| Application number | Title of the application | Filing Date | Status |
|---|
Array
(
[id] => 7547925
[patent_doc_number] => 08055906
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-11-08
[patent_title] => 'Methods for secure restoration of personal identity credentials into electronic devices'
[patent_app_type] => utility
[patent_app_number] => 12/190064
[patent_app_country] => US
[patent_app_date] => 2008-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 4633
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/055/08055906.pdf
[firstpage_image] =>[orig_patent_app_number] => 12190064
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/190064 | Methods for secure restoration of personal identity credentials into electronic devices | Aug 11, 2008 | Issued |
Array
(
[id] => 7798425
[patent_doc_number] => 08127143
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-02-28
[patent_title] => 'Methods for secure enrollment of personal identity credentials into electronic devices'
[patent_app_type] => utility
[patent_app_number] => 12/190058
[patent_app_country] => US
[patent_app_date] => 2008-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 4633
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/127/08127143.pdf
[firstpage_image] =>[orig_patent_app_number] => 12190058
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/190058 | Methods for secure enrollment of personal identity credentials into electronic devices | Aug 11, 2008 | Issued |
Array
(
[id] => 10545496
[patent_doc_number] => 09270641
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-02-23
[patent_title] => 'Methods and systems for using keywords preprocessing, Boyer-Moore analysis, and hybrids thereof, for processing regular expressions in intrusion-prevention systems'
[patent_app_type] => utility
[patent_app_number] => 12/182391
[patent_app_country] => US
[patent_app_date] => 2008-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 25
[patent_no_of_words] => 17374
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 228
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12182391
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/182391 | Methods and systems for using keywords preprocessing, Boyer-Moore analysis, and hybrids thereof, for processing regular expressions in intrusion-prevention systems | Jul 29, 2008 | Issued |
Array
(
[id] => 4888893
[patent_doc_number] => 20080263225
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-10-23
[patent_title] => 'Context-Sensitive Confidentiality within Federated Environments'
[patent_app_type] => utility
[patent_app_number] => 12/172229
[patent_app_country] => US
[patent_app_date] => 2008-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8951
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0263/20080263225.pdf
[firstpage_image] =>[orig_patent_app_number] => 12172229
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/172229 | Context-sensitive confidentiality within federated environments | Jul 11, 2008 | Issued |
Array
(
[id] => 4889467
[patent_doc_number] => 20080263668
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-10-23
[patent_title] => 'Automatic Client Responses To Worm Or Hacker Attacks'
[patent_app_type] => utility
[patent_app_number] => 12/168954
[patent_app_country] => US
[patent_app_date] => 2008-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3722
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0263/20080263668.pdf
[firstpage_image] =>[orig_patent_app_number] => 12168954
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/168954 | Automatic Client Responses To Worm Or Hacker Attacks | Jul 7, 2008 | Abandoned |
Array
(
[id] => 8623259
[patent_doc_number] => 08356180
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-01-15
[patent_title] => 'Multidimensional identification, authentication, authorization and key distribution system for patient monitoring'
[patent_app_type] => utility
[patent_app_number] => 12/666848
[patent_app_country] => US
[patent_app_date] => 2008-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4671
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12666848
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/666848 | Multidimensional identification, authentication, authorization and key distribution system for patient monitoring | Jun 30, 2008 | Issued |
Array
(
[id] => 6396320
[patent_doc_number] => 20100318804
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-12-16
[patent_title] => 'SCHEME OF APPLYING THE MODIFIED POLYNOMIAL-BASED HASH FUNCTION IN THE DIGITAL SIGNATURE ALGORITHM BASED ON THE DIVISION ALGORITHM'
[patent_app_type] => utility
[patent_app_number] => 12/664176
[patent_app_country] => US
[patent_app_date] => 2008-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7659
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0318/20100318804.pdf
[firstpage_image] =>[orig_patent_app_number] => 12664176
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/664176 | SCHEME OF APPLYING THE MODIFIED POLYNOMIAL-BASED HASH FUNCTION IN THE DIGITAL SIGNATURE ALGORITHM BASED ON THE DIVISION ALGORITHM | Jun 11, 2008 | Abandoned |
Array
(
[id] => 9314923
[patent_doc_number] => 08656158
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-18
[patent_title] => 'System and method for access network multi-homing'
[patent_app_type] => utility
[patent_app_number] => 12/665779
[patent_app_country] => US
[patent_app_date] => 2008-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 4878
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12665779
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/665779 | System and method for access network multi-homing | Jun 10, 2008 | Issued |
Array
(
[id] => 6377304
[patent_doc_number] => 20100316223
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-12-16
[patent_title] => 'Method and Arrangement in a Telecommunication System'
[patent_app_type] => utility
[patent_app_number] => 12/677675
[patent_app_country] => US
[patent_app_date] => 2008-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4182
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0316/20100316223.pdf
[firstpage_image] =>[orig_patent_app_number] => 12677675
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/677675 | Method and arrangement in a telecommunication system | May 19, 2008 | Issued |
Array
(
[id] => 86671
[patent_doc_number] => 07747854
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-06-29
[patent_title] => 'Advanced stream format (ASF) data stream header object protection'
[patent_app_type] => utility
[patent_app_number] => 12/098524
[patent_app_country] => US
[patent_app_date] => 2008-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5201
[patent_no_of_claims] => 52
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/747/07747854.pdf
[firstpage_image] =>[orig_patent_app_number] => 12098524
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/098524 | Advanced stream format (ASF) data stream header object protection | Apr 6, 2008 | Issued |
Array
(
[id] => 8378275
[patent_doc_number] => 08261082
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-09-04
[patent_title] => 'Self-signing electronic documents'
[patent_app_type] => utility
[patent_app_number] => 12/098146
[patent_app_country] => US
[patent_app_date] => 2008-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4900
[patent_no_of_claims] => 40
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12098146
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/098146 | Self-signing electronic documents | Apr 3, 2008 | Issued |
Array
(
[id] => 6594210
[patent_doc_number] => 20100322427
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-12-23
[patent_title] => 'METHOD FOR MANAGING ENCRYPTION KEYS IN A COMMUNICATION NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/867071
[patent_app_country] => US
[patent_app_date] => 2008-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2082
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0322/20100322427.pdf
[firstpage_image] =>[orig_patent_app_number] => 12867071
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/867071 | METHOD FOR MANAGING ENCRYPTION KEYS IN A COMMUNICATION NETWORK | Mar 30, 2008 | Abandoned |
| 12/056931 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DISABLING A COMMUNICATION CHANNEL DURING AUTHENTICATION | Mar 26, 2008 | Abandoned |
Array
(
[id] => 8546626
[patent_doc_number] => 08321929
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-11-27
[patent_title] => 'System and method for implementing a one time password at an information handling system'
[patent_app_type] => utility
[patent_app_number] => 12/053698
[patent_app_country] => US
[patent_app_date] => 2008-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2261
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12053698
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/053698 | System and method for implementing a one time password at an information handling system | Mar 23, 2008 | Issued |
Array
(
[id] => 7768589
[patent_doc_number] => 08117642
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-02-14
[patent_title] => 'Computing device with entry authentication into trusted execution environment and method therefor'
[patent_app_type] => utility
[patent_app_number] => 12/053502
[patent_app_country] => US
[patent_app_date] => 2008-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 8055
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/117/08117642.pdf
[firstpage_image] =>[orig_patent_app_number] => 12053502
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/053502 | Computing device with entry authentication into trusted execution environment and method therefor | Mar 20, 2008 | Issued |
Array
(
[id] => 5535569
[patent_doc_number] => 20090235357
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-09-17
[patent_title] => 'Method and System for Generating a Malware Sequence File'
[patent_app_type] => utility
[patent_app_number] => 12/048595
[patent_app_country] => US
[patent_app_date] => 2008-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3252
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20090235357.pdf
[firstpage_image] =>[orig_patent_app_number] => 12048595
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/048595 | Method and System for Generating a Malware Sequence File | Mar 13, 2008 | Abandoned |
Array
(
[id] => 8285915
[patent_doc_number] => 08220041
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-07-10
[patent_title] => 'Method and system for protecting a computer system during boot operation'
[patent_app_type] => utility
[patent_app_number] => 12/045949
[patent_app_country] => US
[patent_app_date] => 2008-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4413
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12045949
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/045949 | Method and system for protecting a computer system during boot operation | Mar 10, 2008 | Issued |
Array
(
[id] => 6520439
[patent_doc_number] => 20100014582
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-01-21
[patent_title] => 'INVERSE QUANTIZATION CIRCUIT, INVERSE QUANTIZATION METHOD AND IMAGE REPRODUCING APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 12/438927
[patent_app_country] => US
[patent_app_date] => 2008-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 28659
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0014/20100014582.pdf
[firstpage_image] =>[orig_patent_app_number] => 12438927
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/438927 | Inverse quantization circuit, inverse quantization method and image reproducing apparatus | Feb 25, 2008 | Issued |
Array
(
[id] => 26708
[patent_doc_number] => 07796760
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-09-14
[patent_title] => 'Approach for managing access to messages using encryption key management policies'
[patent_app_type] => utility
[patent_app_number] => 12/033777
[patent_app_country] => US
[patent_app_date] => 2008-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6956
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/796/07796760.pdf
[firstpage_image] =>[orig_patent_app_number] => 12033777
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/033777 | Approach for managing access to messages using encryption key management policies | Feb 18, 2008 | Issued |
Array
(
[id] => 4874823
[patent_doc_number] => 20080201557
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-08-21
[patent_title] => 'Security Message Authentication Instruction'
[patent_app_type] => utility
[patent_app_number] => 12/029514
[patent_app_country] => US
[patent_app_date] => 2008-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4100
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0201/20080201557.pdf
[firstpage_image] =>[orig_patent_app_number] => 12029514
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/029514 | Security message authentication instruction | Feb 11, 2008 | Issued |