Search

Michael J. Simitoski

Examiner (ID: 1937, Phone: (571)272-3841 , Office: P/2493 )

Most Active Art Unit
2493
Art Unit(s)
2434, 2493, 2134, 2439
Total Applications
1064
Issued Applications
805
Pending Applications
72
Abandoned Applications
206

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 5260871 [patent_doc_number] => 20070214504 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-09-13 [patent_title] => 'Method And System For Network Intrusion Detection, Related Network And Computer Program Product' [patent_app_type] => utility [patent_app_number] => 10/594306 [patent_app_country] => US [patent_app_date] => 2004-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5664 [patent_no_of_claims] => 40 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0214/20070214504.pdf [firstpage_image] =>[orig_patent_app_number] => 10594306 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/594306
Method and system for network intrusion detection, related network and computer program product Mar 29, 2004 Issued
Array ( [id] => 7732901 [patent_doc_number] => 08102997 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-01-24 [patent_title] => 'Processor for executing an AES-type algorithm' [patent_app_type] => utility [patent_app_number] => 11/547195 [patent_app_country] => US [patent_app_date] => 2004-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 7192 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 114 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/102/08102997.pdf [firstpage_image] =>[orig_patent_app_number] => 11547195 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/547195
Processor for executing an AES-type algorithm Mar 28, 2004 Issued
Array ( [id] => 556589 [patent_doc_number] => 07181761 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2007-02-20 [patent_title] => 'Rights management inter-entity message policies and enforcement' [patent_app_type] => utility [patent_app_number] => 10/810068 [patent_app_country] => US [patent_app_date] => 2004-03-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 13 [patent_no_of_words] => 8889 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 206 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/181/07181761.pdf [firstpage_image] =>[orig_patent_app_number] => 10810068 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/810068
Rights management inter-entity message policies and enforcement Mar 25, 2004 Issued
Array ( [id] => 7052483 [patent_doc_number] => 20050188202 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-08-25 [patent_title] => 'Token provisioning' [patent_app_type] => utility [patent_app_number] => 10/782751 [patent_app_country] => US [patent_app_date] => 2004-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2333 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0188/20050188202.pdf [firstpage_image] =>[orig_patent_app_number] => 10782751 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/782751
Token provisioning Feb 22, 2004 Issued
Array ( [id] => 7107324 [patent_doc_number] => 20050108539 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-05-19 [patent_title] => 'Device-type authentication in communication systems' [patent_app_type] => utility [patent_app_number] => 10/779862 [patent_app_country] => US [patent_app_date] => 2004-02-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4198 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0108/20050108539.pdf [firstpage_image] =>[orig_patent_app_number] => 10779862 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/779862
Device-type authentication in communication systems Feb 17, 2004 Issued
Array ( [id] => 593746 [patent_doc_number] => 07461261 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2008-12-02 [patent_title] => 'Method to generate, verify and deny an undeniable signature' [patent_app_type] => utility [patent_app_number] => 10/777661 [patent_app_country] => US [patent_app_date] => 2004-02-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8266 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/461/07461261.pdf [firstpage_image] =>[orig_patent_app_number] => 10777661 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/777661
Method to generate, verify and deny an undeniable signature Feb 12, 2004 Issued
Array ( [id] => 333060 [patent_doc_number] => 07512800 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2009-03-31 [patent_title] => 'Key management technique for establishing a secure channel' [patent_app_type] => utility [patent_app_number] => 10/772065 [patent_app_country] => US [patent_app_date] => 2004-02-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5770 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/512/07512800.pdf [firstpage_image] =>[orig_patent_app_number] => 10772065 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/772065
Key management technique for establishing a secure channel Feb 2, 2004 Issued
Array ( [id] => 7465582 [patent_doc_number] => 20040120527 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-06-24 [patent_title] => 'Method and apparatus for security in a data processing system' [patent_app_type] => new [patent_app_number] => 10/615882 [patent_app_country] => US [patent_app_date] => 2004-02-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 6901 [patent_no_of_claims] => 57 [patent_no_of_ind_claims] => 18 [patent_words_short_claim] => 41 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0120/20040120527.pdf [firstpage_image] =>[orig_patent_app_number] => 10615882 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/615882
Method and apparatus for security in a data processing system Feb 1, 2004 Abandoned
Array ( [id] => 7399825 [patent_doc_number] => 20040174994 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-09-09 [patent_title] => 'Time based encryption algorithm' [patent_app_type] => new [patent_app_number] => 10/762264 [patent_app_country] => US [patent_app_date] => 2004-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3964 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 11 [patent_words_short_claim] => 13 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0174/20040174994.pdf [firstpage_image] =>[orig_patent_app_number] => 10762264 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/762264
Time based encryption algorithm Jan 22, 2004 Abandoned
Array ( [id] => 7595585 [patent_doc_number] => 07620997 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2009-11-17 [patent_title] => 'System and method for controlling network access in wireless environment' [patent_app_type] => utility [patent_app_number] => 10/748919 [patent_app_country] => US [patent_app_date] => 2003-12-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 1677 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 72 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/620/07620997.pdf [firstpage_image] =>[orig_patent_app_number] => 10748919 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/748919
System and method for controlling network access in wireless environment Dec 21, 2003 Issued
Array ( [id] => 7296679 [patent_doc_number] => 20040124966 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-07-01 [patent_title] => 'Wireless security module' [patent_app_type] => new [patent_app_number] => 10/732655 [patent_app_country] => US [patent_app_date] => 2003-12-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6238 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 40 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0124/20040124966.pdf [firstpage_image] =>[orig_patent_app_number] => 10732655 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/732655
Wireless security module Dec 9, 2003 Issued
Array ( [id] => 7477046 [patent_doc_number] => 20040123134 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-06-24 [patent_title] => 'Method and system for electronic conveyance of data in a secure manner' [patent_app_type] => new [patent_app_number] => 10/730451 [patent_app_country] => US [patent_app_date] => 2003-12-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 7839 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 51 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0123/20040123134.pdf [firstpage_image] =>[orig_patent_app_number] => 10730451 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/730451
Method and system for electronic conveyance of data in a secure manner Dec 7, 2003 Abandoned
Array ( [id] => 860419 [patent_doc_number] => 07376829 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2008-05-20 [patent_title] => 'Terminal, data distribution system comprising such a terminal and method of re-transmitting digital data' [patent_app_type] => utility [patent_app_number] => 10/729247 [patent_app_country] => US [patent_app_date] => 2003-12-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4133 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 9 [patent_words_short_claim] => 169 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/376/07376829.pdf [firstpage_image] =>[orig_patent_app_number] => 10729247 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/729247
Terminal, data distribution system comprising such a terminal and method of re-transmitting digital data Dec 3, 2003 Issued
Array ( [id] => 6941317 [patent_doc_number] => 20050114880 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-05-26 [patent_title] => 'System and method for detecting and reporting cable network devices with duplicate media access control addresses' [patent_app_type] => utility [patent_app_number] => 10/719836 [patent_app_country] => US [patent_app_date] => 2003-11-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8552 [patent_no_of_claims] => 51 [patent_no_of_ind_claims] => 9 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0114/20050114880.pdf [firstpage_image] =>[orig_patent_app_number] => 10719836 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/719836
System and method for detecting and reporting cable network devices with duplicate media access control addresses Nov 20, 2003 Issued
Array ( [id] => 330085 [patent_doc_number] => 07510580 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2009-03-31 [patent_title] => 'Method and apparatus to eliminate theft of electronic equipment using existing telephone jack' [patent_app_type] => utility [patent_app_number] => 10/717650 [patent_app_country] => US [patent_app_date] => 2003-11-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 1932 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/510/07510580.pdf [firstpage_image] =>[orig_patent_app_number] => 10717650 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/717650
Method and apparatus to eliminate theft of electronic equipment using existing telephone jack Nov 20, 2003 Issued
Array ( [id] => 7234522 [patent_doc_number] => 20040073802 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-04-15 [patent_title] => 'User identification with an improved password input method' [patent_app_type] => new [patent_app_number] => 10/468160 [patent_app_country] => US [patent_app_date] => 2003-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4449 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 73 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0073/20040073802.pdf [firstpage_image] =>[orig_patent_app_number] => 10468160 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/468160
User identification with an improved password input method Aug 27, 2003 Abandoned
Array ( [id] => 925190 [patent_doc_number] => 07320143 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2008-01-15 [patent_title] => 'Method of gaining secure access to intranet resources' [patent_app_type] => utility [patent_app_number] => 10/638860 [patent_app_country] => US [patent_app_date] => 2003-08-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 8 [patent_no_of_words] => 5266 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/320/07320143.pdf [firstpage_image] =>[orig_patent_app_number] => 10638860 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/638860
Method of gaining secure access to intranet resources Aug 10, 2003 Issued
Array ( [id] => 6970910 [patent_doc_number] => 20050036620 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-02-17 [patent_title] => 'Encryption of radio frequency identification tags' [patent_app_type] => utility [patent_app_number] => 10/626054 [patent_app_country] => US [patent_app_date] => 2003-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 2536 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0036/20050036620.pdf [firstpage_image] =>[orig_patent_app_number] => 10626054 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/626054
Encryption of radio frequency identification tags Jul 22, 2003 Abandoned
Array ( [id] => 7123777 [patent_doc_number] => 20050015606 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-01-20 [patent_title] => 'Malware scanning using a boot with a non-installed operating system and download of malware detection files' [patent_app_type] => utility [patent_app_number] => 10/620364 [patent_app_country] => US [patent_app_date] => 2003-07-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2991 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0015/20050015606.pdf [firstpage_image] =>[orig_patent_app_number] => 10620364 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/620364
Malware scanning using a boot with a non-installed operating system and download of malware detection files Jul 16, 2003 Abandoned
Array ( [id] => 79916 [patent_doc_number] => 07752665 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2010-07-06 [patent_title] => 'Detecting probes and scans over high-bandwidth, long-term, incomplete network traffic information using limited memory' [patent_app_type] => utility [patent_app_number] => 10/620156 [patent_app_country] => US [patent_app_date] => 2003-07-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 16 [patent_no_of_words] => 6713 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 199 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/752/07752665.pdf [firstpage_image] =>[orig_patent_app_number] => 10620156 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/620156
Detecting probes and scans over high-bandwidth, long-term, incomplete network traffic information using limited memory Jul 13, 2003 Issued
Menu