Eric Frank Winakur
Examiner (ID: 5668, Phone: (571)272-4736 , Office: P/3777 )
Most Active Art Unit | 3736 |
Art Unit(s) | 3791, 2899, 3768, 3311, 3736, 3735, 3777 |
Total Applications | 2379 |
Issued Applications | 1756 |
Pending Applications | 294 |
Abandoned Applications | 329 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 16200964
[patent_doc_number] => 10726131
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-28
[patent_title] => Systems and methods for mitigation of permanent denial of service attacks
[patent_app_type] => utility
[patent_app_number] => 15/358021
[patent_app_country] => US
[patent_app_date] => 2016-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11021
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15358021
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/358021 | Systems and methods for mitigation of permanent denial of service attacks | Nov 20, 2016 | Issued |
Array
(
[id] => 12689473
[patent_doc_number] => 20180121657
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-03
[patent_title] => SECURITY RISK EVALUATION
[patent_app_type] => utility
[patent_app_number] => 15/339965
[patent_app_country] => US
[patent_app_date] => 2016-11-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5082
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 59
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15339965
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/339965 | SECURITY RISK EVALUATION | Oct 31, 2016 | Abandoned |
Array
(
[id] => 17197052
[patent_doc_number] => 11165829
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-02
[patent_title] => Virtualized network function security wrapping orchestration in the cloud environment
[patent_app_type] => utility
[patent_app_number] => 16/340856
[patent_app_country] => US
[patent_app_date] => 2016-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 5986
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 25
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16340856
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/340856 | Virtualized network function security wrapping orchestration in the cloud environment | Oct 10, 2016 | Issued |
Array
(
[id] => 14461233
[patent_doc_number] => 10326596
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-18
[patent_title] => Techniques for secure authentication
[patent_app_type] => utility
[patent_app_number] => 15/283315
[patent_app_country] => US
[patent_app_date] => 2016-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 22
[patent_no_of_words] => 8945
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15283315
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/283315 | Techniques for secure authentication | Sep 30, 2016 | Issued |
Array
(
[id] => 11504127
[patent_doc_number] => 20170078312
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-16
[patent_title] => 'METHOD AND APPARATUS FOR MONITORING NETWORK'
[patent_app_type] => utility
[patent_app_number] => 15/262803
[patent_app_country] => US
[patent_app_date] => 2016-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 9612
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15262803
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/262803 | Method and apparatus for monitoring network | Sep 11, 2016 | Issued |
Array
(
[id] => 11504108
[patent_doc_number] => 20170078293
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-16
[patent_title] => 'INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 15/262329
[patent_app_country] => US
[patent_app_date] => 2016-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 14231
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15262329
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/262329 | Information processing system, information processing apparatus, information processing method, and recording medium | Sep 11, 2016 | Issued |
Array
(
[id] => 11477080
[patent_doc_number] => 20170063863
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'Access Control Device and Authentication Control Method'
[patent_app_type] => utility
[patent_app_number] => 15/254451
[patent_app_country] => US
[patent_app_date] => 2016-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8052
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15254451
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/254451 | Access control device and authentication control method | Aug 31, 2016 | Issued |
Array
(
[id] => 15390459
[patent_doc_number] => 10536442
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-14
[patent_title] => Method, apparatus, and device for managing authentication data of STA
[patent_app_type] => utility
[patent_app_number] => 15/248609
[patent_app_country] => US
[patent_app_date] => 2016-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 8
[patent_no_of_words] => 12859
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15248609
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/248609 | Method, apparatus, and device for managing authentication data of STA | Aug 25, 2016 | Issued |
Array
(
[id] => 11877484
[patent_doc_number] => 09749271
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-29
[patent_title] => 'Automatic isolation and detection of outbound spam'
[patent_app_type] => utility
[patent_app_number] => 15/248037
[patent_app_country] => US
[patent_app_date] => 2016-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8722
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15248037
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/248037 | Automatic isolation and detection of outbound spam | Aug 25, 2016 | Issued |
Array
(
[id] => 14740579
[patent_doc_number] => 10389706
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-20
[patent_title] => Authentication based on telephone number recycling
[patent_app_type] => utility
[patent_app_number] => 15/225608
[patent_app_country] => US
[patent_app_date] => 2016-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6051
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15225608
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/225608 | Authentication based on telephone number recycling | Jul 31, 2016 | Issued |
Array
(
[id] => 14799123
[patent_doc_number] => 10402566
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-03
[patent_title] => High assurance configuration security processor (HACSP) for computing devices
[patent_app_type] => utility
[patent_app_number] => 15/224688
[patent_app_country] => US
[patent_app_date] => 2016-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 9729
[patent_no_of_claims] => 46
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15224688
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/224688 | High assurance configuration security processor (HACSP) for computing devices | Jul 31, 2016 | Issued |
Array
(
[id] => 12163567
[patent_doc_number] => 20180034833
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'Channel Data Encapsulation System and Method for Use with Client-Server Data Channels'
[patent_app_type] => utility
[patent_app_number] => 15/224339
[patent_app_country] => US
[patent_app_date] => 2016-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6516
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15224339
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/224339 | Channel data encapsulation system and method for use with client-server data channels | Jul 28, 2016 | Issued |
Array
(
[id] => 11447678
[patent_doc_number] => 20170048700
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'SELF-CONFIGURING WIRELESS NETWORK'
[patent_app_type] => utility
[patent_app_number] => 15/219204
[patent_app_country] => US
[patent_app_date] => 2016-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 14141
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15219204
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/219204 | SELF-CONFIGURING WIRELESS NETWORK | Jul 24, 2016 | Abandoned |
Array
(
[id] => 13767957
[patent_doc_number] => 10176324
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-08
[patent_title] => System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms
[patent_app_type] => utility
[patent_app_number] => 15/215994
[patent_app_country] => US
[patent_app_date] => 2016-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 38
[patent_figures_cnt] => 38
[patent_no_of_words] => 14935
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15215994
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/215994 | System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms | Jul 20, 2016 | Issued |
Array
(
[id] => 11386932
[patent_doc_number] => 20170012988
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-12
[patent_title] => 'DETECTION OF PROXY SERVER'
[patent_app_type] => utility
[patent_app_number] => 15/203817
[patent_app_country] => US
[patent_app_date] => 2016-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 13587
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15203817
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/203817 | Detection of proxy server | Jul 6, 2016 | Issued |
Array
(
[id] => 12121355
[patent_doc_number] => 20180004941
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-04
[patent_title] => 'MODEL-BASED COMPUTER ATTACK ANALYTICS ORCHESTRATION'
[patent_app_type] => utility
[patent_app_number] => 15/201186
[patent_app_country] => US
[patent_app_date] => 2016-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6632
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15201186
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/201186 | Model-based computer attack analytics orchestration | Jun 30, 2016 | Issued |
Array
(
[id] => 13895643
[patent_doc_number] => 10200383
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-02-05
[patent_title] => Neutralizing malicious locators
[patent_app_type] => utility
[patent_app_number] => 15/196072
[patent_app_country] => US
[patent_app_date] => 2016-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4882
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15196072
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/196072 | Neutralizing malicious locators | Jun 28, 2016 | Issued |
Array
(
[id] => 11622079
[patent_doc_number] => 20170132266
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-11
[patent_title] => 'VERIFIABLE DATA DESTRUCTION IN A DATABASE'
[patent_app_type] => utility
[patent_app_number] => 15/197251
[patent_app_country] => US
[patent_app_date] => 2016-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 13134
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15197251
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/197251 | Verifiable data destruction in a database | Jun 28, 2016 | Issued |
Array
(
[id] => 13122989
[patent_doc_number] => 10079858
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-18
[patent_title] => Managing access in one or more computing systems
[patent_app_type] => utility
[patent_app_number] => 15/190795
[patent_app_country] => US
[patent_app_date] => 2016-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5306
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15190795
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/190795 | Managing access in one or more computing systems | Jun 22, 2016 | Issued |
Array
(
[id] => 13809539
[patent_doc_number] => 10182040
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-15
[patent_title] => Systems and methods for single device authentication
[patent_app_type] => utility
[patent_app_number] => 15/178320
[patent_app_country] => US
[patent_app_date] => 2016-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 9298
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 261
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178320
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/178320 | Systems and methods for single device authentication | Jun 8, 2016 | Issued |