Search

Eric Frank Winakur

Examiner (ID: 5668, Phone: (571)272-4736 , Office: P/3777 )

Most Active Art Unit
3736
Art Unit(s)
3791, 2899, 3768, 3311, 3736, 3735, 3777
Total Applications
2379
Issued Applications
1756
Pending Applications
294
Abandoned Applications
329

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 12163364 [patent_doc_number] => 20180034630 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-02-01 [patent_title] => 'PUBLIC-KEY ENCRYPTION SYSTEM' [patent_app_type] => utility [patent_app_number] => 15/512938 [patent_app_country] => US [patent_app_date] => 2015-09-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 17295 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15512938 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/512938
Public-key encryption system Sep 21, 2015 Issued
Array ( [id] => 10682406 [patent_doc_number] => 20160028551 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-01-28 [patent_title] => 'SYSTEMS AND METHODS FOR HARDWARE SECURITY MODULE AS CERTIFICATE AUTHORITY FOR NETWORK-ENABLED DEVICES' [patent_app_type] => utility [patent_app_number] => 14/849027 [patent_app_country] => US [patent_app_date] => 2015-09-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8584 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14849027 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/849027
SYSTEMS AND METHODS FOR HARDWARE SECURITY MODULE AS CERTIFICATE AUTHORITY FOR NETWORK-ENABLED DEVICES Sep 8, 2015 Abandoned
Array ( [id] => 10473296 [patent_doc_number] => 20150358313 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-10 [patent_title] => 'SYSTEMS AND METHODS FOR SECURED COMMUNICATION HARDWARE SECURITY MODULE AND NETWORK-ENABLED DEVICES' [patent_app_type] => utility [patent_app_number] => 14/829233 [patent_app_country] => US [patent_app_date] => 2015-08-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8709 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14829233 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/829233
SYSTEMS AND METHODS FOR SECURED COMMUNICATION HARDWARE SECURITY MODULE AND NETWORK-ENABLED DEVICES Aug 17, 2015 Abandoned
Array ( [id] => 10564540 [patent_doc_number] => 09288224 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-03-15 [patent_title] => 'Assessing threat to at least one computer network' [patent_app_type] => utility [patent_app_number] => 14/827712 [patent_app_country] => US [patent_app_date] => 2015-08-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5556 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 178 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14827712 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/827712
Assessing threat to at least one computer network Aug 16, 2015 Issued
Array ( [id] => 13245191 [patent_doc_number] => 10135816 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-11-20 [patent_title] => Electronic device and method of transceiving data [patent_app_type] => utility [patent_app_number] => 14/812006 [patent_app_country] => US [patent_app_date] => 2015-07-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 15 [patent_no_of_words] => 18099 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 320 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14812006 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/812006
Electronic device and method of transceiving data Jul 28, 2015 Issued
Array ( [id] => 12101324 [patent_doc_number] => 09858420 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-01-02 [patent_title] => 'Transmission of trustworthy data' [patent_app_type] => utility [patent_app_number] => 14/810568 [patent_app_country] => US [patent_app_date] => 2015-07-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 9 [patent_no_of_words] => 6137 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 224 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14810568 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/810568
Transmission of trustworthy data Jul 27, 2015 Issued
Array ( [id] => 11426067 [patent_doc_number] => 20170034213 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-02-02 [patent_title] => 'Efficient Use of IPSEC Tunnels in Multi-Path Environment' [patent_app_type] => utility [patent_app_number] => 14/811695 [patent_app_country] => US [patent_app_date] => 2015-07-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 7441 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14811695 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/811695
Efficient use of IPsec tunnels in multi-path environment Jul 27, 2015 Issued
Array ( [id] => 12013615 [patent_doc_number] => 09806948 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-10-31 [patent_title] => 'Providing firewall rules for workload spread across multiple data centers' [patent_app_type] => utility [patent_app_number] => 14/811402 [patent_app_country] => US [patent_app_date] => 2015-07-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 10701 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 319 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14811402 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/811402
Providing firewall rules for workload spread across multiple data centers Jul 27, 2015 Issued
Array ( [id] => 10697878 [patent_doc_number] => 20160044025 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-11 [patent_title] => 'SYSTEM AND METHOD FOR SECURITY ENHANCEMENT' [patent_app_type] => utility [patent_app_number] => 14/809746 [patent_app_country] => US [patent_app_date] => 2015-07-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 9159 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14809746 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/809746
SYSTEM AND METHOD FOR SECURITY ENHANCEMENT Jul 26, 2015 Abandoned
Array ( [id] => 10709201 [patent_doc_number] => 20160055348 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-25 [patent_title] => 'DOUBLE KEY CODING METHODS OF PROVIDING FAST SEARCH, ANALYSIS, AND DATA RETRIEVAL OF ENCRYPTED DATA WITHOUT DECRYPTION' [patent_app_type] => utility [patent_app_number] => 14/810249 [patent_app_country] => US [patent_app_date] => 2015-07-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 12379 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14810249 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/810249
DOUBLE KEY CODING METHODS OF PROVIDING FAST SEARCH, ANALYSIS, AND DATA RETRIEVAL OF ENCRYPTED DATA WITHOUT DECRYPTION Jul 26, 2015 Abandoned
Array ( [id] => 11062958 [patent_doc_number] => 20160259920 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-09-08 [patent_title] => 'INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM' [patent_app_type] => utility [patent_app_number] => 14/809963 [patent_app_country] => US [patent_app_date] => 2015-07-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 6947 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14809963 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/809963
INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM Jul 26, 2015 Abandoned
Array ( [id] => 11405812 [patent_doc_number] => 20170026350 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-26 [patent_title] => 'SEARCHABLE ENCRYPTION ENABLING ENCRYPTED SEARCH BASED ON DOCUMENT TYPE' [patent_app_type] => utility [patent_app_number] => 14/808900 [patent_app_country] => US [patent_app_date] => 2015-07-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 12640 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14808900 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/808900
Searchable encryption enabling encrypted search based on document type Jul 23, 2015 Issued
Array ( [id] => 14179881 [patent_doc_number] => 10263968 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-04-16 [patent_title] => Security measure for exchanging keys over networks [patent_app_type] => utility [patent_app_number] => 14/808709 [patent_app_country] => US [patent_app_date] => 2015-07-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9474 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 260 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14808709 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/808709
Security measure for exchanging keys over networks Jul 23, 2015 Issued
Array ( [id] => 10447033 [patent_doc_number] => 20150332047 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-11-19 [patent_title] => 'COMPUTER PROTECTION AGAINST MALWARE AFFECTION' [patent_app_type] => utility [patent_app_number] => 14/807003 [patent_app_country] => US [patent_app_date] => 2015-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 14207 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14807003 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/807003
Computer protection against malware affection Jul 22, 2015 Issued
Array ( [id] => 10455060 [patent_doc_number] => 20150340075 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-11-26 [patent_title] => 'PORTABLE ELECTRONIC DEVICE, PROGRAM, TERMINAL DEVICE AND METHOD OF CONTROLLING DECODING OF DATA' [patent_app_type] => utility [patent_app_number] => 14/717029 [patent_app_country] => US [patent_app_date] => 2015-05-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 16908 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14717029 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/717029
PORTABLE ELECTRONIC DEVICE, PROGRAM, TERMINAL DEVICE AND METHOD OF CONTROLLING DECODING OF DATA May 19, 2015 Abandoned
Array ( [id] => 11294611 [patent_doc_number] => 20160344543 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-11-24 [patent_title] => 'SECURITY SYSTEM FORMING PART OF A BITCOIN HOST COMPUTER' [patent_app_type] => utility [patent_app_number] => 14/716100 [patent_app_country] => US [patent_app_date] => 2015-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6429 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14716100 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/716100
Key ceremony of a security system forming part of a host computer for cryptographic transactions May 18, 2015 Issued
Array ( [id] => 13083571 [patent_doc_number] => 10061852 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-08-28 [patent_title] => Transparent proxy tunnel caching for database access [patent_app_type] => utility [patent_app_number] => 14/716690 [patent_app_country] => US [patent_app_date] => 2015-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 11183 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 183 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14716690 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/716690
Transparent proxy tunnel caching for database access May 18, 2015 Issued
Array ( [id] => 12399057 [patent_doc_number] => 09967279 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-05-08 [patent_title] => System and method thereof for creating programmable security decision engines in a cyber-security system [patent_app_type] => utility [patent_app_number] => 14/716359 [patent_app_country] => US [patent_app_date] => 2015-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 10642 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 310 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14716359 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/716359
System and method thereof for creating programmable security decision engines in a cyber-security system May 18, 2015 Issued
Array ( [id] => 10494231 [patent_doc_number] => 20150379253 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-31 [patent_title] => 'User Identity Authentication Techniques for On-Line Content or Access' [patent_app_type] => utility [patent_app_number] => 14/716591 [patent_app_country] => US [patent_app_date] => 2015-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 11262 [patent_no_of_claims] => 42 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14716591 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/716591
User identity authentication techniques for on-line content or access May 18, 2015 Issued
Array ( [id] => 16503257 [patent_doc_number] => 10868665 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-12-15 [patent_title] => Mitigating timing side-channel attacks by obscuring accesses to sensitive data [patent_app_type] => utility [patent_app_number] => 14/715345 [patent_app_country] => US [patent_app_date] => 2015-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 16 [patent_no_of_words] => 16302 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 192 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14715345 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/715345
Mitigating timing side-channel attacks by obscuring accesses to sensitive data May 17, 2015 Issued
Menu