Jordan Marc Schwartz
Examiner (ID: 11403)
Most Active Art Unit | 2873 |
Art Unit(s) | 2516, 2872, 2874, 2873 |
Total Applications | 2033 |
Issued Applications | 1726 |
Pending Applications | 59 |
Abandoned Applications | 230 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 10867516
[patent_doc_number] => 08893247
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-18
[patent_title] => 'Dynamic transmission of user information to trusted contacts'
[patent_app_type] => utility
[patent_app_number] => 13/714839
[patent_app_country] => US
[patent_app_date] => 2012-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 17
[patent_no_of_words] => 10204
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13714839
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/714839 | Dynamic transmission of user information to trusted contacts | Dec 13, 2012 | Issued |
Array
(
[id] => 10885849
[patent_doc_number] => 08910254
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-09
[patent_title] => 'System and methods for profiling client devices'
[patent_app_type] => utility
[patent_app_number] => 13/714745
[patent_app_country] => US
[patent_app_date] => 2012-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 10157
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13714745
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/714745 | System and methods for profiling client devices | Dec 13, 2012 | Issued |
Array
(
[id] => 8886537
[patent_doc_number] => 20130159721
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-20
[patent_title] => 'APPARATUS AND METHOD FOR SIGNATURE VERIFICATION'
[patent_app_type] => utility
[patent_app_number] => 13/714817
[patent_app_country] => US
[patent_app_date] => 2012-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2413
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13714817
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/714817 | Apparatus and method for signature verification | Dec 13, 2012 | Issued |
Array
(
[id] => 9586199
[patent_doc_number] => 08776211
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-07-08
[patent_title] => 'Processing commands according to authorization'
[patent_app_type] => utility
[patent_app_number] => 13/709204
[patent_app_country] => US
[patent_app_date] => 2012-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5817
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13709204
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/709204 | Processing commands according to authorization | Dec 9, 2012 | Issued |
Array
(
[id] => 9096756
[patent_doc_number] => 20130276067
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-17
[patent_title] => 'SYSTEM FOR PROVIDING MOBILE DATA SECURITY'
[patent_app_type] => utility
[patent_app_number] => 13/710018
[patent_app_country] => US
[patent_app_date] => 2012-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 14060
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13710018
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/710018 | System for providing mobile data security | Dec 9, 2012 | Issued |
Array
(
[id] => 9774805
[patent_doc_number] => 20140298468
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-02
[patent_title] => 'UNAUTHORIZED APPLICATION DETECTION SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/356825
[patent_app_country] => US
[patent_app_date] => 2012-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5541
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14356825
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/356825 | Unauthorized application detection system and method | Nov 8, 2012 | Issued |
Array
(
[id] => 9434567
[patent_doc_number] => 20140112474
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-24
[patent_title] => 'METHODS AND APPARATUS FOR PROVIDING NETWORK-ASSISTED KEY AGREEMENT FOR D2D COMMUNICATIONS'
[patent_app_type] => utility
[patent_app_number] => 13/655884
[patent_app_country] => US
[patent_app_date] => 2012-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 11888
[patent_no_of_claims] => 88
[patent_no_of_ind_claims] => 12
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13655884
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/655884 | Methods and apparatus for providing network-assisted key agreement for D2D communications | Oct 18, 2012 | Issued |
Array
(
[id] => 10081195
[patent_doc_number] => 09119062
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-25
[patent_title] => 'Methods and apparatus for providing additional security for communication of sensitive information'
[patent_app_type] => utility
[patent_app_number] => 13/656112
[patent_app_country] => US
[patent_app_date] => 2012-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8692
[patent_no_of_claims] => 60
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13656112
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/656112 | Methods and apparatus for providing additional security for communication of sensitive information | Oct 18, 2012 | Issued |
Array
(
[id] => 9420750
[patent_doc_number] => 20140105400
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-17
[patent_title] => 'AUTOMATIC RECOVERY OF TPM KEYS'
[patent_app_type] => utility
[patent_app_number] => 13/652138
[patent_app_country] => US
[patent_app_date] => 2012-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1340
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13652138
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/652138 | Automatic recovery of TPM keys | Oct 14, 2012 | Issued |
Array
(
[id] => 9207596
[patent_doc_number] => 20140006772
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-02
[patent_title] => 'PROTECTING ENTERPRISE DATA THROUGH POLICY-BASED ENCRYPTION OF MESSAGE ATTACHMENTS'
[patent_app_type] => utility
[patent_app_number] => 13/649064
[patent_app_country] => US
[patent_app_date] => 2012-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 41
[patent_figures_cnt] => 41
[patent_no_of_words] => 60503
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13649064
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/649064 | Protecting enterprise data through policy-based encryption of message attachments | Oct 9, 2012 | Issued |
Array
(
[id] => 9410188
[patent_doc_number] => 20140101440
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-10
[patent_title] => 'DIGITAL ARBITRATION'
[patent_app_type] => utility
[patent_app_number] => 13/648787
[patent_app_country] => US
[patent_app_date] => 2012-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7353
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13648787
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/648787 | Digital arbitration | Oct 9, 2012 | Issued |
Array
(
[id] => 9410204
[patent_doc_number] => 20140101456
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-10
[patent_title] => 'CONFIDENTIALITY PRESERVING DOCUMENT ANALYSIS SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/648462
[patent_app_country] => US
[patent_app_date] => 2012-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9417
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13648462
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/648462 | Confidentiality preserving document analysis system and method | Oct 9, 2012 | Issued |
Array
(
[id] => 9410195
[patent_doc_number] => 20140101447
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-10
[patent_title] => 'Mutual Authentication Schemes'
[patent_app_type] => utility
[patent_app_number] => 13/647615
[patent_app_country] => US
[patent_app_date] => 2012-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9888
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13647615
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/647615 | Mutual authentication schemes | Oct 8, 2012 | Issued |
Array
(
[id] => 10901836
[patent_doc_number] => 08925083
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-30
[patent_title] => 'Cyber security in an automotive network'
[patent_app_type] => utility
[patent_app_number] => 13/644554
[patent_app_country] => US
[patent_app_date] => 2012-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2882
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13644554
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/644554 | Cyber security in an automotive network | Oct 3, 2012 | Issued |
Array
(
[id] => 9886330
[patent_doc_number] => 08973115
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-03-03
[patent_title] => 'System and method for assembling and analyzing a candidate application for a credential'
[patent_app_type] => utility
[patent_app_number] => 13/644571
[patent_app_country] => US
[patent_app_date] => 2012-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 13193
[patent_no_of_claims] => 44
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13644571
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/644571 | System and method for assembling and analyzing a candidate application for a credential | Oct 3, 2012 | Issued |
Array
(
[id] => 8757249
[patent_doc_number] => 20130091554
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-11
[patent_title] => 'TERMINAL APPARATUS, SERVER APPARATUS, NETWORK SYSTEM, AND COMMUNICATION METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/644629
[patent_app_country] => US
[patent_app_date] => 2012-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 15677
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13644629
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/644629 | TERMINAL APPARATUS, SERVER APPARATUS, NETWORK SYSTEM, AND COMMUNICATION METHOD | Oct 3, 2012 | Abandoned |
Array
(
[id] => 9410461
[patent_doc_number] => 20140101713
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-10
[patent_title] => 'DATA MAPPING USING TRUST SERVICES'
[patent_app_type] => utility
[patent_app_number] => 13/644921
[patent_app_country] => US
[patent_app_date] => 2012-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5357
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13644921
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/644921 | Data mapping using trust services | Oct 3, 2012 | Issued |
Array
(
[id] => 9593199
[patent_doc_number] => 08782765
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-15
[patent_title] => 'Techniques for environment single sign on'
[patent_app_type] => utility
[patent_app_number] => 13/616079
[patent_app_country] => US
[patent_app_date] => 2012-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4296
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 60
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13616079
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/616079 | Techniques for environment single sign on | Sep 13, 2012 | Issued |
Array
(
[id] => 9282947
[patent_doc_number] => 20140032915
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-30
[patent_title] => 'METHOD AND APPARATUS FOR VALIDATING THE INTEGRITY OF INSTALLER FILES PRIOR TO INSTALLATION'
[patent_app_type] => utility
[patent_app_number] => 13/559781
[patent_app_country] => US
[patent_app_date] => 2012-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7183
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13559781
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/559781 | Method and apparatus for validating the integrity of installer files prior to installation | Jul 26, 2012 | Issued |
Array
(
[id] => 9071105
[patent_doc_number] => 20130262861
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-03
[patent_title] => 'DATA PROTECTION METHOD FOR E-MAIL AND ELECTRONIC DEVICE HAVING DATA PROTECTION FUNCTION'
[patent_app_type] => utility
[patent_app_number] => 13/559798
[patent_app_country] => US
[patent_app_date] => 2012-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1310
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13559798
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/559798 | Data protection method for e-mail and electronic device having data protection function | Jul 26, 2012 | Issued |