Search

Harold Joyce

Examiner (ID: 16362)

Most Active Art Unit
3404
Art Unit(s)
2899, 3749, 3404, 3744, 3502
Total Applications
2782
Issued Applications
2512
Pending Applications
61
Abandoned Applications
209

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 8170292 [patent_doc_number] => 20120106736 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-05-03 [patent_title] => 'METHODS AND APPARATUS FOR MIXING ENCRYPTED DATA WITH UNENCRYPTED DATA' [patent_app_type] => utility [patent_app_number] => 13/342288 [patent_app_country] => US [patent_app_date] => 2012-01-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6623 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0106/20120106736.pdf [firstpage_image] =>[orig_patent_app_number] => 13342288 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/342288
Methods and apparatus for mixing encrypted data with unencrypted data Jan 2, 2012 Issued
Array ( [id] => 10016978 [patent_doc_number] => 09060004 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-06-16 [patent_title] => 'Systems and methods for maintaining location-aware virtualization layers' [patent_app_type] => utility [patent_app_number] => 13/298032 [patent_app_country] => US [patent_app_date] => 2011-11-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9010 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 287 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13298032 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/298032
Systems and methods for maintaining location-aware virtualization layers Nov 15, 2011 Issued
Array ( [id] => 8361118 [patent_doc_number] => 20120216269 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-08-23 [patent_title] => 'Software licensing in a virtualization environment' [patent_app_type] => utility [patent_app_number] => 13/373463 [patent_app_country] => US [patent_app_date] => 2011-11-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 6393 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13373463 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/373463
Software licensing in a virtualization environment Nov 13, 2011 Abandoned
Array ( [id] => 8824186 [patent_doc_number] => 20130125231 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-05-16 [patent_title] => 'Method and system for managing a multiplicity of credentials' [patent_app_type] => utility [patent_app_number] => 13/373438 [patent_app_country] => US [patent_app_date] => 2011-11-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3358 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13373438 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/373438
Method and system for managing a multiplicity of credentials Nov 13, 2011 Abandoned
Array ( [id] => 8794252 [patent_doc_number] => 20130111221 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-05-02 [patent_title] => 'STORAGE SYSTEM AND ITS MANAGEMENT METHOD' [patent_app_type] => utility [patent_app_number] => 13/320149 [patent_app_country] => US [patent_app_date] => 2011-10-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 34 [patent_figures_cnt] => 34 [patent_no_of_words] => 15991 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13320149 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/320149
Storage system and its management method Oct 26, 2011 Issued
Array ( [id] => 8645952 [patent_doc_number] => 08370953 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-02-05 [patent_title] => 'Method of managing a software item on a managed computer system' [patent_app_type] => utility [patent_app_number] => 13/281773 [patent_app_country] => US [patent_app_date] => 2011-10-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7280 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 151 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13281773 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/281773
Method of managing a software item on a managed computer system Oct 25, 2011 Issued
Array ( [id] => 9315260 [patent_doc_number] => 08656497 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-02-18 [patent_title] => 'Constraint injection system for immunizing software programs against vulnerabilities and attacks' [patent_app_type] => utility [patent_app_number] => 13/078470 [patent_app_country] => US [patent_app_date] => 2011-04-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 13 [patent_no_of_words] => 16545 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 188 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13078470 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/078470
Constraint injection system for immunizing software programs against vulnerabilities and attacks Mar 31, 2011 Issued
Array ( [id] => 8873201 [patent_doc_number] => 08468590 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-06-18 [patent_title] => 'Rate limiting data traffic in a network' [patent_app_type] => utility [patent_app_number] => 13/035781 [patent_app_country] => US [patent_app_date] => 2011-02-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 11689 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13035781 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/035781
Rate limiting data traffic in a network Feb 24, 2011 Issued
Array ( [id] => 10835057 [patent_doc_number] => 08863256 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-10-14 [patent_title] => 'System and method for enabling secure transactions using flexible identity management in a vehicular environment' [patent_app_type] => utility [patent_app_number] => 13/014605 [patent_app_country] => US [patent_app_date] => 2011-01-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 21902 [patent_no_of_claims] => 34 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 299 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13014605 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/014605
System and method for enabling secure transactions using flexible identity management in a vehicular environment Jan 25, 2011 Issued
Array ( [id] => 9012440 [patent_doc_number] => 08527760 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-09-03 [patent_title] => 'Determining trust data for devices in a network' [patent_app_type] => utility [patent_app_number] => 13/013098 [patent_app_country] => US [patent_app_date] => 2011-01-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 9 [patent_no_of_words] => 8315 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 281 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13013098 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/013098
Determining trust data for devices in a network Jan 24, 2011 Issued
Array ( [id] => 6040659 [patent_doc_number] => 20110093708 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-04-21 [patent_title] => 'METHOD FOR PERSONALIZING AN AUTHENTICATION TOKEN' [patent_app_type] => utility [patent_app_number] => 12/978754 [patent_app_country] => US [patent_app_date] => 2010-12-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5887 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0093/20110093708.pdf [firstpage_image] =>[orig_patent_app_number] => 12978754 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/978754
Method for personalizing an authentication token Dec 26, 2010 Issued
Array ( [id] => 7656070 [patent_doc_number] => 20110305339 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-12-15 [patent_title] => 'Key Establishment for Relay Node in a Wireless Communication System' [patent_app_type] => utility [patent_app_number] => 12/964991 [patent_app_country] => US [patent_app_date] => 2010-12-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7481 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0305/20110305339.pdf [firstpage_image] =>[orig_patent_app_number] => 12964991 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/964991
Key Establishment for Relay Node in a Wireless Communication System Dec 9, 2010 Abandoned
Array ( [id] => 10532162 [patent_doc_number] => 09258312 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-02-09 [patent_title] => 'Distributed policy enforcement with verification mode' [patent_app_type] => utility [patent_app_number] => 12/961182 [patent_app_country] => US [patent_app_date] => 2010-12-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 14249 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 227 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12961182 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/961182
Distributed policy enforcement with verification mode Dec 5, 2010 Issued
Array ( [id] => 8189670 [patent_doc_number] => 20120117642 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-05-10 [patent_title] => 'INFORMATION SECURITY PROTECTION HOST' [patent_app_type] => utility [patent_app_number] => 12/960056 [patent_app_country] => US [patent_app_date] => 2010-12-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5636 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0117/20120117642.pdf [firstpage_image] =>[orig_patent_app_number] => 12960056 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/960056
Information security protection host Dec 2, 2010 Issued
Array ( [id] => 6147827 [patent_doc_number] => 20110131648 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-06-02 [patent_title] => 'Method and System for Digital Communication Security Using Computer Systems' [patent_app_type] => utility [patent_app_number] => 12/957042 [patent_app_country] => US [patent_app_date] => 2010-11-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4240 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0131/20110131648.pdf [firstpage_image] =>[orig_patent_app_number] => 12957042 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/957042
Method and System for Digital Communication Security Using Computer Systems Nov 29, 2010 Abandoned
Array ( [id] => 9377709 [patent_doc_number] => 08681983 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-03-25 [patent_title] => 'Method for public-key attribute-based encryption with respect to a conjunctive logical expression' [patent_app_type] => utility [patent_app_number] => 13/510530 [patent_app_country] => US [patent_app_date] => 2010-11-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 2 [patent_no_of_words] => 3782 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 185 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13510530 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/510530
Method for public-key attribute-based encryption with respect to a conjunctive logical expression Nov 18, 2010 Issued
Array ( [id] => 9258115 [patent_doc_number] => 08621562 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-12-31 [patent_title] => 'Methods and systems for authentication' [patent_app_type] => utility [patent_app_number] => 12/949553 [patent_app_country] => US [patent_app_date] => 2010-11-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 6071 [patent_no_of_claims] => 38 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 306 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12949553 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/949553
Methods and systems for authentication Nov 17, 2010 Issued
Array ( [id] => 6204323 [patent_doc_number] => 20110067109 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-17 [patent_title] => 'SYSTEM AND METHOD OF CACHING DECISIONS ON WHEN TO SCAN FOR MALWARE' [patent_app_type] => utility [patent_app_number] => 12/949622 [patent_app_country] => US [patent_app_date] => 2010-11-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6266 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0067/20110067109.pdf [firstpage_image] =>[orig_patent_app_number] => 12949622 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/949622
System and method of caching decisions on when to scan for malware Nov 17, 2010 Issued
Array ( [id] => 8395827 [patent_doc_number] => 20120233671 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-09-13 [patent_title] => 'SYSTEM AND METHOD FOR SELECTIVE PROTECTION OF INFORMATION ELEMENTS' [patent_app_type] => utility [patent_app_number] => 13/510268 [patent_app_country] => US [patent_app_date] => 2010-11-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5252 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13510268 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/510268
SYSTEM AND METHOD FOR SELECTIVE PROTECTION OF INFORMATION ELEMENTS Nov 15, 2010 Abandoned
Array ( [id] => 6148134 [patent_doc_number] => 20110019729 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-27 [patent_title] => 'CODING' [patent_app_type] => utility [patent_app_number] => 12/884338 [patent_app_country] => US [patent_app_date] => 2010-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 4239 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 13 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0019/20110019729.pdf [firstpage_image] =>[orig_patent_app_number] => 12884338 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/884338
Coding Sep 16, 2010 Issued
Menu