Eric Frank Winakur
Examiner (ID: 5668, Phone: (571)272-4736 , Office: P/3777 )
Most Active Art Unit | 3736 |
Art Unit(s) | 3791, 2899, 3768, 3311, 3736, 3735, 3777 |
Total Applications | 2379 |
Issued Applications | 1756 |
Pending Applications | 294 |
Abandoned Applications | 329 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 15793961
[patent_doc_number] => 10630717
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-21
[patent_title] => Mitigation of WebRTC attacks using a network edge system
[patent_app_type] => utility
[patent_app_number] => 14/713644
[patent_app_country] => US
[patent_app_date] => 2015-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 5463
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14713644
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/713644 | Mitigation of WebRTC attacks using a network edge system | May 14, 2015 | Issued |
Array
(
[id] => 16309844
[patent_doc_number] => 10778664
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-09-15
[patent_title] => Software asset management of computer systems and virtual instances for reporting and optimization
[patent_app_type] => utility
[patent_app_number] => 14/712877
[patent_app_country] => US
[patent_app_date] => 2015-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 16403
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14712877
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/712877 | Software asset management of computer systems and virtual instances for reporting and optimization | May 13, 2015 | Issued |
Array
(
[id] => 10357593
[patent_doc_number] => 20150242598
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'System and Method for Preventing Unauthorized Use of Digital Media'
[patent_app_type] => utility
[patent_app_number] => 14/709291
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5219
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 13
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14709291
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/709291 | System and method for preventing unauthorized use of digital media | May 10, 2015 | Issued |
Array
(
[id] => 10372003
[patent_doc_number] => 20150257009
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-10
[patent_title] => 'KEY ASSIGNMENT FOR A BRAND'
[patent_app_type] => utility
[patent_app_number] => 14/692485
[patent_app_country] => US
[patent_app_date] => 2015-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4546
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14692485
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/692485 | Key assignment for a brand | Apr 20, 2015 | Issued |
Array
(
[id] => 11266827
[patent_doc_number] => 09491142
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-08
[patent_title] => 'Malware analysis system'
[patent_app_type] => utility
[patent_app_number] => 14/692587
[patent_app_country] => US
[patent_app_date] => 2015-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 7508
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 319
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14692587
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/692587 | Malware analysis system | Apr 20, 2015 | Issued |
Array
(
[id] => 10409114
[patent_doc_number] => 20150294123
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-15
[patent_title] => 'SYSTEM AND METHOD FOR SHARING DATA SECURELY'
[patent_app_type] => utility
[patent_app_number] => 14/683924
[patent_app_country] => US
[patent_app_date] => 2015-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 18047
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14683924
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/683924 | SYSTEM AND METHOD FOR SHARING DATA SECURELY | Apr 9, 2015 | Abandoned |
Array
(
[id] => 13767429
[patent_doc_number] => 10176056
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-08
[patent_title] => Systems and methods for quorum-based data recovery
[patent_app_type] => utility
[patent_app_number] => 14/683379
[patent_app_country] => US
[patent_app_date] => 2015-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 22
[patent_no_of_words] => 18574
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 271
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14683379
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/683379 | Systems and methods for quorum-based data recovery | Apr 9, 2015 | Issued |
Array
(
[id] => 11702819
[patent_doc_number] => 09692758
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-27
[patent_title] => 'Authentication techniques utilizing a computing device'
[patent_app_type] => utility
[patent_app_number] => 14/680299
[patent_app_country] => US
[patent_app_date] => 2015-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13831
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 301
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14680299
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/680299 | Authentication techniques utilizing a computing device | Apr 6, 2015 | Issued |
Array
(
[id] => 13101023
[patent_doc_number] => 10069864
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-04
[patent_title] => Method and system for using smart images
[patent_app_type] => utility
[patent_app_number] => 14/663555
[patent_app_country] => US
[patent_app_date] => 2015-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11223
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14663555
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/663555 | Method and system for using smart images | Mar 19, 2015 | Issued |
Array
(
[id] => 14674555
[patent_doc_number] => 10375210
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-06
[patent_title] => Method and architecture for accessing digitally protected web content
[patent_app_type] => utility
[patent_app_number] => 14/662911
[patent_app_country] => US
[patent_app_date] => 2015-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3488
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 240
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14662911
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/662911 | Method and architecture for accessing digitally protected web content | Mar 18, 2015 | Issued |
Array
(
[id] => 11029937
[patent_doc_number] => 20160226893
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-04
[patent_title] => 'METHODS FOR OPTIMIZING AN AUTOMATED DETERMINATION IN REAL-TIME OF A RISK RATING OF CYBER-ATTACK AND DEVICES THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/661029
[patent_app_country] => US
[patent_app_date] => 2015-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8002
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14661029
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/661029 | METHODS FOR OPTIMIZING AN AUTOMATED DETERMINATION IN REAL-TIME OF A RISK RATING OF CYBER-ATTACK AND DEVICES THEREOF | Mar 17, 2015 | Abandoned |
Array
(
[id] => 10473277
[patent_doc_number] => 20150358294
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-10
[patent_title] => 'SYSTEMS AND METHODS FOR SECURED HARDWARE SECURITY MODULE COMMUNICATION WITH WEB SERVICE HOSTS'
[patent_app_type] => utility
[patent_app_number] => 14/662012
[patent_app_country] => US
[patent_app_date] => 2015-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8535
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14662012
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/662012 | SYSTEMS AND METHODS FOR SECURED HARDWARE SECURITY MODULE COMMUNICATION WITH WEB SERVICE HOSTS | Mar 17, 2015 | Abandoned |
Array
(
[id] => 11644318
[patent_doc_number] => 09665697
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-30
[patent_title] => 'Selectively blocking content on electronic displays'
[patent_app_type] => utility
[patent_app_number] => 14/660068
[patent_app_country] => US
[patent_app_date] => 2015-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 8682
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14660068
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/660068 | Selectively blocking content on electronic displays | Mar 16, 2015 | Issued |
Array
(
[id] => 11080456
[patent_doc_number] => 20160277420
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-22
[patent_title] => 'FILE AND BIT LOCATION AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/658526
[patent_app_country] => US
[patent_app_date] => 2015-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6681
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14658526
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/658526 | File and bit location authentication | Mar 15, 2015 | Issued |
Array
(
[id] => 11072405
[patent_doc_number] => 20160269369
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-15
[patent_title] => 'ENABLING TRANSMISSION ENCRYPTION'
[patent_app_type] => utility
[patent_app_number] => 14/891235
[patent_app_country] => US
[patent_app_date] => 2015-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5849
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14891235
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/891235 | Enabling transmission encryption | Mar 8, 2015 | Issued |
Array
(
[id] => 11891997
[patent_doc_number] => 09762570
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-12
[patent_title] => 'Information processing system, information processing method and computer readable recording medium stored a program'
[patent_app_type] => utility
[patent_app_number] => 14/640614
[patent_app_country] => US
[patent_app_date] => 2015-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 23474
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 297
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14640614
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/640614 | Information processing system, information processing method and computer readable recording medium stored a program | Mar 5, 2015 | Issued |
Array
(
[id] => 11897324
[patent_doc_number] => 09767261
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-19
[patent_title] => 'Implementing extent granularity authorization initialization processing in CAPI adapters'
[patent_app_type] => utility
[patent_app_number] => 14/628507
[patent_app_country] => US
[patent_app_date] => 2015-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 3963
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 348
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14628507
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/628507 | Implementing extent granularity authorization initialization processing in CAPI adapters | Feb 22, 2015 | Issued |
Array
(
[id] => 10295673
[patent_doc_number] => 20150180661
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-25
[patent_title] => 'RE-ENCRYPTION KEY GENERATOR, RE-ENCRYPTION DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, AND PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 14/615561
[patent_app_country] => US
[patent_app_date] => 2015-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 71562
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 14
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14615561
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/615561 | Re-encryption key generator, re-encryption device, encryption device, decryption device, and program | Feb 5, 2015 | Issued |
Array
(
[id] => 10315913
[patent_doc_number] => 20150200916
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-16
[patent_title] => 'Information Administration System'
[patent_app_type] => utility
[patent_app_number] => 14/603916
[patent_app_country] => US
[patent_app_date] => 2015-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 8721
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14603916
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/603916 | Information administration system | Jan 22, 2015 | Issued |
Array
(
[id] => 12055279
[patent_doc_number] => 20170331622
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-16
[patent_title] => 'CRYPTOGRAPHIC SYSTEM, MASTER KEY UPDATE APPARATUS, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING MASTER KEY UPDATE PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 15/523195
[patent_app_country] => US
[patent_app_date] => 2014-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 9050
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15523195
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/523195 | Cryptographic system, master key update apparatus, and non-transitory computer-readable recording medium storing master key update program | Dec 4, 2014 | Issued |