
Eric Frank Winakur
Examiner (ID: 5668, Phone: (571)272-4736 , Office: P/3777 )
Most Active Art Unit | 3736 |
Art Unit(s) | 3791, 2899, 3768, 3311, 3736, 3735, 3777 |
Total Applications | 2379 |
Issued Applications | 1756 |
Pending Applications | 294 |
Abandoned Applications | 329 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 11340376
[patent_doc_number] => 20160366132
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'METHOD FOR CONTROLLING ACCESS TO DATA RELATING TO AN ELECTRICAL INSTALLATION, ASSOCIATED COMPUTER PROGRAMME AND INFORMATION MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 15/174024
[patent_app_country] => US
[patent_app_date] => 2016-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6422
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15174024
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/174024 | Method for controlling access to data relating to an electrical installation, associated computer programme and information medium | Jun 5, 2016 | Issued |
Array
(
[id] => 15202497
[patent_doc_number] => 10498765
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-03
[patent_title] => Virtual infrastructure perimeter regulator
[patent_app_type] => utility
[patent_app_number] => 15/169830
[patent_app_country] => US
[patent_app_date] => 2016-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8328
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15169830
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/169830 | Virtual infrastructure perimeter regulator | May 31, 2016 | Issued |
Array
(
[id] => 12993001
[patent_doc_number] => 20170346807
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-30
[patent_title] => TECHNOLOGIES FOR TOKEN-BASED AUTHENTICATION AND AUTHORIZATION OF DISTRIBUTED COMPUTING RESOURCES
[patent_app_type] => utility
[patent_app_number] => 15/162936
[patent_app_country] => US
[patent_app_date] => 2016-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12187
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15162936
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/162936 | Technologies for token-based authentication and authorization of distributed computing resources | May 23, 2016 | Issued |
Array
(
[id] => 15521277
[patent_doc_number] => 10567247
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-18
[patent_title] => Intra-datacenter attack detection
[patent_app_type] => utility
[patent_app_number] => 15/145630
[patent_app_country] => US
[patent_app_date] => 2016-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 9252
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15145630
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/145630 | Intra-datacenter attack detection | May 2, 2016 | Issued |
Array
(
[id] => 12337962
[patent_doc_number] => 09948660
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-17
[patent_title] => Computer security based on hierarchical cache latency signature authentication
[patent_app_type] => utility
[patent_app_number] => 15/138482
[patent_app_country] => US
[patent_app_date] => 2016-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 9035
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15138482
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/138482 | Computer security based on hierarchical cache latency signature authentication | Apr 25, 2016 | Issued |
Array
(
[id] => 13684057
[patent_doc_number] => 20160380765
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-29
[patent_title] => QUANTUM ENABLED SECURITY FOR OPTICAL COMMUNICATIONS
[patent_app_type] => utility
[patent_app_number] => 15/136778
[patent_app_country] => US
[patent_app_date] => 2016-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3591
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15136778
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/136778 | QUANTUM ENABLED SECURITY FOR OPTICAL COMMUNICATIONS | Apr 21, 2016 | Abandoned |
Array
(
[id] => 11454353
[patent_doc_number] => 09578013
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-21
[patent_title] => 'System and method for secure content sharing and synchronization'
[patent_app_type] => utility
[patent_app_number] => 15/134817
[patent_app_country] => US
[patent_app_date] => 2016-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 15974
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15134817
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/134817 | System and method for secure content sharing and synchronization | Apr 20, 2016 | Issued |
Array
(
[id] => 14957413
[patent_doc_number] => 10439993
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-08
[patent_title] => Mapping system assisted key refreshing
[patent_app_type] => utility
[patent_app_number] => 15/095421
[patent_app_country] => US
[patent_app_date] => 2016-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 6539
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15095421
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/095421 | Mapping system assisted key refreshing | Apr 10, 2016 | Issued |
Array
(
[id] => 14705183
[patent_doc_number] => 10380341
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-13
[patent_title] => Adaptive systems and procedures for defending a processor against transient fault attacks
[patent_app_type] => utility
[patent_app_number] => 15/089379
[patent_app_country] => US
[patent_app_date] => 2016-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 16430
[patent_no_of_claims] => 42
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15089379
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/089379 | Adaptive systems and procedures for defending a processor against transient fault attacks | Mar 31, 2016 | Issued |
Array
(
[id] => 11545317
[patent_doc_number] => 20170099142
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-06
[patent_title] => 'DECRYPTION DEVICE, METHOD, AND CIRCUIT'
[patent_app_type] => utility
[patent_app_number] => 15/088149
[patent_app_country] => US
[patent_app_date] => 2016-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4104
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15088149
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/088149 | Decryption device, method, and circuit | Mar 31, 2016 | Issued |
Array
(
[id] => 12257899
[patent_doc_number] => 09930059
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-03-27
[patent_title] => 'Methods and apparatus for analyzing asynchronous cyber-threat event data using discrete time intervals'
[patent_app_type] => utility
[patent_app_number] => 15/087517
[patent_app_country] => US
[patent_app_date] => 2016-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8223
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 350
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15087517
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/087517 | Methods and apparatus for analyzing asynchronous cyber-threat event data using discrete time intervals | Mar 30, 2016 | Issued |
Array
(
[id] => 11020335
[patent_doc_number] => 20160217287
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-28
[patent_title] => 'SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PROTECTING SOFTWARE VIA CONTINUOUS ANTI-TAMPERING AND OBFUSCATION TRANSFORMS'
[patent_app_type] => utility
[patent_app_number] => 15/078675
[patent_app_country] => US
[patent_app_date] => 2016-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 39
[patent_figures_cnt] => 39
[patent_no_of_words] => 15417
[patent_no_of_claims] => 165
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15078675
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/078675 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PROTECTING SOFTWARE VIA CONTINUOUS ANTI-TAMPERING AND OBFUSCATION TRANSFORMS | Mar 22, 2016 | Abandoned |
Array
(
[id] => 11586682
[patent_doc_number] => 09641341
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-02
[patent_title] => 'Method for distributed trust authentication'
[patent_app_type] => utility
[patent_app_number] => 15/075826
[patent_app_country] => US
[patent_app_date] => 2016-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10435
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 371
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15075826
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/075826 | Method for distributed trust authentication | Mar 20, 2016 | Issued |
Array
(
[id] => 13284901
[patent_doc_number] => 10154048
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-11
[patent_title] => Methods and systems for location-based authentication using neighboring sensors
[patent_app_type] => utility
[patent_app_number] => 15/074745
[patent_app_country] => US
[patent_app_date] => 2016-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6949
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15074745
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/074745 | Methods and systems for location-based authentication using neighboring sensors | Mar 17, 2016 | Issued |
Array
(
[id] => 11968312
[patent_doc_number] => 20170272465
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-21
[patent_title] => 'DYNAMIC DENIAL OF SERVICE DETECTION AND AUTOMATED SAFE MITIGATION'
[patent_app_type] => utility
[patent_app_number] => 15/070999
[patent_app_country] => US
[patent_app_date] => 2016-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12186
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15070999
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/070999 | Dynamic denial of service detection and automated safe mitigation | Mar 14, 2016 | Issued |
Array
(
[id] => 11186822
[patent_doc_number] => 09418226
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-08-16
[patent_title] => 'Apparatus and method for assessing financial loss from threats capable of affecting at least one computer network'
[patent_app_type] => utility
[patent_app_number] => 15/017645
[patent_app_country] => US
[patent_app_date] => 2016-02-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5608
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15017645
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/017645 | Apparatus and method for assessing financial loss from threats capable of affecting at least one computer network | Feb 6, 2016 | Issued |
Array
(
[id] => 13376737
[patent_doc_number] => 20180239910
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-23
[patent_title] => ENCRYPTED TEXT VERIFICATION SYSTEM, METHOD AND RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 15/553264
[patent_app_country] => US
[patent_app_date] => 2016-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 22584
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15553264
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/553264 | Encrypted text verification system, method and recording medium | Jan 26, 2016 | Issued |
Array
(
[id] => 11110413
[patent_doc_number] => 20160307383
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-20
[patent_title] => 'ELECTRONIC APPARATUSES AND METHODS FOR ACCESS CONTROL AND FOR DATA INTEGRITY VERIFICATION'
[patent_app_type] => utility
[patent_app_number] => 15/006993
[patent_app_country] => US
[patent_app_date] => 2016-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 13755
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15006993
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/006993 | ELECTRONIC APPARATUSES AND METHODS FOR ACCESS CONTROL AND FOR DATA INTEGRITY VERIFICATION | Jan 25, 2016 | Abandoned |
Array
(
[id] => 11015179
[patent_doc_number] => 20160212132
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-21
[patent_title] => 'CONTEXT-BASED POSSESSION-LESS ACCESS OF SECURE INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 15/002611
[patent_app_country] => US
[patent_app_date] => 2016-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9644
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15002611
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/002611 | Context-based possession-less access of secure information | Jan 20, 2016 | Issued |
Array
(
[id] => 13045115
[patent_doc_number] => 10044705
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-07
[patent_title] => Session management for internet of things devices
[patent_app_type] => utility
[patent_app_number] => 15/001611
[patent_app_country] => US
[patent_app_date] => 2016-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7792
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15001611
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/001611 | Session management for internet of things devices | Jan 19, 2016 | Issued |