
Michael Tomaszewski
Examiner (ID: 11878, Phone: (313)446-4863 , Office: P/3626 )
| Most Active Art Unit | 3686 |
| Art Unit(s) | 3626, 3686, 3681 |
| Total Applications | 738 |
| Issued Applications | 339 |
| Pending Applications | 60 |
| Abandoned Applications | 344 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9751355
[patent_doc_number] => 08842841
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-23
[patent_title] => 'Cryptographic method and system'
[patent_app_type] => utility
[patent_app_number] => 13/969071
[patent_app_country] => US
[patent_app_date] => 2013-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 60610
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13969071
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/969071 | Cryptographic method and system | Aug 15, 2013 | Issued |
Array
(
[id] => 9110227
[patent_doc_number] => 20130283359
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-24
[patent_title] => 'ESTABLISHING ACCESS CONTROLS IN A PREMISE-BASED ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 13/919969
[patent_app_country] => US
[patent_app_date] => 2013-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10463
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13919969
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/919969 | Establishing access controls in a premise-based environment | Jun 16, 2013 | Issued |
Array
(
[id] => 9096223
[patent_doc_number] => 20130275534
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-17
[patent_title] => 'SYSTEM AND METHOD EMPLOYING AN AGILE NETWORK PROTOCOL FOR SECURE COMMUNICATIONS USING SECURE DOMAIN NAMES'
[patent_app_type] => utility
[patent_app_number] => 13/911813
[patent_app_country] => US
[patent_app_date] => 2013-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 41
[patent_figures_cnt] => 41
[patent_no_of_words] => 33495
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13911813
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/911813 | System and method employing an agile network protocol for secure communications using secure domain names | Jun 5, 2013 | Issued |
Array
(
[id] => 9083482
[patent_doc_number] => 20130269012
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-10
[patent_title] => 'System and Method for Securely Provisioning and Generating One-Time-Passwords in a Remote Device'
[patent_app_type] => utility
[patent_app_number] => 13/896774
[patent_app_country] => US
[patent_app_date] => 2013-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7567
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13896774
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/896774 | System and method for securely provisioning and generating one-time-passwords in a remote device | May 16, 2013 | Issued |
Array
(
[id] => 9974537
[patent_doc_number] => 09021575
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-28
[patent_title] => 'Selectively performing man in the middle decryption'
[patent_app_type] => utility
[patent_app_number] => 13/890146
[patent_app_country] => US
[patent_app_date] => 2013-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7114
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13890146
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/890146 | Selectively performing man in the middle decryption | May 7, 2013 | Issued |
Array
(
[id] => 9056405
[patent_doc_number] => 20130254119
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-26
[patent_title] => 'SYSTEM AND METHOD FOR AUTHENTICATING A NETWORK GATEWAY'
[patent_app_type] => utility
[patent_app_number] => 13/850234
[patent_app_country] => US
[patent_app_date] => 2013-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12777
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13850234
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/850234 | System and method for authenticating a network gateway | Mar 24, 2013 | Issued |
Array
(
[id] => 9593208
[patent_doc_number] => 08782774
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-07-15
[patent_title] => 'Secure session capability using public-key cryptography without access to the private key'
[patent_app_type] => utility
[patent_app_number] => 13/788784
[patent_app_country] => US
[patent_app_date] => 2013-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 12683
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13788784
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/788784 | Secure session capability using public-key cryptography without access to the private key | Mar 6, 2013 | Issued |
Array
(
[id] => 10501680
[patent_doc_number] => 09230081
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-05
[patent_title] => 'User authorization and presence detection in isolation from interference from and control by host central processing unit and operating system'
[patent_app_type] => utility
[patent_app_number] => 13/785883
[patent_app_country] => US
[patent_app_date] => 2013-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8898
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 479
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13785883
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/785883 | User authorization and presence detection in isolation from interference from and control by host central processing unit and operating system | Mar 4, 2013 | Issued |
Array
(
[id] => 9698256
[patent_doc_number] => 20140247941
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-04
[patent_title] => 'SELF-CONFIGURING WIRELESS NETWORK'
[patent_app_type] => utility
[patent_app_number] => 13/783005
[patent_app_country] => US
[patent_app_date] => 2013-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11858
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13783005
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/783005 | SELF-CONFIGURING WIRELESS NETWORK | Feb 28, 2013 | Abandoned |
Array
(
[id] => 8942093
[patent_doc_number] => 20130191890
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-25
[patent_title] => 'METHOD AND SYSTEM FOR USER IDENTITY RECOGNITION BASED ON SPECIFIC INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 13/746130
[patent_app_country] => US
[patent_app_date] => 2013-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5473
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13746130
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/746130 | METHOD AND SYSTEM FOR USER IDENTITY RECOGNITION BASED ON SPECIFIC INFORMATION | Jan 20, 2013 | Abandoned |
Array
(
[id] => 9612003
[patent_doc_number] => 08789193
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-22
[patent_title] => 'Method and apparatus for detecting events pertaining to potential change in vulnerability status'
[patent_app_type] => utility
[patent_app_number] => 13/732453
[patent_app_country] => US
[patent_app_date] => 2013-01-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 17
[patent_no_of_words] => 13830
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13732453
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/732453 | Method and apparatus for detecting events pertaining to potential change in vulnerability status | Jan 1, 2013 | Issued |
Array
(
[id] => 10190205
[patent_doc_number] => 09219638
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-22
[patent_title] => 'Apparatus and method for applying network policy at a network device'
[patent_app_type] => utility
[patent_app_number] => 13/685435
[patent_app_country] => US
[patent_app_date] => 2012-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6267
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13685435
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/685435 | Apparatus and method for applying network policy at a network device | Nov 25, 2012 | Issued |
Array
(
[id] => 8782212
[patent_doc_number] => 20130104187
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-25
[patent_title] => 'CONTEXT-DEPENDENT AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 13/655033
[patent_app_country] => US
[patent_app_date] => 2012-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5287
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13655033
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/655033 | CONTEXT-DEPENDENT AUTHENTICATION | Oct 17, 2012 | Abandoned |
Array
(
[id] => 8485123
[patent_doc_number] => 20120284531
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-08
[patent_title] => 'METHOD AND APPARATUS FOR CRYPTOGRAPHIC CONVERSION IN A DATA STORAGE SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/547161
[patent_app_country] => US
[patent_app_date] => 2012-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5033
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13547161
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/547161 | METHOD AND APPARATUS FOR CRYPTOGRAPHIC CONVERSION IN A DATA STORAGE SYSTEM | Jul 11, 2012 | Abandoned |
Array
(
[id] => 8837437
[patent_doc_number] => 08453207
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-05-28
[patent_title] => 'Methods and systems for improving the security of secret authentication data during authentication transactions'
[patent_app_type] => utility
[patent_app_number] => 13/546130
[patent_app_country] => US
[patent_app_date] => 2012-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 19
[patent_no_of_words] => 12118
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13546130
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/546130 | Methods and systems for improving the security of secret authentication data during authentication transactions | Jul 10, 2012 | Issued |
Array
(
[id] => 8687056
[patent_doc_number] => 20130055340
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-02-28
[patent_title] => 'INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 13/533077
[patent_app_country] => US
[patent_app_date] => 2012-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 43
[patent_figures_cnt] => 43
[patent_no_of_words] => 24684
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13533077
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/533077 | Information processing apparatus, information processing method, and computer program product | Jun 25, 2012 | Issued |
Array
(
[id] => 10072721
[patent_doc_number] => 09111081
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-18
[patent_title] => 'Remote direct memory access authentication of a device'
[patent_app_type] => utility
[patent_app_number] => 13/533582
[patent_app_country] => US
[patent_app_date] => 2012-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 5280
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13533582
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/533582 | Remote direct memory access authentication of a device | Jun 25, 2012 | Issued |
Array
(
[id] => 9265130
[patent_doc_number] => 20130347059
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-26
[patent_title] => 'Method for Propagating Access Policies'
[patent_app_type] => utility
[patent_app_number] => 13/533478
[patent_app_country] => US
[patent_app_date] => 2012-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3145
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13533478
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/533478 | Method for propagating access policies | Jun 25, 2012 | Issued |
Array
(
[id] => 9265171
[patent_doc_number] => 20130347099
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-26
[patent_title] => 'KEYBOARD AS BIOMETRIC AUTHENTICATION DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/532852
[patent_app_country] => US
[patent_app_date] => 2012-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 21278
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13532852
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/532852 | Keyboard as biometric authentication device | Jun 25, 2012 | Issued |
Array
(
[id] => 11782546
[patent_doc_number] => 09391770
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'Method of cryption'
[patent_app_type] => utility
[patent_app_number] => 14/407908
[patent_app_country] => US
[patent_app_date] => 2012-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 5
[patent_no_of_words] => 8002
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14407908
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/407908 | Method of cryption | Jun 11, 2012 | Issued |