
Michael J. Simitoski
Examiner (ID: 1937, Phone: (571)272-3841 , Office: P/2493 )
| Most Active Art Unit | 2493 |
| Art Unit(s) | 2434, 2493, 2134, 2439 |
| Total Applications | 1064 |
| Issued Applications | 805 |
| Pending Applications | 72 |
| Abandoned Applications | 206 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 5260871
[patent_doc_number] => 20070214504
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-09-13
[patent_title] => 'Method And System For Network Intrusion Detection, Related Network And Computer Program Product'
[patent_app_type] => utility
[patent_app_number] => 10/594306
[patent_app_country] => US
[patent_app_date] => 2004-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5664
[patent_no_of_claims] => 40
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0214/20070214504.pdf
[firstpage_image] =>[orig_patent_app_number] => 10594306
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/594306 | Method and system for network intrusion detection, related network and computer program product | Mar 29, 2004 | Issued |
Array
(
[id] => 7732901
[patent_doc_number] => 08102997
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-01-24
[patent_title] => 'Processor for executing an AES-type algorithm'
[patent_app_type] => utility
[patent_app_number] => 11/547195
[patent_app_country] => US
[patent_app_date] => 2004-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 7192
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/102/08102997.pdf
[firstpage_image] =>[orig_patent_app_number] => 11547195
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/547195 | Processor for executing an AES-type algorithm | Mar 28, 2004 | Issued |
Array
(
[id] => 556589
[patent_doc_number] => 07181761
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2007-02-20
[patent_title] => 'Rights management inter-entity message policies and enforcement'
[patent_app_type] => utility
[patent_app_number] => 10/810068
[patent_app_country] => US
[patent_app_date] => 2004-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 8889
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 206
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/181/07181761.pdf
[firstpage_image] =>[orig_patent_app_number] => 10810068
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/810068 | Rights management inter-entity message policies and enforcement | Mar 25, 2004 | Issued |
Array
(
[id] => 7052483
[patent_doc_number] => 20050188202
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-08-25
[patent_title] => 'Token provisioning'
[patent_app_type] => utility
[patent_app_number] => 10/782751
[patent_app_country] => US
[patent_app_date] => 2004-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2333
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0188/20050188202.pdf
[firstpage_image] =>[orig_patent_app_number] => 10782751
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/782751 | Token provisioning | Feb 22, 2004 | Issued |
Array
(
[id] => 7107324
[patent_doc_number] => 20050108539
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-05-19
[patent_title] => 'Device-type authentication in communication systems'
[patent_app_type] => utility
[patent_app_number] => 10/779862
[patent_app_country] => US
[patent_app_date] => 2004-02-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4198
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0108/20050108539.pdf
[firstpage_image] =>[orig_patent_app_number] => 10779862
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/779862 | Device-type authentication in communication systems | Feb 17, 2004 | Issued |
Array
(
[id] => 593746
[patent_doc_number] => 07461261
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-12-02
[patent_title] => 'Method to generate, verify and deny an undeniable signature'
[patent_app_type] => utility
[patent_app_number] => 10/777661
[patent_app_country] => US
[patent_app_date] => 2004-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8266
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/461/07461261.pdf
[firstpage_image] =>[orig_patent_app_number] => 10777661
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/777661 | Method to generate, verify and deny an undeniable signature | Feb 12, 2004 | Issued |
Array
(
[id] => 333060
[patent_doc_number] => 07512800
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-03-31
[patent_title] => 'Key management technique for establishing a secure channel'
[patent_app_type] => utility
[patent_app_number] => 10/772065
[patent_app_country] => US
[patent_app_date] => 2004-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5770
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/512/07512800.pdf
[firstpage_image] =>[orig_patent_app_number] => 10772065
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/772065 | Key management technique for establishing a secure channel | Feb 2, 2004 | Issued |
Array
(
[id] => 7465582
[patent_doc_number] => 20040120527
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-06-24
[patent_title] => 'Method and apparatus for security in a data processing system'
[patent_app_type] => new
[patent_app_number] => 10/615882
[patent_app_country] => US
[patent_app_date] => 2004-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6901
[patent_no_of_claims] => 57
[patent_no_of_ind_claims] => 18
[patent_words_short_claim] => 41
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0120/20040120527.pdf
[firstpage_image] =>[orig_patent_app_number] => 10615882
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/615882 | Method and apparatus for security in a data processing system | Feb 1, 2004 | Abandoned |
Array
(
[id] => 7399825
[patent_doc_number] => 20040174994
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-09-09
[patent_title] => 'Time based encryption algorithm'
[patent_app_type] => new
[patent_app_number] => 10/762264
[patent_app_country] => US
[patent_app_date] => 2004-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3964
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 11
[patent_words_short_claim] => 13
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0174/20040174994.pdf
[firstpage_image] =>[orig_patent_app_number] => 10762264
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/762264 | Time based encryption algorithm | Jan 22, 2004 | Abandoned |
Array
(
[id] => 7595585
[patent_doc_number] => 07620997
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-11-17
[patent_title] => 'System and method for controlling network access in wireless environment'
[patent_app_type] => utility
[patent_app_number] => 10/748919
[patent_app_country] => US
[patent_app_date] => 2003-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1677
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 72
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/620/07620997.pdf
[firstpage_image] =>[orig_patent_app_number] => 10748919
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/748919 | System and method for controlling network access in wireless environment | Dec 21, 2003 | Issued |
Array
(
[id] => 7296679
[patent_doc_number] => 20040124966
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-07-01
[patent_title] => 'Wireless security module'
[patent_app_type] => new
[patent_app_number] => 10/732655
[patent_app_country] => US
[patent_app_date] => 2003-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6238
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 40
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0124/20040124966.pdf
[firstpage_image] =>[orig_patent_app_number] => 10732655
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/732655 | Wireless security module | Dec 9, 2003 | Issued |
Array
(
[id] => 7477046
[patent_doc_number] => 20040123134
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-06-24
[patent_title] => 'Method and system for electronic conveyance of data in a secure manner'
[patent_app_type] => new
[patent_app_number] => 10/730451
[patent_app_country] => US
[patent_app_date] => 2003-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7839
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 51
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0123/20040123134.pdf
[firstpage_image] =>[orig_patent_app_number] => 10730451
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/730451 | Method and system for electronic conveyance of data in a secure manner | Dec 7, 2003 | Abandoned |
Array
(
[id] => 860419
[patent_doc_number] => 07376829
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-05-20
[patent_title] => 'Terminal, data distribution system comprising such a terminal and method of re-transmitting digital data'
[patent_app_type] => utility
[patent_app_number] => 10/729247
[patent_app_country] => US
[patent_app_date] => 2003-12-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4133
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/376/07376829.pdf
[firstpage_image] =>[orig_patent_app_number] => 10729247
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/729247 | Terminal, data distribution system comprising such a terminal and method of re-transmitting digital data | Dec 3, 2003 | Issued |
Array
(
[id] => 6941317
[patent_doc_number] => 20050114880
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-05-26
[patent_title] => 'System and method for detecting and reporting cable network devices with duplicate media access control addresses'
[patent_app_type] => utility
[patent_app_number] => 10/719836
[patent_app_country] => US
[patent_app_date] => 2003-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8552
[patent_no_of_claims] => 51
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0114/20050114880.pdf
[firstpage_image] =>[orig_patent_app_number] => 10719836
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/719836 | System and method for detecting and reporting cable network devices with duplicate media access control addresses | Nov 20, 2003 | Issued |
Array
(
[id] => 330085
[patent_doc_number] => 07510580
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-03-31
[patent_title] => 'Method and apparatus to eliminate theft of electronic equipment using existing telephone jack'
[patent_app_type] => utility
[patent_app_number] => 10/717650
[patent_app_country] => US
[patent_app_date] => 2003-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1932
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/510/07510580.pdf
[firstpage_image] =>[orig_patent_app_number] => 10717650
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/717650 | Method and apparatus to eliminate theft of electronic equipment using existing telephone jack | Nov 20, 2003 | Issued |
Array
(
[id] => 7234522
[patent_doc_number] => 20040073802
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-04-15
[patent_title] => 'User identification with an improved password input method'
[patent_app_type] => new
[patent_app_number] => 10/468160
[patent_app_country] => US
[patent_app_date] => 2003-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4449
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0073/20040073802.pdf
[firstpage_image] =>[orig_patent_app_number] => 10468160
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/468160 | User identification with an improved password input method | Aug 27, 2003 | Abandoned |
Array
(
[id] => 925190
[patent_doc_number] => 07320143
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-01-15
[patent_title] => 'Method of gaining secure access to intranet resources'
[patent_app_type] => utility
[patent_app_number] => 10/638860
[patent_app_country] => US
[patent_app_date] => 2003-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 5266
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/320/07320143.pdf
[firstpage_image] =>[orig_patent_app_number] => 10638860
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/638860 | Method of gaining secure access to intranet resources | Aug 10, 2003 | Issued |
Array
(
[id] => 6970910
[patent_doc_number] => 20050036620
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-02-17
[patent_title] => 'Encryption of radio frequency identification tags'
[patent_app_type] => utility
[patent_app_number] => 10/626054
[patent_app_country] => US
[patent_app_date] => 2003-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2536
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0036/20050036620.pdf
[firstpage_image] =>[orig_patent_app_number] => 10626054
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/626054 | Encryption of radio frequency identification tags | Jul 22, 2003 | Abandoned |
Array
(
[id] => 7123777
[patent_doc_number] => 20050015606
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-01-20
[patent_title] => 'Malware scanning using a boot with a non-installed operating system and download of malware detection files'
[patent_app_type] => utility
[patent_app_number] => 10/620364
[patent_app_country] => US
[patent_app_date] => 2003-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2991
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0015/20050015606.pdf
[firstpage_image] =>[orig_patent_app_number] => 10620364
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/620364 | Malware scanning using a boot with a non-installed operating system and download of malware detection files | Jul 16, 2003 | Abandoned |
Array
(
[id] => 79916
[patent_doc_number] => 07752665
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2010-07-06
[patent_title] => 'Detecting probes and scans over high-bandwidth, long-term, incomplete network traffic information using limited memory'
[patent_app_type] => utility
[patent_app_number] => 10/620156
[patent_app_country] => US
[patent_app_date] => 2003-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 16
[patent_no_of_words] => 6713
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/752/07752665.pdf
[firstpage_image] =>[orig_patent_app_number] => 10620156
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/620156 | Detecting probes and scans over high-bandwidth, long-term, incomplete network traffic information using limited memory | Jul 13, 2003 | Issued |