Eric Frank Winakur
Examiner (ID: 5668, Phone: (571)272-4736 , Office: P/3777 )
Most Active Art Unit | 3736 |
Art Unit(s) | 3791, 2899, 3768, 3311, 3736, 3735, 3777 |
Total Applications | 2379 |
Issued Applications | 1756 |
Pending Applications | 294 |
Abandoned Applications | 329 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 16646394
[patent_doc_number] => 10924268
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-16
[patent_title] => Key distribution method, and related device and system
[patent_app_type] => utility
[patent_app_number] => 16/382201
[patent_app_country] => US
[patent_app_date] => 2019-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 19108
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 371
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16382201
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/382201 | Key distribution method, and related device and system | Apr 11, 2019 | Issued |
Array
(
[id] => 16387736
[patent_doc_number] => 10812592
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-20
[patent_title] => Method and apparatus for utilizing NFC to establish a secure connection
[patent_app_type] => utility
[patent_app_number] => 16/381727
[patent_app_country] => US
[patent_app_date] => 2019-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3915
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16381727
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/381727 | Method and apparatus for utilizing NFC to establish a secure connection | Apr 10, 2019 | Issued |
Array
(
[id] => 16378390
[patent_doc_number] => 20200327232
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-15
[patent_title] => SPLIT CHAIN OF TRUST FOR SECURE DEVICE BOOT
[patent_app_type] => utility
[patent_app_number] => 16/379532
[patent_app_country] => US
[patent_app_date] => 2019-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9159
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16379532
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/379532 | Split chain of trust for secure device boot | Apr 8, 2019 | Issued |
Array
(
[id] => 17093876
[patent_doc_number] => 11122079
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-09-14
[patent_title] => Obfuscation for high-performance computing systems
[patent_app_type] => utility
[patent_app_number] => 16/377971
[patent_app_country] => US
[patent_app_date] => 2019-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 17804
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 293
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16377971
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/377971 | Obfuscation for high-performance computing systems | Apr 7, 2019 | Issued |
Array
(
[id] => 17528889
[patent_doc_number] => 11301578
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-12
[patent_title] => Protecting data based on a sensitivity level for the data
[patent_app_type] => utility
[patent_app_number] => 16/376960
[patent_app_country] => US
[patent_app_date] => 2019-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 12535
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16376960
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/376960 | Protecting data based on a sensitivity level for the data | Apr 4, 2019 | Issued |
Array
(
[id] => 14678813
[patent_doc_number] => 20190238521
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-01
[patent_title] => CRYPTOGRAPHY USING MULTI-FACTOR KEY SYSTEM AND FINITE STATE MACHINE
[patent_app_type] => utility
[patent_app_number] => 16/374260
[patent_app_country] => US
[patent_app_date] => 2019-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9364
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16374260
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/374260 | Cryptography using multi-factor key system and finite state machine | Apr 2, 2019 | Issued |
Array
(
[id] => 15957443
[patent_doc_number] => 10666646
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-26
[patent_title] => System and method for protecting specified data combinations
[patent_app_type] => utility
[patent_app_number] => 16/365812
[patent_app_country] => US
[patent_app_date] => 2019-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 16309
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16365812
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/365812 | System and method for protecting specified data combinations | Mar 26, 2019 | Issued |
Array
(
[id] => 16349201
[patent_doc_number] => 20200313852
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-01
[patent_title] => CONSENT-BASED DATA MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 16/364789
[patent_app_country] => US
[patent_app_date] => 2019-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14184
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16364789
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/364789 | Consent-based data management | Mar 25, 2019 | Issued |
Array
(
[id] => 16346635
[patent_doc_number] => 20200311286
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-01
[patent_title] => EMPLOYING A PROTECTED KEY IN PERFORMING OPERATIONS
[patent_app_type] => utility
[patent_app_number] => 16/364271
[patent_app_country] => US
[patent_app_date] => 2019-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8377
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16364271
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/364271 | Employing a protected key in performing operations | Mar 25, 2019 | Issued |
Array
(
[id] => 14935855
[patent_doc_number] => 20190303566
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-03
[patent_title] => ATTACK DETECTOR, CONTROLLER, AND ATTACK DETECTION METHOD
[patent_app_type] => utility
[patent_app_number] => 16/365660
[patent_app_country] => US
[patent_app_date] => 2019-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21854
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16365660
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/365660 | ATTACK DETECTOR, CONTROLLER, AND ATTACK DETECTION METHOD | Mar 25, 2019 | Abandoned |
Array
(
[id] => 15075815
[patent_doc_number] => 10467398
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-11-05
[patent_title] => Authentication by transmitting information through a human body
[patent_app_type] => utility
[patent_app_number] => 16/353876
[patent_app_country] => US
[patent_app_date] => 2019-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7468
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16353876
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/353876 | Authentication by transmitting information through a human body | Mar 13, 2019 | Issued |
Array
(
[id] => 16300052
[patent_doc_number] => 20200285775
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-10
[patent_title] => DEVICE STATE DRIVEN ENCRYPTION KEY MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 16/297218
[patent_app_country] => US
[patent_app_date] => 2019-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7602
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 79
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16297218
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/297218 | Device state driven encryption key management | Mar 7, 2019 | Issued |
Array
(
[id] => 14840985
[patent_doc_number] => 20190278893
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-12
[patent_title] => TACTILE STYLUS BASED AUTHENTICATION SYSTEMS AND METHODS
[patent_app_type] => utility
[patent_app_number] => 16/294700
[patent_app_country] => US
[patent_app_date] => 2019-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20015
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16294700
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/294700 | TACTILE STYLUS BASED AUTHENTICATION SYSTEMS AND METHODS | Mar 5, 2019 | Abandoned |
Array
(
[id] => 15843609
[patent_doc_number] => 20200137087
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-30
[patent_title] => METHODS AND CLOUD-BASED SYSTEMS FOR DETECTING MALWARES BY SERVERS
[patent_app_type] => utility
[patent_app_number] => 16/289851
[patent_app_country] => US
[patent_app_date] => 2019-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9693
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16289851
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/289851 | Methods and cloud-based systems for detecting malwares by servers | Feb 28, 2019 | Issued |
Array
(
[id] => 14507155
[patent_doc_number] => 20190197232
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-06-27
[patent_title] => VERIFICATION METHOD AND DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/286270
[patent_app_country] => US
[patent_app_date] => 2019-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8513
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16286270
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/286270 | Verification method and device | Feb 25, 2019 | Issued |
Array
(
[id] => 16910618
[patent_doc_number] => 11042661
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-22
[patent_title] => Encryption for a distributed filesystem
[patent_app_type] => utility
[patent_app_number] => 16/274541
[patent_app_country] => US
[patent_app_date] => 2019-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6474
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16274541
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/274541 | Encryption for a distributed filesystem | Feb 12, 2019 | Issued |
Array
(
[id] => 14348181
[patent_doc_number] => 20190156063
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-23
[patent_title] => SECURELY TRANSFERRING DATA OVER A COMPUTER NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/260220
[patent_app_country] => US
[patent_app_date] => 2019-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6717
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16260220
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/260220 | Securely transferring data over a computer network | Jan 28, 2019 | Issued |
Array
(
[id] => 18858799
[patent_doc_number] => 11856406
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-12-26
[patent_title] => Securing headless devices from malicious (re-)configuration
[patent_app_type] => utility
[patent_app_number] => 16/963853
[patent_app_country] => US
[patent_app_date] => 2019-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5483
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16963853
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/963853 | Securing headless devices from malicious (re-)configuration | Jan 24, 2019 | Issued |
Array
(
[id] => 14633097
[patent_doc_number] => 20190229921
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-07-25
[patent_title] => Private Multi-Secret Cryptographic Transaction System
[patent_app_type] => utility
[patent_app_number] => 16/254035
[patent_app_country] => US
[patent_app_date] => 2019-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8522
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -3
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16254035
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/254035 | Private Multi-Secret Cryptographic Transaction System | Jan 21, 2019 | Abandoned |
Array
(
[id] => 14353015
[patent_doc_number] => 20190158481
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-23
[patent_title] => SYSTEMS AND METHODS FOR DISTRIBUTED IDENTITY VERIFICATION
[patent_app_type] => utility
[patent_app_number] => 16/253600
[patent_app_country] => US
[patent_app_date] => 2019-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 29483
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16253600
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/253600 | Systems and methods for distributed identity verification | Jan 21, 2019 | Issued |