Search

Eric Frank Winakur

Examiner (ID: 5668, Phone: (571)272-4736 , Office: P/3777 )

Most Active Art Unit
3736
Art Unit(s)
3791, 2899, 3768, 3311, 3736, 3735, 3777
Total Applications
2379
Issued Applications
1756
Pending Applications
294
Abandoned Applications
329

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 5529222 [patent_doc_number] => 20090199299 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-08-06 [patent_title] => 'INTEGRATED USER EXPERIENCE WHILE ALLOCATING LICENSES WITHIN VOLUME LICENSING SYSTEMS' [patent_app_type] => utility [patent_app_number] => 12/024099 [patent_app_country] => US [patent_app_date] => 2008-01-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 7249 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0199/20090199299.pdf [firstpage_image] =>[orig_patent_app_number] => 12024099 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/024099
INTEGRATED USER EXPERIENCE WHILE ALLOCATING LICENSES WITHIN VOLUME LICENSING SYSTEMS Jan 30, 2008 Abandoned
Array ( [id] => 5529200 [patent_doc_number] => 20090199277 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-08-06 [patent_title] => 'CREDENTIAL ARRANGEMENT IN SINGLE-SIGN-ON ENVIRONMENT' [patent_app_type] => utility [patent_app_number] => 12/023401 [patent_app_country] => US [patent_app_date] => 2008-01-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4050 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0199/20090199277.pdf [firstpage_image] =>[orig_patent_app_number] => 12023401 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/023401
CREDENTIAL ARRANGEMENT IN SINGLE-SIGN-ON ENVIRONMENT Jan 30, 2008 Abandoned
Array ( [id] => 5529187 [patent_doc_number] => 20090199264 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-08-06 [patent_title] => 'DYNAMIC TRUST MODEL FOR AUTHENTICATING A USER' [patent_app_type] => utility [patent_app_number] => 12/023848 [patent_app_country] => US [patent_app_date] => 2008-01-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6330 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0199/20090199264.pdf [firstpage_image] =>[orig_patent_app_number] => 12023848 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/023848
Dynamic trust model for authenticating a user Jan 30, 2008 Issued
Array ( [id] => 5560061 [patent_doc_number] => 20090271638 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-10-29 [patent_title] => 'Storage system with an encryption function' [patent_app_type] => utility [patent_app_number] => 12/007876 [patent_app_country] => US [patent_app_date] => 2008-01-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 9144 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0271/20090271638.pdf [firstpage_image] =>[orig_patent_app_number] => 12007876 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/007876
Storage system with an encryption function Jan 15, 2008 Abandoned
Array ( [id] => 7569256 [patent_doc_number] => 20110289319 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-11-24 [patent_title] => 'METHOD FOR AUTHENTICATING KEY INFORMATION BETWEEN TERMINALS OF A COMMUNICATION LINK' [patent_app_type] => utility [patent_app_number] => 12/810896 [patent_app_country] => US [patent_app_date] => 2008-01-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 2895 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0289/20110289319.pdf [firstpage_image] =>[orig_patent_app_number] => 12810896 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/810896
Method for authenticating key information between terminals of a communication link Jan 6, 2008 Issued
Array ( [id] => 5437824 [patent_doc_number] => 20090172411 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-07-02 [patent_title] => 'Protecting the security of secure data sent from a central processor for processing by a further processing device' [patent_app_type] => utility [patent_app_number] => 12/003858 [patent_app_country] => US [patent_app_date] => 2008-01-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 7167 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0172/20090172411.pdf [firstpage_image] =>[orig_patent_app_number] => 12003858 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/003858
Protecting the security of secure data sent from a central processor for processing by a further processing device Jan 1, 2008 Issued
Array ( [id] => 6637268 [patent_doc_number] => 20100325731 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-12-23 [patent_title] => 'ASSESSING THREAT TO AT LEAST ONE COMPUTER NETWORK' [patent_app_type] => utility [patent_app_number] => 12/811208 [patent_app_country] => US [patent_app_date] => 2007-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5519 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0325/20100325731.pdf [firstpage_image] =>[orig_patent_app_number] => 12811208 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/811208
Assessing threat to at least one computer network Dec 30, 2007 Issued
Array ( [id] => 4751635 [patent_doc_number] => 20080159708 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-07-03 [patent_title] => 'Video Contents Display Apparatus, Video Contents Display Method, and Program Therefor' [patent_app_type] => utility [patent_app_number] => 11/964277 [patent_app_country] => US [patent_app_date] => 2007-12-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 45 [patent_figures_cnt] => 45 [patent_no_of_words] => 30995 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0159/20080159708.pdf [firstpage_image] =>[orig_patent_app_number] => 11964277 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/964277
Video Contents Display Apparatus, Video Contents Display Method, and Program Therefor Dec 25, 2007 Abandoned
Array ( [id] => 10557796 [patent_doc_number] => 09282005 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-03-08 [patent_title] => 'IT infrastructure policy breach investigation interface' [patent_app_type] => utility [patent_app_number] => 11/933586 [patent_app_country] => US [patent_app_date] => 2007-11-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 6788 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 206 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11933586 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/933586
IT infrastructure policy breach investigation interface Oct 31, 2007 Issued
Array ( [id] => 4706643 [patent_doc_number] => 20080066167 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-03-13 [patent_title] => 'PASSWORD BASED ACCESS INCLUDING ERROR ALLOWANCE' [patent_app_type] => utility [patent_app_number] => 11/852921 [patent_app_country] => US [patent_app_date] => 2007-09-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 18353 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0066/20080066167.pdf [firstpage_image] =>[orig_patent_app_number] => 11852921 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/852921
PASSWORD BASED ACCESS INCLUDING ERROR ALLOWANCE Sep 9, 2007 Abandoned
Array ( [id] => 5454544 [patent_doc_number] => 20090070581 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-03-12 [patent_title] => 'SYSTEM AND METHOD FOR CENTRALIZED USER IDENTIFICATION FOR NETWORKED DOCUMENT PROCESSING DEVICES' [patent_app_type] => utility [patent_app_number] => 11/851144 [patent_app_country] => US [patent_app_date] => 2007-09-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6806 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0070/20090070581.pdf [firstpage_image] =>[orig_patent_app_number] => 11851144 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/851144
SYSTEM AND METHOD FOR CENTRALIZED USER IDENTIFICATION FOR NETWORKED DOCUMENT PROCESSING DEVICES Sep 5, 2007 Abandoned
Array ( [id] => 5454832 [patent_doc_number] => 20090070869 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-03-12 [patent_title] => 'PROXY ENGINE FOR CUSTOM HANDLING OF WEB CONTENT' [patent_app_type] => utility [patent_app_number] => 11/851303 [patent_app_country] => US [patent_app_date] => 2007-09-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5307 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0070/20090070869.pdf [firstpage_image] =>[orig_patent_app_number] => 11851303 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/851303
Proxy engine for custom handling of web content Sep 5, 2007 Issued
Array ( [id] => 5326347 [patent_doc_number] => 20090064337 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-03-05 [patent_title] => 'METHOD AND APPARATUS FOR PREVENTING WEB PAGE ATTACKS' [patent_app_type] => utility [patent_app_number] => 11/850036 [patent_app_country] => US [patent_app_date] => 2007-09-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 3703 [patent_no_of_claims] => 37 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0064/20090064337.pdf [firstpage_image] =>[orig_patent_app_number] => 11850036 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/850036
METHOD AND APPARATUS FOR PREVENTING WEB PAGE ATTACKS Sep 4, 2007 Abandoned
Array ( [id] => 4831169 [patent_doc_number] => 20080127348 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-05-29 [patent_title] => 'NETWORK COMPUTER SYSTEM AND METHOD USING THIN USER CLIENT AND VIRTUAL MACHINE TO PROVIDE IMMUNITY TO HACKING, VIRUSES AND SPY WARE' [patent_app_type] => utility [patent_app_number] => 11/848097 [patent_app_country] => US [patent_app_date] => 2007-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 11248 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 10 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0127/20080127348.pdf [firstpage_image] =>[orig_patent_app_number] => 11848097 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/848097
NETWORK COMPUTER SYSTEM AND METHOD USING THIN USER CLIENT AND VIRTUAL MACHINE TO PROVIDE IMMUNITY TO HACKING, VIRUSES AND SPY WARE Aug 29, 2007 Abandoned
Array ( [id] => 8935642 [patent_doc_number] => 08495360 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-07-23 [patent_title] => 'Method and arrangement for providing a wireless mesh network' [patent_app_type] => utility [patent_app_number] => 12/223203 [patent_app_country] => US [patent_app_date] => 2007-08-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4869 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 308 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12223203 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/223203
Method and arrangement for providing a wireless mesh network Jul 31, 2007 Issued
Array ( [id] => 5298479 [patent_doc_number] => 20090013405 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-08 [patent_title] => 'Heuristic detection of malicious code' [patent_app_type] => utility [patent_app_number] => 11/822534 [patent_app_country] => US [patent_app_date] => 2007-07-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 8113 [patent_no_of_claims] => 31 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0013/20090013405.pdf [firstpage_image] =>[orig_patent_app_number] => 11822534 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/822534
Heuristic detection of malicious code Jul 5, 2007 Abandoned
Array ( [id] => 5047583 [patent_doc_number] => 20070266257 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-11-15 [patent_title] => 'System and method for blocking unauthorized network log in using stolen password' [patent_app_type] => utility [patent_app_number] => 11/824694 [patent_app_country] => US [patent_app_date] => 2007-07-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7333 [patent_no_of_claims] => 38 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0266/20070266257.pdf [firstpage_image] =>[orig_patent_app_number] => 11824694 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/824694
System and method for blocking unauthorized network log in using stolen password Jul 1, 2007 Issued
Array ( [id] => 5004128 [patent_doc_number] => 20070201696 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-08-30 [patent_title] => 'PROFILE ACQUIRING METHOD, APPARATUS, PROGRAM, AND STORAGE MEDIUM' [patent_app_type] => utility [patent_app_number] => 11/741829 [patent_app_country] => US [patent_app_date] => 2007-04-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7424 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0201/20070201696.pdf [firstpage_image] =>[orig_patent_app_number] => 11741829 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/741829
PROFILE ACQUIRING METHOD, APPARATUS, PROGRAM, AND STORAGE MEDIUM Apr 29, 2007 Abandoned
Array ( [id] => 5176681 [patent_doc_number] => 20070177740 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-08-02 [patent_title] => 'ENCRYPTION KEY DISTRIBUTION SYSTEM, KEY DISTRIBUTION SERVER, LOCKING TERMINAL, VIEWING TERMINAL, ENCRYPTION KEY DISTRIBUTION METHOD, AND COMPUTER-READABLE MEDIUM' [patent_app_type] => utility [patent_app_number] => 11/697200 [patent_app_country] => US [patent_app_date] => 2007-04-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 14481 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 10 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0177/20070177740.pdf [firstpage_image] =>[orig_patent_app_number] => 11697200 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/697200
ENCRYPTION KEY DISTRIBUTION SYSTEM, KEY DISTRIBUTION SERVER, LOCKING TERMINAL, VIEWING TERMINAL, ENCRYPTION KEY DISTRIBUTION METHOD, AND COMPUTER-READABLE MEDIUM Apr 4, 2007 Abandoned
Array ( [id] => 4742119 [patent_doc_number] => 20080235772 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-09-25 [patent_title] => 'Iterated password hash systems and methods for preserving password entropy' [patent_app_type] => utility [patent_app_number] => 11/723997 [patent_app_country] => US [patent_app_date] => 2007-03-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4271 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0235/20080235772.pdf [firstpage_image] =>[orig_patent_app_number] => 11723997 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/723997
Iterated password hash systems and methods for preserving password entropy Mar 22, 2007 Issued
Menu