Harold Joyce
Examiner (ID: 16362)
Most Active Art Unit | 3404 |
Art Unit(s) | 2899, 3749, 3404, 3744, 3502 |
Total Applications | 2782 |
Issued Applications | 2512 |
Pending Applications | 61 |
Abandoned Applications | 209 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 8170292
[patent_doc_number] => 20120106736
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-03
[patent_title] => 'METHODS AND APPARATUS FOR MIXING ENCRYPTED DATA WITH UNENCRYPTED DATA'
[patent_app_type] => utility
[patent_app_number] => 13/342288
[patent_app_country] => US
[patent_app_date] => 2012-01-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6623
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0106/20120106736.pdf
[firstpage_image] =>[orig_patent_app_number] => 13342288
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/342288 | Methods and apparatus for mixing encrypted data with unencrypted data | Jan 2, 2012 | Issued |
Array
(
[id] => 10016978
[patent_doc_number] => 09060004
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-06-16
[patent_title] => 'Systems and methods for maintaining location-aware virtualization layers'
[patent_app_type] => utility
[patent_app_number] => 13/298032
[patent_app_country] => US
[patent_app_date] => 2011-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9010
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13298032
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/298032 | Systems and methods for maintaining location-aware virtualization layers | Nov 15, 2011 | Issued |
Array
(
[id] => 8361118
[patent_doc_number] => 20120216269
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-08-23
[patent_title] => 'Software licensing in a virtualization environment'
[patent_app_type] => utility
[patent_app_number] => 13/373463
[patent_app_country] => US
[patent_app_date] => 2011-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6393
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13373463
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/373463 | Software licensing in a virtualization environment | Nov 13, 2011 | Abandoned |
Array
(
[id] => 8824186
[patent_doc_number] => 20130125231
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-16
[patent_title] => 'Method and system for managing a multiplicity of credentials'
[patent_app_type] => utility
[patent_app_number] => 13/373438
[patent_app_country] => US
[patent_app_date] => 2011-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3358
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13373438
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/373438 | Method and system for managing a multiplicity of credentials | Nov 13, 2011 | Abandoned |
Array
(
[id] => 8794252
[patent_doc_number] => 20130111221
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-02
[patent_title] => 'STORAGE SYSTEM AND ITS MANAGEMENT METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/320149
[patent_app_country] => US
[patent_app_date] => 2011-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 34
[patent_no_of_words] => 15991
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13320149
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/320149 | Storage system and its management method | Oct 26, 2011 | Issued |
Array
(
[id] => 8645952
[patent_doc_number] => 08370953
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-02-05
[patent_title] => 'Method of managing a software item on a managed computer system'
[patent_app_type] => utility
[patent_app_number] => 13/281773
[patent_app_country] => US
[patent_app_date] => 2011-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7280
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13281773
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/281773 | Method of managing a software item on a managed computer system | Oct 25, 2011 | Issued |
Array
(
[id] => 9315260
[patent_doc_number] => 08656497
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-18
[patent_title] => 'Constraint injection system for immunizing software programs against vulnerabilities and attacks'
[patent_app_type] => utility
[patent_app_number] => 13/078470
[patent_app_country] => US
[patent_app_date] => 2011-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 16545
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13078470
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/078470 | Constraint injection system for immunizing software programs against vulnerabilities and attacks | Mar 31, 2011 | Issued |
Array
(
[id] => 8873201
[patent_doc_number] => 08468590
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-06-18
[patent_title] => 'Rate limiting data traffic in a network'
[patent_app_type] => utility
[patent_app_number] => 13/035781
[patent_app_country] => US
[patent_app_date] => 2011-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11689
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13035781
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/035781 | Rate limiting data traffic in a network | Feb 24, 2011 | Issued |
Array
(
[id] => 10835057
[patent_doc_number] => 08863256
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-10-14
[patent_title] => 'System and method for enabling secure transactions using flexible identity management in a vehicular environment'
[patent_app_type] => utility
[patent_app_number] => 13/014605
[patent_app_country] => US
[patent_app_date] => 2011-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 21902
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 299
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13014605
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/014605 | System and method for enabling secure transactions using flexible identity management in a vehicular environment | Jan 25, 2011 | Issued |
Array
(
[id] => 9012440
[patent_doc_number] => 08527760
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-09-03
[patent_title] => 'Determining trust data for devices in a network'
[patent_app_type] => utility
[patent_app_number] => 13/013098
[patent_app_country] => US
[patent_app_date] => 2011-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 8315
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 281
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13013098
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/013098 | Determining trust data for devices in a network | Jan 24, 2011 | Issued |
Array
(
[id] => 6040659
[patent_doc_number] => 20110093708
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-04-21
[patent_title] => 'METHOD FOR PERSONALIZING AN AUTHENTICATION TOKEN'
[patent_app_type] => utility
[patent_app_number] => 12/978754
[patent_app_country] => US
[patent_app_date] => 2010-12-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5887
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0093/20110093708.pdf
[firstpage_image] =>[orig_patent_app_number] => 12978754
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/978754 | Method for personalizing an authentication token | Dec 26, 2010 | Issued |
Array
(
[id] => 7656070
[patent_doc_number] => 20110305339
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-15
[patent_title] => 'Key Establishment for Relay Node in a Wireless Communication System'
[patent_app_type] => utility
[patent_app_number] => 12/964991
[patent_app_country] => US
[patent_app_date] => 2010-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7481
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0305/20110305339.pdf
[firstpage_image] =>[orig_patent_app_number] => 12964991
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/964991 | Key Establishment for Relay Node in a Wireless Communication System | Dec 9, 2010 | Abandoned |
Array
(
[id] => 10532162
[patent_doc_number] => 09258312
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-02-09
[patent_title] => 'Distributed policy enforcement with verification mode'
[patent_app_type] => utility
[patent_app_number] => 12/961182
[patent_app_country] => US
[patent_app_date] => 2010-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 14249
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 227
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12961182
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/961182 | Distributed policy enforcement with verification mode | Dec 5, 2010 | Issued |
Array
(
[id] => 8189670
[patent_doc_number] => 20120117642
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-10
[patent_title] => 'INFORMATION SECURITY PROTECTION HOST'
[patent_app_type] => utility
[patent_app_number] => 12/960056
[patent_app_country] => US
[patent_app_date] => 2010-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5636
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0117/20120117642.pdf
[firstpage_image] =>[orig_patent_app_number] => 12960056
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/960056 | Information security protection host | Dec 2, 2010 | Issued |
Array
(
[id] => 6147827
[patent_doc_number] => 20110131648
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-02
[patent_title] => 'Method and System for Digital Communication Security Using Computer Systems'
[patent_app_type] => utility
[patent_app_number] => 12/957042
[patent_app_country] => US
[patent_app_date] => 2010-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4240
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0131/20110131648.pdf
[firstpage_image] =>[orig_patent_app_number] => 12957042
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/957042 | Method and System for Digital Communication Security Using Computer Systems | Nov 29, 2010 | Abandoned |
Array
(
[id] => 9377709
[patent_doc_number] => 08681983
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-25
[patent_title] => 'Method for public-key attribute-based encryption with respect to a conjunctive logical expression'
[patent_app_type] => utility
[patent_app_number] => 13/510530
[patent_app_country] => US
[patent_app_date] => 2010-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 2
[patent_no_of_words] => 3782
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13510530
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/510530 | Method for public-key attribute-based encryption with respect to a conjunctive logical expression | Nov 18, 2010 | Issued |
Array
(
[id] => 9258115
[patent_doc_number] => 08621562
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-12-31
[patent_title] => 'Methods and systems for authentication'
[patent_app_type] => utility
[patent_app_number] => 12/949553
[patent_app_country] => US
[patent_app_date] => 2010-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 6071
[patent_no_of_claims] => 38
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 306
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12949553
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/949553 | Methods and systems for authentication | Nov 17, 2010 | Issued |
Array
(
[id] => 6204323
[patent_doc_number] => 20110067109
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-17
[patent_title] => 'SYSTEM AND METHOD OF CACHING DECISIONS ON WHEN TO SCAN FOR MALWARE'
[patent_app_type] => utility
[patent_app_number] => 12/949622
[patent_app_country] => US
[patent_app_date] => 2010-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6266
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0067/20110067109.pdf
[firstpage_image] =>[orig_patent_app_number] => 12949622
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/949622 | System and method of caching decisions on when to scan for malware | Nov 17, 2010 | Issued |
Array
(
[id] => 8395827
[patent_doc_number] => 20120233671
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-09-13
[patent_title] => 'SYSTEM AND METHOD FOR SELECTIVE PROTECTION OF INFORMATION ELEMENTS'
[patent_app_type] => utility
[patent_app_number] => 13/510268
[patent_app_country] => US
[patent_app_date] => 2010-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5252
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13510268
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/510268 | SYSTEM AND METHOD FOR SELECTIVE PROTECTION OF INFORMATION ELEMENTS | Nov 15, 2010 | Abandoned |
Array
(
[id] => 6148134
[patent_doc_number] => 20110019729
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-27
[patent_title] => 'CODING'
[patent_app_type] => utility
[patent_app_number] => 12/884338
[patent_app_country] => US
[patent_app_date] => 2010-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4239
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 13
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0019/20110019729.pdf
[firstpage_image] =>[orig_patent_app_number] => 12884338
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/884338 | Coding | Sep 16, 2010 | Issued |