Eric Frank Winakur
Examiner (ID: 5668, Phone: (571)272-4736 , Office: P/3777 )
Most Active Art Unit | 3736 |
Art Unit(s) | 3791, 2899, 3768, 3311, 3736, 3735, 3777 |
Total Applications | 2379 |
Issued Applications | 1756 |
Pending Applications | 294 |
Abandoned Applications | 329 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 5529222
[patent_doc_number] => 20090199299
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-08-06
[patent_title] => 'INTEGRATED USER EXPERIENCE WHILE ALLOCATING LICENSES WITHIN VOLUME LICENSING SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 12/024099
[patent_app_country] => US
[patent_app_date] => 2008-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7249
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0199/20090199299.pdf
[firstpage_image] =>[orig_patent_app_number] => 12024099
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/024099 | INTEGRATED USER EXPERIENCE WHILE ALLOCATING LICENSES WITHIN VOLUME LICENSING SYSTEMS | Jan 30, 2008 | Abandoned |
Array
(
[id] => 5529200
[patent_doc_number] => 20090199277
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-08-06
[patent_title] => 'CREDENTIAL ARRANGEMENT IN SINGLE-SIGN-ON ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 12/023401
[patent_app_country] => US
[patent_app_date] => 2008-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4050
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0199/20090199277.pdf
[firstpage_image] =>[orig_patent_app_number] => 12023401
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/023401 | CREDENTIAL ARRANGEMENT IN SINGLE-SIGN-ON ENVIRONMENT | Jan 30, 2008 | Abandoned |
Array
(
[id] => 5529187
[patent_doc_number] => 20090199264
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-08-06
[patent_title] => 'DYNAMIC TRUST MODEL FOR AUTHENTICATING A USER'
[patent_app_type] => utility
[patent_app_number] => 12/023848
[patent_app_country] => US
[patent_app_date] => 2008-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6330
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0199/20090199264.pdf
[firstpage_image] =>[orig_patent_app_number] => 12023848
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/023848 | Dynamic trust model for authenticating a user | Jan 30, 2008 | Issued |
Array
(
[id] => 5560061
[patent_doc_number] => 20090271638
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-10-29
[patent_title] => 'Storage system with an encryption function'
[patent_app_type] => utility
[patent_app_number] => 12/007876
[patent_app_country] => US
[patent_app_date] => 2008-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9144
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0271/20090271638.pdf
[firstpage_image] =>[orig_patent_app_number] => 12007876
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/007876 | Storage system with an encryption function | Jan 15, 2008 | Abandoned |
Array
(
[id] => 7569256
[patent_doc_number] => 20110289319
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-24
[patent_title] => 'METHOD FOR AUTHENTICATING KEY INFORMATION BETWEEN TERMINALS OF A COMMUNICATION LINK'
[patent_app_type] => utility
[patent_app_number] => 12/810896
[patent_app_country] => US
[patent_app_date] => 2008-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2895
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0289/20110289319.pdf
[firstpage_image] =>[orig_patent_app_number] => 12810896
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/810896 | Method for authenticating key information between terminals of a communication link | Jan 6, 2008 | Issued |
Array
(
[id] => 5437824
[patent_doc_number] => 20090172411
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-07-02
[patent_title] => 'Protecting the security of secure data sent from a central processor for processing by a further processing device'
[patent_app_type] => utility
[patent_app_number] => 12/003858
[patent_app_country] => US
[patent_app_date] => 2008-01-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7167
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0172/20090172411.pdf
[firstpage_image] =>[orig_patent_app_number] => 12003858
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/003858 | Protecting the security of secure data sent from a central processor for processing by a further processing device | Jan 1, 2008 | Issued |
Array
(
[id] => 6637268
[patent_doc_number] => 20100325731
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-12-23
[patent_title] => 'ASSESSING THREAT TO AT LEAST ONE COMPUTER NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/811208
[patent_app_country] => US
[patent_app_date] => 2007-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5519
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0325/20100325731.pdf
[firstpage_image] =>[orig_patent_app_number] => 12811208
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/811208 | Assessing threat to at least one computer network | Dec 30, 2007 | Issued |
Array
(
[id] => 4751635
[patent_doc_number] => 20080159708
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-07-03
[patent_title] => 'Video Contents Display Apparatus, Video Contents Display Method, and Program Therefor'
[patent_app_type] => utility
[patent_app_number] => 11/964277
[patent_app_country] => US
[patent_app_date] => 2007-12-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 45
[patent_figures_cnt] => 45
[patent_no_of_words] => 30995
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0159/20080159708.pdf
[firstpage_image] =>[orig_patent_app_number] => 11964277
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/964277 | Video Contents Display Apparatus, Video Contents Display Method, and Program Therefor | Dec 25, 2007 | Abandoned |
Array
(
[id] => 10557796
[patent_doc_number] => 09282005
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-08
[patent_title] => 'IT infrastructure policy breach investigation interface'
[patent_app_type] => utility
[patent_app_number] => 11/933586
[patent_app_country] => US
[patent_app_date] => 2007-11-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 6788
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 206
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11933586
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/933586 | IT infrastructure policy breach investigation interface | Oct 31, 2007 | Issued |
Array
(
[id] => 4706643
[patent_doc_number] => 20080066167
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-03-13
[patent_title] => 'PASSWORD BASED ACCESS INCLUDING ERROR ALLOWANCE'
[patent_app_type] => utility
[patent_app_number] => 11/852921
[patent_app_country] => US
[patent_app_date] => 2007-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 18353
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0066/20080066167.pdf
[firstpage_image] =>[orig_patent_app_number] => 11852921
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/852921 | PASSWORD BASED ACCESS INCLUDING ERROR ALLOWANCE | Sep 9, 2007 | Abandoned |
Array
(
[id] => 5454544
[patent_doc_number] => 20090070581
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-03-12
[patent_title] => 'SYSTEM AND METHOD FOR CENTRALIZED USER IDENTIFICATION FOR NETWORKED DOCUMENT PROCESSING DEVICES'
[patent_app_type] => utility
[patent_app_number] => 11/851144
[patent_app_country] => US
[patent_app_date] => 2007-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6806
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0070/20090070581.pdf
[firstpage_image] =>[orig_patent_app_number] => 11851144
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/851144 | SYSTEM AND METHOD FOR CENTRALIZED USER IDENTIFICATION FOR NETWORKED DOCUMENT PROCESSING DEVICES | Sep 5, 2007 | Abandoned |
Array
(
[id] => 5454832
[patent_doc_number] => 20090070869
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-03-12
[patent_title] => 'PROXY ENGINE FOR CUSTOM HANDLING OF WEB CONTENT'
[patent_app_type] => utility
[patent_app_number] => 11/851303
[patent_app_country] => US
[patent_app_date] => 2007-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5307
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0070/20090070869.pdf
[firstpage_image] =>[orig_patent_app_number] => 11851303
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/851303 | Proxy engine for custom handling of web content | Sep 5, 2007 | Issued |
Array
(
[id] => 5326347
[patent_doc_number] => 20090064337
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-03-05
[patent_title] => 'METHOD AND APPARATUS FOR PREVENTING WEB PAGE ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 11/850036
[patent_app_country] => US
[patent_app_date] => 2007-09-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 3703
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0064/20090064337.pdf
[firstpage_image] =>[orig_patent_app_number] => 11850036
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/850036 | METHOD AND APPARATUS FOR PREVENTING WEB PAGE ATTACKS | Sep 4, 2007 | Abandoned |
Array
(
[id] => 4831169
[patent_doc_number] => 20080127348
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-05-29
[patent_title] => 'NETWORK COMPUTER SYSTEM AND METHOD USING THIN USER CLIENT AND VIRTUAL MACHINE TO PROVIDE IMMUNITY TO HACKING, VIRUSES AND SPY WARE'
[patent_app_type] => utility
[patent_app_number] => 11/848097
[patent_app_country] => US
[patent_app_date] => 2007-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11248
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0127/20080127348.pdf
[firstpage_image] =>[orig_patent_app_number] => 11848097
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/848097 | NETWORK COMPUTER SYSTEM AND METHOD USING THIN USER CLIENT AND VIRTUAL MACHINE TO PROVIDE IMMUNITY TO HACKING, VIRUSES AND SPY WARE | Aug 29, 2007 | Abandoned |
Array
(
[id] => 8935642
[patent_doc_number] => 08495360
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-23
[patent_title] => 'Method and arrangement for providing a wireless mesh network'
[patent_app_type] => utility
[patent_app_number] => 12/223203
[patent_app_country] => US
[patent_app_date] => 2007-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4869
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 308
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12223203
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/223203 | Method and arrangement for providing a wireless mesh network | Jul 31, 2007 | Issued |
Array
(
[id] => 5298479
[patent_doc_number] => 20090013405
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-01-08
[patent_title] => 'Heuristic detection of malicious code'
[patent_app_type] => utility
[patent_app_number] => 11/822534
[patent_app_country] => US
[patent_app_date] => 2007-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8113
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0013/20090013405.pdf
[firstpage_image] =>[orig_patent_app_number] => 11822534
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/822534 | Heuristic detection of malicious code | Jul 5, 2007 | Abandoned |
Array
(
[id] => 5047583
[patent_doc_number] => 20070266257
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-15
[patent_title] => 'System and method for blocking unauthorized network log in using stolen password'
[patent_app_type] => utility
[patent_app_number] => 11/824694
[patent_app_country] => US
[patent_app_date] => 2007-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7333
[patent_no_of_claims] => 38
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0266/20070266257.pdf
[firstpage_image] =>[orig_patent_app_number] => 11824694
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/824694 | System and method for blocking unauthorized network log in using stolen password | Jul 1, 2007 | Issued |
Array
(
[id] => 5004128
[patent_doc_number] => 20070201696
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-08-30
[patent_title] => 'PROFILE ACQUIRING METHOD, APPARATUS, PROGRAM, AND STORAGE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 11/741829
[patent_app_country] => US
[patent_app_date] => 2007-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7424
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0201/20070201696.pdf
[firstpage_image] =>[orig_patent_app_number] => 11741829
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/741829 | PROFILE ACQUIRING METHOD, APPARATUS, PROGRAM, AND STORAGE MEDIUM | Apr 29, 2007 | Abandoned |
Array
(
[id] => 5176681
[patent_doc_number] => 20070177740
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-08-02
[patent_title] => 'ENCRYPTION KEY DISTRIBUTION SYSTEM, KEY DISTRIBUTION SERVER, LOCKING TERMINAL, VIEWING TERMINAL, ENCRYPTION KEY DISTRIBUTION METHOD, AND COMPUTER-READABLE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 11/697200
[patent_app_country] => US
[patent_app_date] => 2007-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 14481
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0177/20070177740.pdf
[firstpage_image] =>[orig_patent_app_number] => 11697200
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/697200 | ENCRYPTION KEY DISTRIBUTION SYSTEM, KEY DISTRIBUTION SERVER, LOCKING TERMINAL, VIEWING TERMINAL, ENCRYPTION KEY DISTRIBUTION METHOD, AND COMPUTER-READABLE MEDIUM | Apr 4, 2007 | Abandoned |
Array
(
[id] => 4742119
[patent_doc_number] => 20080235772
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-09-25
[patent_title] => 'Iterated password hash systems and methods for preserving password entropy'
[patent_app_type] => utility
[patent_app_number] => 11/723997
[patent_app_country] => US
[patent_app_date] => 2007-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4271
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20080235772.pdf
[firstpage_image] =>[orig_patent_app_number] => 11723997
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/723997 | Iterated password hash systems and methods for preserving password entropy | Mar 22, 2007 | Issued |