMMUNICATION SYSTEM | Sep 13, 2012 | Abandoned |
Array
(
[id] => 9879330
[patent_doc_number] => 08966627
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-24
[patent_title] => 'Method and apparatus for defending distributed denial-of-service (DDoS) attack through abnormally terminated session'
[patent_app_type] => utility
[patent_app_number] => 13/612749
[patent_app_country] => US
[patent_app_date] => 2012-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 6378
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13612749
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/612749 | Method and apparatus for defending distributed denial-of-service (DDoS) attack through abnormally terminated session | Sep 11, 2012 | Issued |