
George M. Dombroske
Examiner (ID: 54)
| Most Active Art Unit | 2855 |
| Art Unit(s) | 2605, 2214, 2616, 2855, IPLA |
| Total Applications | 714 |
| Issued Applications | 629 |
| Pending Applications | 43 |
| Abandoned Applications | 47 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 8715040
[patent_doc_number] => 08401185
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-03-19
[patent_title] => 'Systems and methods for securely deduplicating data owned by multiple entities'
[patent_app_type] => utility
[patent_app_number] => 12/697705
[patent_app_country] => US
[patent_app_date] => 2010-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8402
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12697705
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/697705 | Systems and methods for securely deduplicating data owned by multiple entities | Jan 31, 2010 | Issued |
Array
(
[id] => 8558457
[patent_doc_number] => 08332944
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-12-11
[patent_title] => 'System and method for detecting new malicious executables, based on discovering and monitoring characteristic system call sequences'
[patent_app_type] => utility
[patent_app_number] => 12/697559
[patent_app_country] => US
[patent_app_date] => 2010-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3595
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 461
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12697559
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/697559 | System and method for detecting new malicious executables, based on discovering and monitoring characteristic system call sequences | Jan 31, 2010 | Issued |
Array
(
[id] => 5997002
[patent_doc_number] => 20110016535
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-20
[patent_title] => 'COMPUTER READABLE MEDIUM STORING PROGRAM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD'
[patent_app_type] => utility
[patent_app_number] => 12/697319
[patent_app_country] => US
[patent_app_date] => 2010-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8678
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0016/20110016535.pdf
[firstpage_image] =>[orig_patent_app_number] => 12697319
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/697319 | Computer readable medium storing program, information processing apparatus, and information processing method for document security | Jan 31, 2010 | Issued |
Array
(
[id] => 11783216
[patent_doc_number] => 09392453
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'Authentication'
[patent_app_type] => utility
[patent_app_number] => 12/697496
[patent_app_country] => US
[patent_app_date] => 2010-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8463
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12697496
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/697496 | Authentication | Jan 31, 2010 | Issued |
Array
(
[id] => 6117658
[patent_doc_number] => 20110191852
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-08-04
[patent_title] => 'METHOD TO PERFORM A SECURITY ASSESSMENT ON A CLONE OF A VIRTUAL SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 12/697240
[patent_app_country] => US
[patent_app_date] => 2010-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1230
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0191/20110191852.pdf
[firstpage_image] =>[orig_patent_app_number] => 12697240
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/697240 | METHOD TO PERFORM A SECURITY ASSESSMENT ON A CLONE OF A VIRTUAL SYSTEM | Jan 29, 2010 | Abandoned |
Array
(
[id] => 6481914
[patent_doc_number] => 20100192201
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-29
[patent_title] => 'Method and Apparatus for Excessive Access Rate Detection'
[patent_app_type] => utility
[patent_app_number] => 12/697049
[patent_app_country] => US
[patent_app_date] => 2010-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 14251
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0192/20100192201.pdf
[firstpage_image] =>[orig_patent_app_number] => 12697049
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/697049 | Method and Apparatus for Excessive Access Rate Detection | Jan 28, 2010 | Abandoned |
Array
(
[id] => 6117670
[patent_doc_number] => 20110191863
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-08-04
[patent_title] => 'System and Method for Identifying Systems and Replacing Components'
[patent_app_type] => utility
[patent_app_number] => 12/697068
[patent_app_country] => US
[patent_app_date] => 2010-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 9416
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0191/20110191863.pdf
[firstpage_image] =>[orig_patent_app_number] => 12697068
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/697068 | System and method for identifying systems and replacing components | Jan 28, 2010 | Issued |
Array
(
[id] => 10005121
[patent_doc_number] => 09049227
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-02
[patent_title] => 'System and method for adapting an internet and intranet filtering system'
[patent_app_type] => utility
[patent_app_number] => 13/132607
[patent_app_country] => US
[patent_app_date] => 2009-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 3321
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13132607
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/132607 | System and method for adapting an internet and intranet filtering system | Dec 6, 2009 | Issued |
Array
(
[id] => 7493586
[patent_doc_number] => 20110239271
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-29
[patent_title] => 'TRUSTED NETWORK CONNECTION IMPLEMENTING METHOD BASED ON TRI-ELEMENT PEER AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 13/133333
[patent_app_country] => US
[patent_app_date] => 2009-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 14975
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0239/20110239271.pdf
[firstpage_image] =>[orig_patent_app_number] => 13133333
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/133333 | Trusted network connection implementing method based on tri-element peer authentication | Nov 30, 2009 | Issued |
Array
(
[id] => 7491092
[patent_doc_number] => 20110252456
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-10-13
[patent_title] => 'PERSONAL INFORMATION EXCHANGING SYSTEM, PERSONAL INFORMATION PROVIDING APPARATUS, DATA PROCESSING METHOD THEREFOR, AND COMPUTER PROGRAM THEREFOR'
[patent_app_type] => utility
[patent_app_number] => 13/133287
[patent_app_country] => US
[patent_app_date] => 2009-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 17709
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0252/20110252456.pdf
[firstpage_image] =>[orig_patent_app_number] => 13133287
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/133287 | PERSONAL INFORMATION EXCHANGING SYSTEM, PERSONAL INFORMATION PROVIDING APPARATUS, DATA PROCESSING METHOD THEREFOR, AND COMPUTER PROGRAM THEREFOR | Nov 30, 2009 | Abandoned |
Array
(
[id] => 8059931
[patent_doc_number] => 20110247058
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-10-06
[patent_title] => 'ON-DEMAND PERSONAL IDENTIFICATION METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/132377
[patent_app_country] => US
[patent_app_date] => 2009-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 10498
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0247/20110247058.pdf
[firstpage_image] =>[orig_patent_app_number] => 13132377
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/132377 | ON-DEMAND PERSONAL IDENTIFICATION METHOD | Nov 30, 2009 | Abandoned |
Array
(
[id] => 7512980
[patent_doc_number] => 20110258690
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-10-20
[patent_title] => 'SECURE HANDLING OF IDENTIFICATION TOKENS'
[patent_app_type] => utility
[patent_app_number] => 13/132931
[patent_app_country] => US
[patent_app_date] => 2009-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4235
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0258/20110258690.pdf
[firstpage_image] =>[orig_patent_app_number] => 13132931
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/132931 | SECURE HANDLING OF IDENTIFICATION TOKENS | Nov 28, 2009 | Abandoned |
Array
(
[id] => 7493662
[patent_doc_number] => 20110239309
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-29
[patent_title] => 'DATA DEPENDENCE ANALYZER, INFORMATION PROCESSOR, DATA DEPENDENCE ANALYSIS METHOD AND PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/132233
[patent_app_country] => US
[patent_app_date] => 2009-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 34
[patent_no_of_words] => 10256
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0239/20110239309.pdf
[firstpage_image] =>[orig_patent_app_number] => 13132233
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/132233 | Data dependence analyzer, information processor, data dependence analysis method and program | Nov 24, 2009 | Issued |
Array
(
[id] => 10046789
[patent_doc_number] => 09087188
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-21
[patent_title] => 'Providing authenticated anti-virus agents a direct access to scan memory'
[patent_app_type] => utility
[patent_app_number] => 12/609961
[patent_app_country] => US
[patent_app_date] => 2009-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 4290
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12609961
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/609961 | Providing authenticated anti-virus agents a direct access to scan memory | Oct 29, 2009 | Issued |
Array
(
[id] => 5942959
[patent_doc_number] => 20110103579
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-05
[patent_title] => 'FORMAT PRESERVING ENCRYPTION SYSTEMS FOR DATA STRINGS WITH CONSTRAINTS'
[patent_app_type] => utility
[patent_app_number] => 12/610221
[patent_app_country] => US
[patent_app_date] => 2009-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 14017
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0103/20110103579.pdf
[firstpage_image] =>[orig_patent_app_number] => 12610221
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/610221 | Format preserving encryption methods for data strings with constraints | Oct 29, 2009 | Issued |
Array
(
[id] => 5942958
[patent_doc_number] => 20110103578
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-05
[patent_title] => 'SYSTEMS AND METHODS FOR EFFICIENTLY CREATING DIGESTS OF DIGITAL DATA'
[patent_app_type] => utility
[patent_app_number] => 12/609888
[patent_app_country] => US
[patent_app_date] => 2009-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5268
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0103/20110103578.pdf
[firstpage_image] =>[orig_patent_app_number] => 12609888
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/609888 | Systems and methods for efficiently creating digests of digital data | Oct 29, 2009 | Issued |
Array
(
[id] => 9586156
[patent_doc_number] => 08776168
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-07-08
[patent_title] => 'Applying security policy based on behaviorally-derived user risk profiles'
[patent_app_type] => utility
[patent_app_number] => 12/608772
[patent_app_country] => US
[patent_app_date] => 2009-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7947
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12608772
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/608772 | Applying security policy based on behaviorally-derived user risk profiles | Oct 28, 2009 | Issued |
Array
(
[id] => 10113359
[patent_doc_number] => 09148783
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-29
[patent_title] => 'Method of managing sensitive data in an electronic token'
[patent_app_type] => utility
[patent_app_number] => 13/140210
[patent_app_country] => US
[patent_app_date] => 2009-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5139
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13140210
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/140210 | Method of managing sensitive data in an electronic token | Oct 15, 2009 | Issued |
Array
(
[id] => 7694685
[patent_doc_number] => 20110231905
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-22
[patent_title] => 'METHOD AND COMMUNICATION SYSTEM FOR THE AUTHORIZATION-DEPENDENT CONTROL OF A CONTACTLESS INTERFACE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/121420
[patent_app_country] => US
[patent_app_date] => 2009-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2949
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0231/20110231905.pdf
[firstpage_image] =>[orig_patent_app_number] => 13121420
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/121420 | Method and communication system for the authorization-dependent control of a contactless interface device | Sep 16, 2009 | Issued |
Array
(
[id] => 8208651
[patent_doc_number] => 08191153
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-05-29
[patent_title] => 'Communication system, server apparatus, information communication method, and program'
[patent_app_type] => utility
[patent_app_number] => 13/000338
[patent_app_country] => US
[patent_app_date] => 2009-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4002
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/191/08191153.pdf
[firstpage_image] =>[orig_patent_app_number] => 13000338
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/000338 | Communication system, server apparatus, information communication method, and program | Jun 23, 2009 | Issued |