Eric Frank Winakur
Examiner (ID: 5668, Phone: (571)272-4736 , Office: P/3777 )
Most Active Art Unit | 3736 |
Art Unit(s) | 3791, 2899, 3768, 3311, 3736, 3735, 3777 |
Total Applications | 2379 |
Issued Applications | 1756 |
Pending Applications | 294 |
Abandoned Applications | 329 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 9974527
[patent_doc_number] => 09021565
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-28
[patent_title] => 'Authentication techniques utilizing a computing device'
[patent_app_type] => utility
[patent_app_number] => 13/272926
[patent_app_country] => US
[patent_app_date] => 2011-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13792
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13272926
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/272926 | Authentication techniques utilizing a computing device | Oct 12, 2011 | Issued |
Array
(
[id] => 9848005
[patent_doc_number] => 08949940
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-02-03
[patent_title] => 'Aggregating data from multiple issuers and automatically organizing the data'
[patent_app_type] => utility
[patent_app_number] => 13/271901
[patent_app_country] => US
[patent_app_date] => 2011-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11792
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 453
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13271901
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/271901 | Aggregating data from multiple issuers and automatically organizing the data | Oct 11, 2011 | Issued |
Array
(
[id] => 8280347
[patent_doc_number] => 20120174221
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-07-05
[patent_title] => 'Apparatus and method for blocking zombie behavior process'
[patent_app_type] => utility
[patent_app_number] => 13/136725
[patent_app_country] => US
[patent_app_date] => 2011-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5085
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13136725
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/136725 | Apparatus and method for blocking zombie behavior process | Aug 8, 2011 | Issued |
Array
(
[id] => 7775500
[patent_doc_number] => 20120039462
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-16
[patent_title] => 'RSA SIGNATURE METHOD AND APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 13/196214
[patent_app_country] => US
[patent_app_date] => 2011-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2541
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0039/20120039462.pdf
[firstpage_image] =>[orig_patent_app_number] => 13196214
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/196214 | RSA SIGNATURE METHOD AND APPARATUS | Aug 1, 2011 | Abandoned |
Array
(
[id] => 8639831
[patent_doc_number] => 20130031634
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-31
[patent_title] => 'SYSTEM AND METHOD FOR NETWORK-BASED ASSET OPERATIONAL DEPENDENCE SCORING'
[patent_app_type] => utility
[patent_app_number] => 13/192214
[patent_app_country] => US
[patent_app_date] => 2011-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7227
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13192214
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/192214 | System and method for network-based asset operational dependence scoring | Jul 26, 2011 | Issued |
Array
(
[id] => 9257797
[patent_doc_number] => 08621238
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-12-31
[patent_title] => 'Using software-based decision procedures to control instruction-level execution'
[patent_app_type] => utility
[patent_app_number] => 13/190520
[patent_app_country] => US
[patent_app_date] => 2011-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 10
[patent_no_of_words] => 4655
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13190520
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/190520 | Using software-based decision procedures to control instruction-level execution | Jul 25, 2011 | Issued |
Array
(
[id] => 8619595
[patent_doc_number] => 20130024907
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-24
[patent_title] => 'INTEGRATING SUDO RULES WITH ENTITIES REPRESENTED IN AN LDAP DIRECTORY'
[patent_app_type] => utility
[patent_app_number] => 13/187455
[patent_app_country] => US
[patent_app_date] => 2011-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6005
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13187455
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/187455 | Integrating sudo rules with entities represented in an LDAP directory | Jul 19, 2011 | Issued |
Array
(
[id] => 10028360
[patent_doc_number] => 09070264
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-30
[patent_title] => 'Detecting a security breach of an electronic device'
[patent_app_type] => utility
[patent_app_number] => 13/186142
[patent_app_country] => US
[patent_app_date] => 2011-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5522
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13186142
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/186142 | Detecting a security breach of an electronic device | Jul 18, 2011 | Issued |
Array
(
[id] => 13120803
[patent_doc_number] => 10078755
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-18
[patent_title] => Private and public applications
[patent_app_type] => utility
[patent_app_number] => 13/118040
[patent_app_country] => US
[patent_app_date] => 2011-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8636
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 292
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13118040
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/118040 | Private and public applications | May 26, 2011 | Issued |
Array
(
[id] => 8504876
[patent_doc_number] => 20120304283
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-29
[patent_title] => 'BROKERED ITEM ACCESS FOR ISOLATED APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 13/118158
[patent_app_country] => US
[patent_app_date] => 2011-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10825
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13118158
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/118158 | BROKERED ITEM ACCESS FOR ISOLATED APPLICATIONS | May 26, 2011 | Abandoned |
Array
(
[id] => 11320938
[patent_doc_number] => 09519682
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-12-13
[patent_title] => 'User trustworthiness'
[patent_app_type] => utility
[patent_app_number] => 13/117037
[patent_app_country] => US
[patent_app_date] => 2011-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12022
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 446
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13117037
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/117037 | User trustworthiness | May 25, 2011 | Issued |
Array
(
[id] => 12400014
[patent_doc_number] => 09967600
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-08
[patent_title] => Multi-channel digital content watermark system and method
[patent_app_type] => utility
[patent_app_number] => 13/116703
[patent_app_country] => US
[patent_app_date] => 2011-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 10
[patent_no_of_words] => 4216
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13116703
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/116703 | Multi-channel digital content watermark system and method | May 25, 2011 | Issued |
Array
(
[id] => 8504836
[patent_doc_number] => 20120304244
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-29
[patent_title] => 'MALWARE ANALYSIS SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/115032
[patent_app_country] => US
[patent_app_date] => 2011-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7469
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13115032
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/115032 | Malware analysis system | May 23, 2011 | Issued |
Array
(
[id] => 7493589
[patent_doc_number] => 20110239274
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-29
[patent_title] => 'Methods for acouiring an internet user\'s consent to be located and for authenticating the identity of the user using location information'
[patent_app_type] => utility
[patent_app_number] => 13/065691
[patent_app_country] => US
[patent_app_date] => 2011-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8581
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0239/20110239274.pdf
[firstpage_image] =>[orig_patent_app_number] => 13065691
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/065691 | Methods for acquiring an internet user's consent to be located and for authenticating the identity of the user using location information | Mar 27, 2011 | Issued |
Array
(
[id] => 8455294
[patent_doc_number] => 20120266240
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-18
[patent_title] => 'Method and apparatus for filtering malicious call completion indicator and calling-side network device'
[patent_app_type] => utility
[patent_app_number] => 13/258390
[patent_app_country] => US
[patent_app_date] => 2011-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3214
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13258390
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/258390 | Method and apparatus for filtering malicious call completion indicator and calling-side network device | Jan 17, 2011 | Abandoned |
Array
(
[id] => 8183238
[patent_doc_number] => 20120114119
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-10
[patent_title] => 'SYSTEM AND METHOD FOR PROTECTING SPECIFIED DATA COMBINATIONS'
[patent_app_type] => utility
[patent_app_number] => 12/939340
[patent_app_country] => US
[patent_app_date] => 2010-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 16404
[patent_no_of_claims] => 50
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0114/20120114119.pdf
[firstpage_image] =>[orig_patent_app_number] => 12939340
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/939340 | System and method for protecting specified data combinations | Nov 3, 2010 | Issued |
Array
(
[id] => 8170267
[patent_doc_number] => 20120106739
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-03
[patent_title] => 'System and Method for Securing Wireless Communications'
[patent_app_type] => utility
[patent_app_number] => 12/938841
[patent_app_country] => US
[patent_app_date] => 2010-11-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 10546
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0106/20120106739.pdf
[firstpage_image] =>[orig_patent_app_number] => 12938841
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/938841 | System and method for securing wireless communications | Nov 2, 2010 | Issued |
Array
(
[id] => 7746887
[patent_doc_number] => 20120023334
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-01-26
[patent_title] => 'METHODS FOR ANONYMOUS AUTHENTICATION AND KEY AGREEMENT'
[patent_app_type] => utility
[patent_app_number] => 12/913708
[patent_app_country] => US
[patent_app_date] => 2010-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6579
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0023/20120023334.pdf
[firstpage_image] =>[orig_patent_app_number] => 12913708
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/913708 | Methods for anonymous authentication and key agreement | Oct 26, 2010 | Issued |
Array
(
[id] => 8162936
[patent_doc_number] => 20120102561
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-26
[patent_title] => 'TOKEN-BASED RESERVATIONS FOR SCSI ARCHITECTURES'
[patent_app_type] => utility
[patent_app_number] => 12/912695
[patent_app_country] => US
[patent_app_date] => 2010-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4569
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0102/20120102561.pdf
[firstpage_image] =>[orig_patent_app_number] => 12912695
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/912695 | TOKEN-BASED RESERVATIONS FOR SCSI ARCHITECTURES | Oct 25, 2010 | Abandoned |
Array
(
[id] => 8162931
[patent_doc_number] => 20120102552
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-26
[patent_title] => 'USING AN IMAGE TO PROVIDE CREDENTIALS FOR SERVICE ACCESS'
[patent_app_type] => utility
[patent_app_number] => 12/912453
[patent_app_country] => US
[patent_app_date] => 2010-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5246
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0102/20120102552.pdf
[firstpage_image] =>[orig_patent_app_number] => 12912453
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/912453 | Using an image to provide credentials for service access | Oct 25, 2010 | Issued |