Eric Frank Winakur
Examiner (ID: 5668, Phone: (571)272-4736 , Office: P/3777 )
Most Active Art Unit | 3736 |
Art Unit(s) | 3791, 2899, 3768, 3311, 3736, 3735, 3777 |
Total Applications | 2379 |
Issued Applications | 1756 |
Pending Applications | 294 |
Abandoned Applications | 329 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 14223335
[patent_doc_number] => 20190124052
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-25
[patent_title] => SEARCHABLE ENCRYPTION ENABLING ENCRYPTED SEARCH BASED ON DOCUMENT TYPE
[patent_app_type] => utility
[patent_app_number] => 16/113929
[patent_app_country] => US
[patent_app_date] => 2018-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12182
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16113929
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/113929 | Searchable encryption enabling encrypted search based on document type | Aug 26, 2018 | Issued |
Array
(
[id] => 15643393
[patent_doc_number] => 10594718
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-17
[patent_title] => Managing incident response operations based on monitored network activity
[patent_app_type] => utility
[patent_app_number] => 16/107509
[patent_app_country] => US
[patent_app_date] => 2018-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 22
[patent_no_of_words] => 27090
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 360
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16107509
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/107509 | Managing incident response operations based on monitored network activity | Aug 20, 2018 | Issued |
Array
(
[id] => 17758600
[patent_doc_number] => 11398903
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-07-26
[patent_title] => System and method for generating a cryptographic key
[patent_app_type] => utility
[patent_app_number] => 16/102601
[patent_app_country] => US
[patent_app_date] => 2018-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 15
[patent_no_of_words] => 7704
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16102601
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/102601 | System and method for generating a cryptographic key | Aug 12, 2018 | Issued |
Array
(
[id] => 15317909
[patent_doc_number] => 10523680
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-31
[patent_title] => System, device, and method for detecting a proxy server
[patent_app_type] => utility
[patent_app_number] => 16/057825
[patent_app_country] => US
[patent_app_date] => 2018-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 12777
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16057825
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/057825 | System, device, and method for detecting a proxy server | Aug 7, 2018 | Issued |
Array
(
[id] => 13583473
[patent_doc_number] => 20180343285
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-29
[patent_title] => MANAGING ACCESS IN ONE OR MORE COMPUTING SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 16/053703
[patent_app_country] => US
[patent_app_date] => 2018-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5306
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16053703
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/053703 | Managing access in one or more computing systems | Aug 1, 2018 | Issued |
Array
(
[id] => 17575197
[patent_doc_number] => 11323479
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-03
[patent_title] => Data loss prevention techniques
[patent_app_type] => utility
[patent_app_number] => 16/046582
[patent_app_country] => US
[patent_app_date] => 2018-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 17647
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16046582
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/046582 | Data loss prevention techniques | Jul 25, 2018 | Issued |
Array
(
[id] => 13849593
[patent_doc_number] => 20190028281
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-24
[patent_title] => REMOTE ATTESTATION OF A SECURITY MODULE'S ASSURANCE LEVEL
[patent_app_type] => utility
[patent_app_number] => 16/039335
[patent_app_country] => US
[patent_app_date] => 2018-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4900
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -2
[patent_words_short_claim] => 36
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16039335
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/039335 | Remote attestation of a security module's assurance level | Jul 18, 2018 | Issued |
Array
(
[id] => 13572453
[patent_doc_number] => 20180337774
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-22
[patent_title] => PRIVATE KEY DECRYPTION SYSTEM AND METHOD OF USE
[patent_app_type] => utility
[patent_app_number] => 16/034716
[patent_app_country] => US
[patent_app_date] => 2018-07-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6431
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16034716
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/034716 | Private key decryption system and method of use | Jul 12, 2018 | Issued |
Array
(
[id] => 15871329
[patent_doc_number] => 20200143068
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => METHOD FOR AUTHORIZING FIELD VALUE OF FORM FIELD BY MEANS OF THIRD PARTY FIELD
[patent_app_type] => utility
[patent_app_number] => 16/630412
[patent_app_country] => US
[patent_app_date] => 2018-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8173
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16630412
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/630412 | Method for authorizing field value of form field by means of third party field | Jul 9, 2018 | Issued |
Array
(
[id] => 13530361
[patent_doc_number] => 20180316723
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-01
[patent_title] => EFFICIENT USE OF IPSEC TUNNELS IN MULTI-PATH ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 16/028106
[patent_app_country] => US
[patent_app_date] => 2018-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7206
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16028106
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/028106 | Efficient use of IPsec tunnels in multi-path environment | Jul 4, 2018 | Issued |
Array
(
[id] => 13544843
[patent_doc_number] => 20180323968
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-08
[patent_title] => Physically Unclonable Function Circuits and Methods of Performing Key Enrollment in Physically Unclonable Function Circuits
[patent_app_type] => utility
[patent_app_number] => 16/023626
[patent_app_country] => US
[patent_app_date] => 2018-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8717
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16023626
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/023626 | Physically unclonable function circuits and methods of performing key enrollment in physically unclonable function circuits | Jun 28, 2018 | Issued |
Array
(
[id] => 13516407
[patent_doc_number] => 20180309746
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-25
[patent_title] => TECHNOLOGIES FOR TOKEN-BASED AUTHENTICATION AND AUTHORIZATION OF DISTRIBUTED COMPUTING RESOURCES
[patent_app_type] => utility
[patent_app_number] => 16/010869
[patent_app_country] => US
[patent_app_date] => 2018-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12185
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16010869
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/010869 | Technologies for token-based authentication and authorization of distributed computing resources | Jun 17, 2018 | Issued |
Array
(
[id] => 15261629
[patent_doc_number] => 20190379548
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-12
[patent_title] => METHOD AND SYSTEM FOR REDUCED V2X RECEIVER PROCESSING LOAD USING CERTIFICATES
[patent_app_type] => utility
[patent_app_number] => 16/001600
[patent_app_country] => US
[patent_app_date] => 2018-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13908
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 74
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16001600
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/001600 | Method and system for reduced V2X receiver processing load using certificates | Jun 5, 2018 | Issued |
Array
(
[id] => 17327416
[patent_doc_number] => 11218448
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-01-04
[patent_title] => Aggregating alerts of malicious events for computer security
[patent_app_type] => utility
[patent_app_number] => 16/000779
[patent_app_country] => US
[patent_app_date] => 2018-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 7637
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 290
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16000779
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/000779 | Aggregating alerts of malicious events for computer security | Jun 4, 2018 | Issued |
Array
(
[id] => 15220177
[patent_doc_number] => 20190372775
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-05
[patent_title] => AUTHENTICATION IN DISTRIBUTION SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 15/991574
[patent_app_country] => US
[patent_app_date] => 2018-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8423
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15991574
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/991574 | Authentication in distribution systems | May 28, 2018 | Issued |
Array
(
[id] => 13437429
[patent_doc_number] => 20180270257
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-20
[patent_title] => Dectection of invalid port accesses in port-scrambling-based networks
[patent_app_type] => utility
[patent_app_number] => 15/980719
[patent_app_country] => US
[patent_app_date] => 2018-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6068
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15980719
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/980719 | Detection of invalid port accesses in port-scrambling-based networks | May 14, 2018 | Issued |
Array
(
[id] => 17574975
[patent_doc_number] => 11323257
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-03
[patent_title] => Encryption of beacons
[patent_app_type] => utility
[patent_app_number] => 16/610109
[patent_app_country] => US
[patent_app_date] => 2018-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6056
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16610109
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/610109 | Encryption of beacons | Apr 26, 2018 | Issued |
Array
(
[id] => 16279170
[patent_doc_number] => 10762201
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-01
[patent_title] => Apparatus and method for conducting endpoint-network-monitoring
[patent_app_type] => utility
[patent_app_number] => 15/959037
[patent_app_country] => US
[patent_app_date] => 2018-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 14743
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 324
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15959037
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/959037 | Apparatus and method for conducting endpoint-network-monitoring | Apr 19, 2018 | Issued |
Array
(
[id] => 16880156
[patent_doc_number] => 11030306
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-08
[patent_title] => Method for executing a program intended to be interpreted by a virtual machine protected against fault injection attacks
[patent_app_type] => utility
[patent_app_number] => 15/957855
[patent_app_country] => US
[patent_app_date] => 2018-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 5776
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15957855
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/957855 | Method for executing a program intended to be interpreted by a virtual machine protected against fault injection attacks | Apr 18, 2018 | Issued |
Array
(
[id] => 16187876
[patent_doc_number] => 10721223
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-21
[patent_title] => Method and apparatus for secure device provisioning in an industrial control system
[patent_app_type] => utility
[patent_app_number] => 15/951464
[patent_app_country] => US
[patent_app_date] => 2018-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 5234
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15951464
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/951464 | Method and apparatus for secure device provisioning in an industrial control system | Apr 11, 2018 | Issued |