
Justin E. Shepard
Examiner (ID: 1020, Phone: (571)272-5967 , Office: P/2424 )
| Most Active Art Unit | 2424 |
| Art Unit(s) | 2424, 2623, 2617 |
| Total Applications | 722 |
| Issued Applications | 484 |
| Pending Applications | 16 |
| Abandoned Applications | 226 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9218679
[patent_doc_number] => 08631489
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-01-14
[patent_title] => 'Method and system for detecting malicious domain names at an upper DNS hierarchy'
[patent_app_type] => utility
[patent_app_number] => 13/358303
[patent_app_country] => US
[patent_app_date] => 2012-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5205
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13358303
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/358303 | Method and system for detecting malicious domain names at an upper DNS hierarchy | Jan 24, 2012 | Issued |
Array
(
[id] => 8942104
[patent_doc_number] => 20130191901
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-25
[patent_title] => 'SECURITY ACTIONS BASED ON CLIENT IDENTITY DATABASES'
[patent_app_type] => utility
[patent_app_number] => 13/356742
[patent_app_country] => US
[patent_app_date] => 2012-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5220
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13356742
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/356742 | Security actions based on client identity databases | Jan 23, 2012 | Issued |
Array
(
[id] => 9258200
[patent_doc_number] => 08621651
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-12-31
[patent_title] => 'Enforcing content blackout'
[patent_app_type] => utility
[patent_app_number] => 13/355871
[patent_app_country] => US
[patent_app_date] => 2012-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9810
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13355871
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/355871 | Enforcing content blackout | Jan 22, 2012 | Issued |
Array
(
[id] => 8942081
[patent_doc_number] => 20130191878
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-25
[patent_title] => 'ACCESSING ENTERPRISE RESOURCE PLANNING DATA FROM A HANDHELD MOBILE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/355571
[patent_app_country] => US
[patent_app_date] => 2012-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6468
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13355571
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/355571 | Accessing enterprise resource planning data from a handheld mobile device | Jan 22, 2012 | Issued |
Array
(
[id] => 8479493
[patent_doc_number] => 20120278900
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-01
[patent_title] => 'SYSTEMS AND METHODS FOR REGULATORY COMPLIANCE WITH QUALIFIED SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 13/356165
[patent_app_country] => US
[patent_app_date] => 2012-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9021
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13356165
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/356165 | Systems and methods for regulatory compliance with qualified systems | Jan 22, 2012 | Issued |
Array
(
[id] => 9379301
[patent_doc_number] => 08683587
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-25
[patent_title] => 'Non-intrusive monitoring of services in a services-oriented architecture'
[patent_app_type] => utility
[patent_app_number] => 13/351405
[patent_app_country] => US
[patent_app_date] => 2012-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5173
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13351405
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/351405 | Non-intrusive monitoring of services in a services-oriented architecture | Jan 16, 2012 | Issued |
Array
(
[id] => 8459812
[patent_doc_number] => 08295490
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-10-23
[patent_title] => 'Method and system for storing and providing an encryption key for data storage'
[patent_app_type] => utility
[patent_app_number] => 13/347637
[patent_app_country] => US
[patent_app_date] => 2012-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5556
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13347637
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/347637 | Method and system for storing and providing an encryption key for data storage | Jan 9, 2012 | Issued |
Array
(
[id] => 8130593
[patent_doc_number] => 20120089848
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-12
[patent_title] => 'Apparatus and Method for Securing Data on a Portable Storage Device'
[patent_app_type] => utility
[patent_app_number] => 13/328859
[patent_app_country] => US
[patent_app_date] => 2011-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4207
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0089/20120089848.pdf
[firstpage_image] =>[orig_patent_app_number] => 13328859
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/328859 | Apparatus and method for securing data on a portable storage device | Dec 15, 2011 | Issued |
Array
(
[id] => 8698841
[patent_doc_number] => 20130060850
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-07
[patent_title] => 'Computational systems and methods for regulating information flow during interactions'
[patent_app_type] => utility
[patent_app_number] => 13/373542
[patent_app_country] => US
[patent_app_date] => 2011-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 24196
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13373542
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/373542 | Computational systems and methods for regulating information flow during interactions | Nov 15, 2011 | Issued |
Array
(
[id] => 8899458
[patent_doc_number] => 08478992
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-02
[patent_title] => 'Methods for secure restoration of personal identity credentials into electronic devices'
[patent_app_type] => utility
[patent_app_number] => 13/287471
[patent_app_country] => US
[patent_app_date] => 2011-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 4692
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13287471
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/287471 | Methods for secure restoration of personal identity credentials into electronic devices | Nov 1, 2011 | Issued |
Array
(
[id] => 10133101
[patent_doc_number] => 09166953
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-20
[patent_title] => 'Method and apparatus for providing identity based encryption in distributed computations'
[patent_app_type] => utility
[patent_app_number] => 13/285254
[patent_app_country] => US
[patent_app_date] => 2011-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 16490
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13285254
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/285254 | Method and apparatus for providing identity based encryption in distributed computations | Oct 30, 2011 | Issued |
Array
(
[id] => 10133101
[patent_doc_number] => 09166953
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-20
[patent_title] => 'Method and apparatus for providing identity based encryption in distributed computations'
[patent_app_type] => utility
[patent_app_number] => 13/285254
[patent_app_country] => US
[patent_app_date] => 2011-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 16490
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13285254
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/285254 | Method and apparatus for providing identity based encryption in distributed computations | Oct 30, 2011 | Issued |
Array
(
[id] => 10133101
[patent_doc_number] => 09166953
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-20
[patent_title] => 'Method and apparatus for providing identity based encryption in distributed computations'
[patent_app_type] => utility
[patent_app_number] => 13/285254
[patent_app_country] => US
[patent_app_date] => 2011-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 16490
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13285254
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/285254 | Method and apparatus for providing identity based encryption in distributed computations | Oct 30, 2011 | Issued |
Array
(
[id] => 10133101
[patent_doc_number] => 09166953
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-20
[patent_title] => 'Method and apparatus for providing identity based encryption in distributed computations'
[patent_app_type] => utility
[patent_app_number] => 13/285254
[patent_app_country] => US
[patent_app_date] => 2011-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 16490
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13285254
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/285254 | Method and apparatus for providing identity based encryption in distributed computations | Oct 30, 2011 | Issued |
Array
(
[id] => 8214566
[patent_doc_number] => 20120131682
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-24
[patent_title] => 'METHOD AND APPARATUS FOR PROTECTING DIGITAL CONTENTS'
[patent_app_type] => utility
[patent_app_number] => 13/285220
[patent_app_country] => US
[patent_app_date] => 2011-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9445
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0131/20120131682.pdf
[firstpage_image] =>[orig_patent_app_number] => 13285220
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/285220 | METHOD AND APPARATUS FOR PROTECTING DIGITAL CONTENTS | Oct 30, 2011 | Abandoned |
Array
(
[id] => 8183623
[patent_doc_number] => 08181254
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-05-15
[patent_title] => 'Setting default security features for use with web applications and extensions'
[patent_app_type] => utility
[patent_app_number] => 13/284469
[patent_app_country] => US
[patent_app_date] => 2011-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8137
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/181/08181254.pdf
[firstpage_image] =>[orig_patent_app_number] => 13284469
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/284469 | Setting default security features for use with web applications and extensions | Oct 27, 2011 | Issued |
Array
(
[id] => 9415663
[patent_doc_number] => 08699713
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-04-15
[patent_title] => 'Key update with compromise detection'
[patent_app_type] => utility
[patent_app_number] => 13/250225
[patent_app_country] => US
[patent_app_date] => 2011-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 7
[patent_no_of_words] => 10241
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13250225
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/250225 | Key update with compromise detection | Sep 29, 2011 | Issued |
Array
(
[id] => 9572083
[patent_doc_number] => 20140189796
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-03
[patent_title] => 'GROUP DEFINITION MANAGEMENT SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/239647
[patent_app_country] => US
[patent_app_date] => 2011-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7773
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14239647
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/239647 | Group definition management system | Sep 26, 2011 | Issued |
Array
(
[id] => 8546619
[patent_doc_number] => 08321922
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-11-27
[patent_title] => 'Authenticating a user of a system using near field communication'
[patent_app_type] => utility
[patent_app_number] => 13/245764
[patent_app_country] => US
[patent_app_date] => 2011-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6774
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13245764
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/245764 | Authenticating a user of a system using near field communication | Sep 25, 2011 | Issued |
Array
(
[id] => 8735194
[patent_doc_number] => 20130080763
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-28
[patent_title] => 'PERSONAL MESSAGING SECURITY'
[patent_app_type] => utility
[patent_app_number] => 13/245086
[patent_app_country] => US
[patent_app_date] => 2011-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5850
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13245086
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/245086 | Personal messaging security | Sep 25, 2011 | Issued |