Eric Frank Winakur
Examiner (ID: 5668, Phone: (571)272-4736 , Office: P/3777 )
Most Active Art Unit | 3736 |
Art Unit(s) | 3791, 2899, 3768, 3311, 3736, 3735, 3777 |
Total Applications | 2379 |
Issued Applications | 1756 |
Pending Applications | 294 |
Abandoned Applications | 329 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 12163364
[patent_doc_number] => 20180034630
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'PUBLIC-KEY ENCRYPTION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/512938
[patent_app_country] => US
[patent_app_date] => 2015-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 17295
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15512938
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/512938 | Public-key encryption system | Sep 21, 2015 | Issued |
Array
(
[id] => 10682406
[patent_doc_number] => 20160028551
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-28
[patent_title] => 'SYSTEMS AND METHODS FOR HARDWARE SECURITY MODULE AS CERTIFICATE AUTHORITY FOR NETWORK-ENABLED DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/849027
[patent_app_country] => US
[patent_app_date] => 2015-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8584
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14849027
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/849027 | SYSTEMS AND METHODS FOR HARDWARE SECURITY MODULE AS CERTIFICATE AUTHORITY FOR NETWORK-ENABLED DEVICES | Sep 8, 2015 | Abandoned |
Array
(
[id] => 10473296
[patent_doc_number] => 20150358313
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-10
[patent_title] => 'SYSTEMS AND METHODS FOR SECURED COMMUNICATION HARDWARE SECURITY MODULE AND NETWORK-ENABLED DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/829233
[patent_app_country] => US
[patent_app_date] => 2015-08-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8709
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14829233
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/829233 | SYSTEMS AND METHODS FOR SECURED COMMUNICATION HARDWARE SECURITY MODULE AND NETWORK-ENABLED DEVICES | Aug 17, 2015 | Abandoned |
Array
(
[id] => 10564540
[patent_doc_number] => 09288224
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-15
[patent_title] => 'Assessing threat to at least one computer network'
[patent_app_type] => utility
[patent_app_number] => 14/827712
[patent_app_country] => US
[patent_app_date] => 2015-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5556
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14827712
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/827712 | Assessing threat to at least one computer network | Aug 16, 2015 | Issued |
Array
(
[id] => 13245191
[patent_doc_number] => 10135816
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-20
[patent_title] => Electronic device and method of transceiving data
[patent_app_type] => utility
[patent_app_number] => 14/812006
[patent_app_country] => US
[patent_app_date] => 2015-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 15
[patent_no_of_words] => 18099
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 320
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14812006
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/812006 | Electronic device and method of transceiving data | Jul 28, 2015 | Issued |
Array
(
[id] => 12101324
[patent_doc_number] => 09858420
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-02
[patent_title] => 'Transmission of trustworthy data'
[patent_app_type] => utility
[patent_app_number] => 14/810568
[patent_app_country] => US
[patent_app_date] => 2015-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 6137
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14810568
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/810568 | Transmission of trustworthy data | Jul 27, 2015 | Issued |
Array
(
[id] => 11426067
[patent_doc_number] => 20170034213
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-02
[patent_title] => 'Efficient Use of IPSEC Tunnels in Multi-Path Environment'
[patent_app_type] => utility
[patent_app_number] => 14/811695
[patent_app_country] => US
[patent_app_date] => 2015-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7441
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14811695
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/811695 | Efficient use of IPsec tunnels in multi-path environment | Jul 27, 2015 | Issued |
Array
(
[id] => 12013615
[patent_doc_number] => 09806948
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-31
[patent_title] => 'Providing firewall rules for workload spread across multiple data centers'
[patent_app_type] => utility
[patent_app_number] => 14/811402
[patent_app_country] => US
[patent_app_date] => 2015-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 10701
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 319
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14811402
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/811402 | Providing firewall rules for workload spread across multiple data centers | Jul 27, 2015 | Issued |
Array
(
[id] => 10697878
[patent_doc_number] => 20160044025
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-11
[patent_title] => 'SYSTEM AND METHOD FOR SECURITY ENHANCEMENT'
[patent_app_type] => utility
[patent_app_number] => 14/809746
[patent_app_country] => US
[patent_app_date] => 2015-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9159
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14809746
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/809746 | SYSTEM AND METHOD FOR SECURITY ENHANCEMENT | Jul 26, 2015 | Abandoned |
Array
(
[id] => 10709201
[patent_doc_number] => 20160055348
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-25
[patent_title] => 'DOUBLE KEY CODING METHODS OF PROVIDING FAST SEARCH, ANALYSIS, AND DATA RETRIEVAL OF ENCRYPTED DATA WITHOUT DECRYPTION'
[patent_app_type] => utility
[patent_app_number] => 14/810249
[patent_app_country] => US
[patent_app_date] => 2015-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 12379
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14810249
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/810249 | DOUBLE KEY CODING METHODS OF PROVIDING FAST SEARCH, ANALYSIS, AND DATA RETRIEVAL OF ENCRYPTED DATA WITHOUT DECRYPTION | Jul 26, 2015 | Abandoned |
Array
(
[id] => 11062958
[patent_doc_number] => 20160259920
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-08
[patent_title] => 'INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 14/809963
[patent_app_country] => US
[patent_app_date] => 2015-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 6947
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14809963
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/809963 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | Jul 26, 2015 | Abandoned |
Array
(
[id] => 11405812
[patent_doc_number] => 20170026350
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-26
[patent_title] => 'SEARCHABLE ENCRYPTION ENABLING ENCRYPTED SEARCH BASED ON DOCUMENT TYPE'
[patent_app_type] => utility
[patent_app_number] => 14/808900
[patent_app_country] => US
[patent_app_date] => 2015-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 12640
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14808900
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/808900 | Searchable encryption enabling encrypted search based on document type | Jul 23, 2015 | Issued |
Array
(
[id] => 14179881
[patent_doc_number] => 10263968
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-04-16
[patent_title] => Security measure for exchanging keys over networks
[patent_app_type] => utility
[patent_app_number] => 14/808709
[patent_app_country] => US
[patent_app_date] => 2015-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9474
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 260
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14808709
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/808709 | Security measure for exchanging keys over networks | Jul 23, 2015 | Issued |
Array
(
[id] => 10447033
[patent_doc_number] => 20150332047
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-19
[patent_title] => 'COMPUTER PROTECTION AGAINST MALWARE AFFECTION'
[patent_app_type] => utility
[patent_app_number] => 14/807003
[patent_app_country] => US
[patent_app_date] => 2015-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 14207
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14807003
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/807003 | Computer protection against malware affection | Jul 22, 2015 | Issued |
Array
(
[id] => 10455060
[patent_doc_number] => 20150340075
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-26
[patent_title] => 'PORTABLE ELECTRONIC DEVICE, PROGRAM, TERMINAL DEVICE AND METHOD OF CONTROLLING DECODING OF DATA'
[patent_app_type] => utility
[patent_app_number] => 14/717029
[patent_app_country] => US
[patent_app_date] => 2015-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 16908
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14717029
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/717029 | PORTABLE ELECTRONIC DEVICE, PROGRAM, TERMINAL DEVICE AND METHOD OF CONTROLLING DECODING OF DATA | May 19, 2015 | Abandoned |
Array
(
[id] => 11294611
[patent_doc_number] => 20160344543
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-24
[patent_title] => 'SECURITY SYSTEM FORMING PART OF A BITCOIN HOST COMPUTER'
[patent_app_type] => utility
[patent_app_number] => 14/716100
[patent_app_country] => US
[patent_app_date] => 2015-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6429
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14716100
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/716100 | Key ceremony of a security system forming part of a host computer for cryptographic transactions | May 18, 2015 | Issued |
Array
(
[id] => 13083571
[patent_doc_number] => 10061852
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-08-28
[patent_title] => Transparent proxy tunnel caching for database access
[patent_app_type] => utility
[patent_app_number] => 14/716690
[patent_app_country] => US
[patent_app_date] => 2015-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11183
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14716690
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/716690 | Transparent proxy tunnel caching for database access | May 18, 2015 | Issued |
Array
(
[id] => 12399057
[patent_doc_number] => 09967279
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-08
[patent_title] => System and method thereof for creating programmable security decision engines in a cyber-security system
[patent_app_type] => utility
[patent_app_number] => 14/716359
[patent_app_country] => US
[patent_app_date] => 2015-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 10642
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 310
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14716359
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/716359 | System and method thereof for creating programmable security decision engines in a cyber-security system | May 18, 2015 | Issued |
Array
(
[id] => 10494231
[patent_doc_number] => 20150379253
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'User Identity Authentication Techniques for On-Line Content or Access'
[patent_app_type] => utility
[patent_app_number] => 14/716591
[patent_app_country] => US
[patent_app_date] => 2015-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11262
[patent_no_of_claims] => 42
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14716591
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/716591 | User identity authentication techniques for on-line content or access | May 18, 2015 | Issued |
Array
(
[id] => 16503257
[patent_doc_number] => 10868665
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-15
[patent_title] => Mitigating timing side-channel attacks by obscuring accesses to sensitive data
[patent_app_type] => utility
[patent_app_number] => 14/715345
[patent_app_country] => US
[patent_app_date] => 2015-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 16
[patent_no_of_words] => 16302
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14715345
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/715345 | Mitigating timing side-channel attacks by obscuring accesses to sensitive data | May 17, 2015 | Issued |