
Paul V. Kulik
Examiner (ID: 8515)
| Most Active Art Unit | 2307 |
| Art Unit(s) | 2776, 2177, 2307, 2771, 2777 |
| Total Applications | 657 |
| Issued Applications | 529 |
| Pending Applications | 25 |
| Abandoned Applications | 103 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9787988
[patent_doc_number] => 20140304808
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-09
[patent_title] => 'Device-Specific Authentication Credentials'
[patent_app_type] => utility
[patent_app_number] => 13/857714
[patent_app_country] => US
[patent_app_date] => 2013-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8070
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13857714
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/857714 | Device-Specific Authentication Credentials | Apr 4, 2013 | Abandoned |
Array
(
[id] => 9747149
[patent_doc_number] => 20140282868
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'Method And Apparatus To Effect Re-Authentication'
[patent_app_type] => utility
[patent_app_number] => 13/832556
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8631
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13832556
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/832556 | Method And Apparatus To Effect Re-Authentication | Mar 14, 2013 | Abandoned |
Array
(
[id] => 14983225
[patent_doc_number] => 10445530
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-10-15
[patent_title] => Hardware intrusion detection system
[patent_app_type] => utility
[patent_app_number] => 13/834673
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5007
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 291
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13834673
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/834673 | Hardware intrusion detection system | Mar 14, 2013 | Issued |
Array
(
[id] => 9747391
[patent_doc_number] => 20140283111
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'SPATIAL SECURITY FOR STORED DATA'
[patent_app_type] => utility
[patent_app_number] => 13/833497
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8324
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13833497
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/833497 | Spatial security for stored data | Mar 14, 2013 | Issued |
Array
(
[id] => 9745772
[patent_doc_number] => 20140281491
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'IDENTITY ESCROW MANAGEMENT FOR MINIMAL DISCLOSURE CREDENTIALS'
[patent_app_type] => utility
[patent_app_number] => 13/834286
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10460
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13834286
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/834286 | IDENTITY ESCROW MANAGEMENT FOR MINIMAL DISCLOSURE CREDENTIALS | Mar 14, 2013 | Abandoned |
Array
(
[id] => 9747148
[patent_doc_number] => 20140282867
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'DEVICE LOCAL REPUTATION SCORE CACHE'
[patent_app_type] => utility
[patent_app_number] => 13/832330
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5079
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13832330
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/832330 | DEVICE LOCAL REPUTATION SCORE CACHE | Mar 14, 2013 | Abandoned |
Array
(
[id] => 10195030
[patent_doc_number] => 09223941
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-29
[patent_title] => 'Using a URI whitelist'
[patent_app_type] => utility
[patent_app_number] => 13/832972
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 18333
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 75
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13832972
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/832972 | Using a URI whitelist | Mar 14, 2013 | Issued |
Array
(
[id] => 9658727
[patent_doc_number] => 20140229732
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-14
[patent_title] => 'DATA SECURITY SERVICE'
[patent_app_type] => utility
[patent_app_number] => 13/765265
[patent_app_country] => US
[patent_app_date] => 2013-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 20839
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13765265
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/765265 | DATA SECURITY SERVICE | Feb 11, 2013 | Abandoned |
Array
(
[id] => 9265174
[patent_doc_number] => 20130347104
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-26
[patent_title] => 'ANALYZING EXECUTABLE BINARY CODE WITHOUT DETECTION'
[patent_app_type] => utility
[patent_app_number] => 13/764332
[patent_app_country] => US
[patent_app_date] => 2013-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8778
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13764332
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/764332 | ANALYZING EXECUTABLE BINARY CODE WITHOUT DETECTION | Feb 10, 2013 | Abandoned |
Array
(
[id] => 9659046
[patent_doc_number] => 20140230051
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-14
[patent_title] => 'FRAUD DETECTION FOR IDENTITY MANAGEMENT SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 13/763553
[patent_app_country] => US
[patent_app_date] => 2013-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3411
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13763553
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/763553 | FRAUD DETECTION FOR IDENTITY MANAGEMENT SYSTEMS | Feb 7, 2013 | Abandoned |
Array
(
[id] => 11267298
[patent_doc_number] => 09491620
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-08
[patent_title] => 'Enabling secure access to a discovered location server for a mobile device'
[patent_app_type] => utility
[patent_app_number] => 13/762280
[patent_app_country] => US
[patent_app_date] => 2013-02-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 19457
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 250
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13762280
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/762280 | Enabling secure access to a discovered location server for a mobile device | Feb 6, 2013 | Issued |
Array
(
[id] => 10159423
[patent_doc_number] => 09191208
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-17
[patent_title] => 'Schemes for signcryption'
[patent_app_type] => utility
[patent_app_number] => 13/995312
[patent_app_country] => US
[patent_app_date] => 2012-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7655
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13995312
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/995312 | Schemes for signcryption | Dec 17, 2012 | Issued |
Array
(
[id] => 8781966
[patent_doc_number] => 20130103941
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-25
[patent_title] => 'METHOD FOR UPDATING DATA IN A SECURITY MODULE'
[patent_app_type] => utility
[patent_app_number] => 13/711014
[patent_app_country] => US
[patent_app_date] => 2012-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4046
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13711014
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/711014 | METHOD FOR UPDATING DATA IN A SECURITY MODULE | Dec 10, 2012 | Abandoned |
Array
(
[id] => 10956748
[patent_doc_number] => 20140359770
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-04
[patent_title] => 'APPARATUS AND METHODS FOR PREVENTING PAYMENT WEBPAGE TAMPERING'
[patent_app_type] => utility
[patent_app_number] => 14/345056
[patent_app_country] => US
[patent_app_date] => 2012-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4537
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14345056
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/345056 | APPARATUS AND METHODS FOR PREVENTING PAYMENT WEBPAGE TAMPERING | Sep 13, 2012 | Abandoned |
Array
(
[id] => 9404706
[patent_doc_number] => 08694770
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-04-08
[patent_title] => 'Auditable cryptographic protected cloud computing communication system'
[patent_app_type] => utility
[patent_app_number] => 13/590281
[patent_app_country] => US
[patent_app_date] => 2012-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4856
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 995
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13590281
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/590281 | Auditable cryptographic protected cloud computing communication system | Aug 20, 2012 | Issued |
Array
(
[id] => 8632851
[patent_doc_number] => 08364950
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-01-29
[patent_title] => 'Auditable cryptographic protected communication system'
[patent_app_type] => utility
[patent_app_number] => 13/552396
[patent_app_country] => US
[patent_app_date] => 2012-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3377
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 946
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13552396
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/552396 | Auditable cryptographic protected communication system | Jul 17, 2012 | Issued |
Array
(
[id] => 11432883
[patent_doc_number] => 09571213
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-14
[patent_title] => 'Tag generation method in broadcast encryption system'
[patent_app_type] => utility
[patent_app_number] => 13/538886
[patent_app_country] => US
[patent_app_date] => 2012-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 4888
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 266
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13538886
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/538886 | Tag generation method in broadcast encryption system | Jun 28, 2012 | Issued |
Array
(
[id] => 8395861
[patent_doc_number] => 20120233703
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-09-13
[patent_title] => 'TECHNIQUES TO POLLUTE ELECTRONIC PROFILING'
[patent_app_type] => utility
[patent_app_number] => 13/479539
[patent_app_country] => US
[patent_app_date] => 2012-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6388
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13479539
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/479539 | TECHNIQUES TO POLLUTE ELECTRONIC PROFILING | May 23, 2012 | Abandoned |
Array
(
[id] => 10901835
[patent_doc_number] => 08925081
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-30
[patent_title] => 'Application based intrusion detection'
[patent_app_type] => utility
[patent_app_number] => 13/469357
[patent_app_country] => US
[patent_app_date] => 2012-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 3393
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 358
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13469357
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/469357 | Application based intrusion detection | May 10, 2012 | Issued |
Array
(
[id] => 8360878
[patent_doc_number] => 20120216032
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-08-23
[patent_title] => 'MULTIPLE-STAGE SYSTEM AND METHOD FOR PROCESSING ENCODED MESSAGES'
[patent_app_type] => utility
[patent_app_number] => 13/462266
[patent_app_country] => US
[patent_app_date] => 2012-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 17617
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13462266
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/462266 | Multiple-stage system and method for processing encoded messages | May 1, 2012 | Issued |