Eric Frank Winakur
Examiner (ID: 5668, Phone: (571)272-4736 , Office: P/3777 )
Most Active Art Unit | 3736 |
Art Unit(s) | 3791, 2899, 3768, 3311, 3736, 3735, 3777 |
Total Applications | 2379 |
Issued Applications | 1756 |
Pending Applications | 294 |
Abandoned Applications | 329 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 13845969
[patent_doc_number] => 20190026469
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-24
[patent_title] => COUNTERFEIT ELECTRONIC DEVICE DETECTION
[patent_app_type] => utility
[patent_app_number] => 16/081217
[patent_app_country] => US
[patent_app_date] => 2017-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7517
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16081217
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/081217 | Counterfeit electronic device detection | Mar 2, 2017 | Issued |
Array
(
[id] => 13407117
[patent_doc_number] => 20180255101
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-06
[patent_title] => DELEGATING SECURITY POLICY MANAGEMENT AUTHORITY TO MANAGED ACCOUNTS
[patent_app_type] => utility
[patent_app_number] => 15/449847
[patent_app_country] => US
[patent_app_date] => 2017-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16626
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15449847
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/449847 | Delegating security policy management authority to managed accounts | Mar 2, 2017 | Issued |
Array
(
[id] => 13407189
[patent_doc_number] => 20180255137
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-06
[patent_title] => UNIFIED RESOURCE MANAGEMENT IN A DATA CENTER CLOUD ARCHITECTURE
[patent_app_type] => utility
[patent_app_number] => 15/448444
[patent_app_country] => US
[patent_app_date] => 2017-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11862
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 55
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15448444
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/448444 | UNIFIED RESOURCE MANAGEMENT IN A DATA CENTER CLOUD ARCHITECTURE | Mar 1, 2017 | Abandoned |
Array
(
[id] => 14065877
[patent_doc_number] => 10237259
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-19
[patent_title] => Systems and methods for distributed identity verification
[patent_app_type] => utility
[patent_app_number] => 15/445367
[patent_app_country] => US
[patent_app_date] => 2017-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 29465
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 527
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15445367
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/445367 | Systems and methods for distributed identity verification | Feb 27, 2017 | Issued |
Array
(
[id] => 12224733
[patent_doc_number] => 20180063094
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-01
[patent_title] => 'END-TO-END ENCRYPTION FOR PERSONAL COMMUNICATION NODES'
[patent_app_type] => utility
[patent_app_number] => 15/437661
[patent_app_country] => US
[patent_app_date] => 2017-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5188
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15437661
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/437661 | End-to end encryption for personal communication nodes | Feb 20, 2017 | Issued |
Array
(
[id] => 12110070
[patent_doc_number] => 09866562
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-09
[patent_title] => 'File and bit location authentication'
[patent_app_type] => utility
[patent_app_number] => 15/433070
[patent_app_country] => US
[patent_app_date] => 2017-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6681
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15433070
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/433070 | File and bit location authentication | Feb 14, 2017 | Issued |
Array
(
[id] => 13244781
[patent_doc_number] => 10135611
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-11-20
[patent_title] => Delivering a content item from a server to a device
[patent_app_type] => utility
[patent_app_number] => 15/432163
[patent_app_country] => US
[patent_app_date] => 2017-02-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5363
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 457
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15432163
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/432163 | Delivering a content item from a server to a device | Feb 13, 2017 | Issued |
Array
(
[id] => 15151835
[patent_doc_number] => 20190354395
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-21
[patent_title] => LIMITING FOLDER AND LINK SHARING
[patent_app_type] => utility
[patent_app_number] => 16/347895
[patent_app_country] => US
[patent_app_date] => 2017-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12510
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16347895
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/347895 | Limiting folder and link sharing | Feb 2, 2017 | Issued |
Array
(
[id] => 11665647
[patent_doc_number] => 20170154366
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-01
[patent_title] => 'DEVICE, SYSTEM, AND METHOD OF GENERATING AND MANAGING BEHAVIORAL BIOMETRIC COOKIES'
[patent_app_type] => utility
[patent_app_number] => 15/422479
[patent_app_country] => US
[patent_app_date] => 2017-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 21364
[patent_no_of_claims] => 38
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15422479
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/422479 | Device, system, and method of generating and managing behavioral biometric cookies | Feb 1, 2017 | Issued |
Array
(
[id] => 14062455
[patent_doc_number] => 10235522
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-19
[patent_title] => Definition structure of program for autonomously disabling invading virus, program equipped with structure, storage medium installed with program, and method/device for autonomously solving virus problem
[patent_app_type] => utility
[patent_app_number] => 15/423481
[patent_app_country] => US
[patent_app_date] => 2017-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 26976
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 312
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15423481
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/423481 | Definition structure of program for autonomously disabling invading virus, program equipped with structure, storage medium installed with program, and method/device for autonomously solving virus problem | Feb 1, 2017 | Issued |
Array
(
[id] => 11631900
[patent_doc_number] => 20170142089
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-18
[patent_title] => 'REDUCING AUTHENTICATION CONFIDENCE OVER TIME BASED ON USER HISTORY'
[patent_app_type] => utility
[patent_app_number] => 15/419447
[patent_app_country] => US
[patent_app_date] => 2017-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12489
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15419447
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/419447 | Reducing authentication confidence over time based on user history | Jan 29, 2017 | Issued |
Array
(
[id] => 11877540
[patent_doc_number] => 09749327
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-29
[patent_title] => 'System and method for secure content sharing and synchronization'
[patent_app_type] => utility
[patent_app_number] => 15/413601
[patent_app_country] => US
[patent_app_date] => 2017-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 16017
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 261
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15413601
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/413601 | System and method for secure content sharing and synchronization | Jan 23, 2017 | Issued |
Array
(
[id] => 12898951
[patent_doc_number] => 20180191492
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-05
[patent_title] => Decryption-Side Initialization Vector Discovery
[patent_app_type] => utility
[patent_app_number] => 15/397759
[patent_app_country] => US
[patent_app_date] => 2017-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3178
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15397759
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/397759 | Decryption-Side Initialization Vector Discovery | Jan 3, 2017 | Abandoned |
Array
(
[id] => 14720443
[patent_doc_number] => 20190251285
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-15
[patent_title] => METHOD AND ELECTRONIC DEVICE FOR IDENTIFYING A PSEUDO WIRELESS ACCESS POINT
[patent_app_type] => utility
[patent_app_number] => 16/345352
[patent_app_country] => US
[patent_app_date] => 2016-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4247
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16345352
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/345352 | Method and electronic device for identifying a pseudo wireless access point | Dec 29, 2016 | Issued |
Array
(
[id] => 11926681
[patent_doc_number] => 09794277
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-17
[patent_title] => 'Monitoring traffic in a computer network'
[patent_app_type] => utility
[patent_app_number] => 15/390755
[patent_app_country] => US
[patent_app_date] => 2016-12-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6122
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 292
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15390755
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/390755 | Monitoring traffic in a computer network | Dec 26, 2016 | Issued |
Array
(
[id] => 17283284
[patent_doc_number] => 11200314
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-12-14
[patent_title] => Ransomware attack monitoring
[patent_app_type] => utility
[patent_app_number] => 16/087712
[patent_app_country] => US
[patent_app_date] => 2016-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4020
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16087712
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/087712 | Ransomware attack monitoring | Dec 14, 2016 | Issued |
Array
(
[id] => 12804094
[patent_doc_number] => 20180159868
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-07
[patent_title] => NETWORK ATTACK PATTERN DETERMINATION APPARATUS, DETERMINATION METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF
[patent_app_type] => utility
[patent_app_number] => 15/372294
[patent_app_country] => US
[patent_app_date] => 2016-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5352
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 283
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15372294
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/372294 | Network attack pattern determination apparatus, determination method, and non-transitory computer readable storage medium thereof | Dec 6, 2016 | Issued |
Array
(
[id] => 16232931
[patent_doc_number] => 10740483
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-11
[patent_title] => Unified instance authorization based on attributes and hierarchy assignment
[patent_app_type] => utility
[patent_app_number] => 15/358176
[patent_app_country] => US
[patent_app_date] => 2016-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 9775
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 358
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15358176
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/358176 | Unified instance authorization based on attributes and hierarchy assignment | Nov 21, 2016 | Issued |
Array
(
[id] => 15613125
[patent_doc_number] => 10587647
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-10
[patent_title] => Technique for malware detection capability comparison of network security devices
[patent_app_type] => utility
[patent_app_number] => 15/358688
[patent_app_country] => US
[patent_app_date] => 2016-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 9183
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15358688
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/358688 | Technique for malware detection capability comparison of network security devices | Nov 21, 2016 | Issued |
Array
(
[id] => 11666928
[patent_doc_number] => 20170155647
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-01
[patent_title] => 'METHOD FOR SETTING UP A SECURE END-TO-END COMMUNICATION BETWEEN A USER TERMINAL AND A CONNECTED OBJECT'
[patent_app_type] => utility
[patent_app_number] => 15/358423
[patent_app_country] => US
[patent_app_date] => 2016-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6305
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15358423
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/358423 | Method for setting up a secure end-to-end communication between a user terminal and a connected object | Nov 21, 2016 | Issued |