
Justin E. Shepard
Examiner (ID: 1020, Phone: (571)272-5967 , Office: P/2424 )
| Most Active Art Unit | 2424 |
| Art Unit(s) | 2424, 2623, 2617 |
| Total Applications | 722 |
| Issued Applications | 484 |
| Pending Applications | 16 |
| Abandoned Applications | 226 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9029970
[patent_doc_number] => 08539567
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-09-17
[patent_title] => 'Multi-tiered authentication methods for facilitating communications amongst smart home devices and cloud-based servers'
[patent_app_type] => utility
[patent_app_number] => 13/624893
[patent_app_country] => US
[patent_app_date] => 2012-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 46
[patent_figures_cnt] => 77
[patent_no_of_words] => 54668
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13624893
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/624893 | Multi-tiered authentication methods for facilitating communications amongst smart home devices and cloud-based servers | Sep 21, 2012 | Issued |
Array
(
[id] => 9296983
[patent_doc_number] => 20140040617
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-06
[patent_title] => 'METHOD FOR THE GENERATION OF A CODE, AND METHOD AND SYSTEM FOR THE AUTHORIZATION OF AN OPERATION'
[patent_app_type] => utility
[patent_app_number] => 13/611814
[patent_app_country] => US
[patent_app_date] => 2012-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8954
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13611814
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/611814 | Method for the generation of a code, and method and system for the authorization of an operation | Sep 11, 2012 | Issued |
Array
(
[id] => 8719705
[patent_doc_number] => 20130070922
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-21
[patent_title] => 'TECHNIQUE FOR SECURELY COMMUNICATING AND STORING PROGRAMMING MATERIAL IN A TRUSTED DOMAIN'
[patent_app_type] => utility
[patent_app_number] => 13/608969
[patent_app_country] => US
[patent_app_date] => 2012-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7384
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13608969
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/608969 | Technique for securely communicating and storing programming material in a trusted domain | Sep 9, 2012 | Issued |
Array
(
[id] => 10861062
[patent_doc_number] => 08887281
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-11-11
[patent_title] => 'System and methods for adaptive model generation for detecting intrusion in computer systems'
[patent_app_type] => utility
[patent_app_number] => 13/573314
[patent_app_country] => US
[patent_app_date] => 2012-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 17740
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13573314
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/573314 | System and methods for adaptive model generation for detecting intrusion in computer systems | Sep 9, 2012 | Issued |
Array
(
[id] => 8744208
[patent_doc_number] => 20130083925
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-04
[patent_title] => 'POLARIZATION TRACKING SYSTEM FOR FREE-SPACE OPTICAL COMMUNICATION, INCLUDING QUANTUM COMMUNICATION'
[patent_app_type] => utility
[patent_app_number] => 13/600918
[patent_app_country] => US
[patent_app_date] => 2012-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6184
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13600918
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/600918 | Polarization tracking system for free-space optical communication, including quantum communication | Aug 30, 2012 | Issued |
Array
(
[id] => 9605165
[patent_doc_number] => 20140201847
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-17
[patent_title] => 'ANONYMIZATION DEVICE AND ANONYMIZATION METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/240876
[patent_app_country] => US
[patent_app_date] => 2012-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 10512
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14240876
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/240876 | ANONYMIZATION DEVICE AND ANONYMIZATION METHOD | Aug 27, 2012 | Abandoned |
Array
(
[id] => 11452493
[patent_doc_number] => 09576140
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-02-21
[patent_title] => 'Single sign-on system for shared resource environments'
[patent_app_type] => utility
[patent_app_number] => 13/594273
[patent_app_country] => US
[patent_app_date] => 2012-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6504
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13594273
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/594273 | Single sign-on system for shared resource environments | Aug 23, 2012 | Issued |
Array
(
[id] => 10173098
[patent_doc_number] => 09203818
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-12-01
[patent_title] => 'Adaptive timeouts for security credentials'
[patent_app_type] => utility
[patent_app_number] => 13/593274
[patent_app_country] => US
[patent_app_date] => 2012-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 10298
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13593274
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/593274 | Adaptive timeouts for security credentials | Aug 22, 2012 | Issued |
Array
(
[id] => 8687057
[patent_doc_number] => 20130055341
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-02-28
[patent_title] => 'RESTRICTION OF PROGRAM PROCESS CAPABILITIES'
[patent_app_type] => utility
[patent_app_number] => 13/591690
[patent_app_country] => US
[patent_app_date] => 2012-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11756
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13591690
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/591690 | Restriction of program process capabilities | Aug 21, 2012 | Issued |
Array
(
[id] => 9332902
[patent_doc_number] => 20140059683
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-27
[patent_title] => 'Cooperative intrusion detection ecosystem for IP reputation-based security'
[patent_app_type] => utility
[patent_app_number] => 13/591456
[patent_app_country] => US
[patent_app_date] => 2012-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8060
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13591456
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/591456 | Cooperative intrusion detection ecosystem for IP reputation-based security | Aug 21, 2012 | Issued |
Array
(
[id] => 10543801
[patent_doc_number] => 09268933
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-23
[patent_title] => 'Privacy broker'
[patent_app_type] => utility
[patent_app_number] => 13/591497
[patent_app_country] => US
[patent_app_date] => 2012-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 21
[patent_no_of_words] => 19834
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13591497
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/591497 | Privacy broker | Aug 21, 2012 | Issued |
Array
(
[id] => 9332889
[patent_doc_number] => 20140059671
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-27
[patent_title] => 'Device identification for externalizing password from device coupled with user control of external password service'
[patent_app_type] => utility
[patent_app_number] => 13/590683
[patent_app_country] => US
[patent_app_date] => 2012-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4463
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13590683
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/590683 | Device identification for externalizing password from device coupled with user control of external password service | Aug 20, 2012 | Issued |
Array
(
[id] => 8746925
[patent_doc_number] => 20130086642
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-04
[patent_title] => 'OBTAINING A SIGNED CERTIFICATE FOR A DISPERSED STORAGE NETWORK'
[patent_app_type] => utility
[patent_app_number] => 13/588259
[patent_app_country] => US
[patent_app_date] => 2012-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 27375
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13588259
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/588259 | Obtaining a signed certificate for a dispersed storage network | Aug 16, 2012 | Issued |
Array
(
[id] => 9320891
[patent_doc_number] => 20140053229
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-20
[patent_title] => 'Systems and Methods for Policy Propagation and Enforcement'
[patent_app_type] => utility
[patent_app_number] => 13/586338
[patent_app_country] => US
[patent_app_date] => 2012-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8391
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13586338
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/586338 | Systems and Methods for Policy Propagation and Enforcement | Aug 14, 2012 | Abandoned |
Array
(
[id] => 8687087
[patent_doc_number] => 20130055371
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-02-28
[patent_title] => 'STORAGE CONTROL METHOD AND INFORMATION PROCESSING APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 13/584449
[patent_app_country] => US
[patent_app_date] => 2012-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 12360
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13584449
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/584449 | STORAGE CONTROL METHOD AND INFORMATION PROCESSING APPARATUS | Aug 12, 2012 | Abandoned |
Array
(
[id] => 9848033
[patent_doc_number] => 08949969
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-03
[patent_title] => 'Payment card industry (PCI) compliant architecture and associated methodology of managing a service infrastructure'
[patent_app_type] => utility
[patent_app_number] => 13/584347
[patent_app_country] => US
[patent_app_date] => 2012-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 12733
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 238
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13584347
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/584347 | Payment card industry (PCI) compliant architecture and associated methodology of managing a service infrastructure | Aug 12, 2012 | Issued |
Array
(
[id] => 8512298
[patent_doc_number] => 20120311706
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-12-06
[patent_title] => 'PAYMENT CARD INDUSTRY (PCI) COMPLIANT ARCHITECTURE AND ASSOCIATED METHODOLOGY OF MANAGING A SERVICE INFRASTRUCTURE'
[patent_app_type] => utility
[patent_app_number] => 13/584313
[patent_app_country] => US
[patent_app_date] => 2012-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 12739
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13584313
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/584313 | Payment card industry (PCI) compliant architecture and associated methodology of managing a service infrastructure | Aug 12, 2012 | Issued |
Array
(
[id] => 8491402
[patent_doc_number] => 20120290809
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-15
[patent_title] => 'System and Method of Secure Garbage Collection on a Mobile Device'
[patent_app_type] => utility
[patent_app_number] => 13/556959
[patent_app_country] => US
[patent_app_date] => 2012-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4936
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13556959
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/556959 | System and method of secure garbage collection on a mobile device | Jul 23, 2012 | Issued |
Array
(
[id] => 8585157
[patent_doc_number] => 20130003978
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-03
[patent_title] => 'Approach For Managing Access To Messages Using Encryption Key Management Policies'
[patent_app_type] => utility
[patent_app_number] => 13/553043
[patent_app_country] => US
[patent_app_date] => 2012-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7045
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13553043
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/553043 | Approach for managing access to messages using encryption key management policies | Jul 18, 2012 | Issued |
Array
(
[id] => 9258173
[patent_doc_number] => 08621623
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-12-31
[patent_title] => 'Method and system for identifying business records'
[patent_app_type] => utility
[patent_app_number] => 13/542925
[patent_app_country] => US
[patent_app_date] => 2012-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5056
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13542925
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/542925 | Method and system for identifying business records | Jul 5, 2012 | Issued |