Search

Paul V. Kulik

Examiner (ID: 8515)

Most Active Art Unit
2307
Art Unit(s)
2776, 2177, 2307, 2771, 2777
Total Applications
657
Issued Applications
529
Pending Applications
25
Abandoned Applications
103

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 7227373 [patent_doc_number] => 20040156501 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-08-12 [patent_title] => 'Font level encryption method and apparatus' [patent_app_type] => new [patent_app_number] => 10/360270 [patent_app_country] => US [patent_app_date] => 2003-02-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 1093 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 58 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0156/20040156501.pdf [firstpage_image] =>[orig_patent_app_number] => 10360270 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/360270
Font level encryption method and apparatus Feb 6, 2003 Issued
Array ( [id] => 7457655 [patent_doc_number] => 20040010699 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-01-15 [patent_title] => 'Secure data management techniques' [patent_app_type] => new [patent_app_number] => 10/360826 [patent_app_country] => US [patent_app_date] => 2003-02-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 11205 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 101 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0010/20040010699.pdf [firstpage_image] =>[orig_patent_app_number] => 10360826 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/360826
Secure data management techniques Feb 5, 2003 Abandoned
Array ( [id] => 7446093 [patent_doc_number] => 20040003275 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-01-01 [patent_title] => 'Information storage apparatus, information processing system, specific number generating method and specific number generating program' [patent_app_type] => new [patent_app_number] => 10/360029 [patent_app_country] => US [patent_app_date] => 2003-02-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 27 [patent_figures_cnt] => 27 [patent_no_of_words] => 12350 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 72 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0003/20040003275.pdf [firstpage_image] =>[orig_patent_app_number] => 10360029 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/360029
Information storage apparatus, information processing system, specific number generating method and specific number generating program Feb 5, 2003 Abandoned
Array ( [id] => 7676183 [patent_doc_number] => 20040153644 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-08-05 [patent_title] => 'Preventing execution of potentially malicious software' [patent_app_type] => new [patent_app_number] => 10/359422 [patent_app_country] => US [patent_app_date] => 2003-02-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6484 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 55 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0153/20040153644.pdf [firstpage_image] =>[orig_patent_app_number] => 10359422 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/359422
Preventing execution of potentially malicious software Feb 4, 2003 Abandoned
Array ( [id] => 7676161 [patent_doc_number] => 20040153666 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-08-05 [patent_title] => 'Structured rollout of updates to malicious computer code detection definitions' [patent_app_type] => new [patent_app_number] => 10/359416 [patent_app_country] => US [patent_app_date] => 2003-02-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 2777 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 57 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0153/20040153666.pdf [firstpage_image] =>[orig_patent_app_number] => 10359416 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/359416
Structured rollout of updates to malicious computer code detection definitions Feb 4, 2003 Abandoned
Array ( [id] => 7673610 [patent_doc_number] => 20040128508 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-07-01 [patent_title] => 'Method and apparatus for access authentication entity' [patent_app_type] => new [patent_app_number] => 10/343618 [patent_app_country] => US [patent_app_date] => 2003-02-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 25 [patent_figures_cnt] => 25 [patent_no_of_words] => 25437 [patent_no_of_claims] => 122 [patent_no_of_ind_claims] => 36 [patent_words_short_claim] => 97 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0128/20040128508.pdf [firstpage_image] =>[orig_patent_app_number] => 10343618 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/343618
Method and apparatus for access authentication entity Feb 2, 2003 Abandoned
Array ( [id] => 7359914 [patent_doc_number] => 20040091103 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-05-13 [patent_title] => 'Method for data transmission' [patent_app_type] => new [patent_app_number] => 10/343614 [patent_app_country] => US [patent_app_date] => 2003-02-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 1404 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 158 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0091/20040091103.pdf [firstpage_image] =>[orig_patent_app_number] => 10343614 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/343614
Method for data transmission Feb 2, 2003 Abandoned
Array ( [id] => 6712515 [patent_doc_number] => 20030172264 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2003-09-11 [patent_title] => 'Method and system for providing security in performance enhanced network' [patent_app_type] => new [patent_app_number] => 10/353231 [patent_app_country] => US [patent_app_date] => 2003-01-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 17546 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 64 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0172/20030172264.pdf [firstpage_image] =>[orig_patent_app_number] => 10353231 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/353231
Method and system for providing security in performance enhanced network Jan 27, 2003 Abandoned
Array ( [id] => 7673568 [patent_doc_number] => 20040128550 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-07-01 [patent_title] => 'Systems and methods for detecting and tracing denial of service attacks' [patent_app_type] => new [patent_app_number] => 10/335197 [patent_app_country] => US [patent_app_date] => 2002-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4059 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 72 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0128/20040128550.pdf [firstpage_image] =>[orig_patent_app_number] => 10335197 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/335197
Systems and methods for detecting and tracing denial of service attacks Dec 30, 2002 Issued
Array ( [id] => 404479 [patent_doc_number] => 07293284 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2007-11-06 [patent_title] => 'Codeword-enhanced peer-to-peer authentication' [patent_app_type] => utility [patent_app_number] => 10/334765 [patent_app_country] => US [patent_app_date] => 2002-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 17 [patent_no_of_words] => 7727 [patent_no_of_claims] => 88 [patent_no_of_ind_claims] => 16 [patent_words_short_claim] => 151 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/293/07293284.pdf [firstpage_image] =>[orig_patent_app_number] => 10334765 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/334765
Codeword-enhanced peer-to-peer authentication Dec 30, 2002 Issued
Array ( [id] => 400849 [patent_doc_number] => 07296293 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2007-11-13 [patent_title] => 'Using a benevolent worm to assess and correct computer security vulnerabilities' [patent_app_type] => utility [patent_app_number] => 10/334767 [patent_app_country] => US [patent_app_date] => 2002-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 3596 [patent_no_of_claims] => 41 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 113 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/296/07296293.pdf [firstpage_image] =>[orig_patent_app_number] => 10334767 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/334767
Using a benevolent worm to assess and correct computer security vulnerabilities Dec 30, 2002 Issued
Array ( [id] => 7673558 [patent_doc_number] => 20040128560 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-07-01 [patent_title] => 'Security system preventing computer access upon removal from a controlled area' [patent_app_type] => new [patent_app_number] => 10/334873 [patent_app_country] => US [patent_app_date] => 2002-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 7462 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 321 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0128/20040128560.pdf [firstpage_image] =>[orig_patent_app_number] => 10334873 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/334873
Security system preventing computer access upon removal from a controlled area Dec 30, 2002 Abandoned
Array ( [id] => 695803 [patent_doc_number] => 07076802 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2006-07-11 [patent_title] => 'Trusted system clock' [patent_app_type] => utility [patent_app_number] => 10/334954 [patent_app_country] => US [patent_app_date] => 2002-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5531 [patent_no_of_claims] => 37 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 69 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/076/07076802.pdf [firstpage_image] =>[orig_patent_app_number] => 10334954 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/334954
Trusted system clock Dec 30, 2002 Issued
Array ( [id] => 6763067 [patent_doc_number] => 20030126429 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2003-07-03 [patent_title] => 'Node device and communication control method for improving security of packet communications' [patent_app_type] => new [patent_app_number] => 10/329370 [patent_app_country] => US [patent_app_date] => 2002-12-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6864 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 250 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0126/20030126429.pdf [firstpage_image] =>[orig_patent_app_number] => 10329370 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/329370
Node device and communication control method for improving security of packet communications Dec 26, 2002 Issued
Array ( [id] => 7360956 [patent_doc_number] => 20040049695 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-03-11 [patent_title] => 'System for providing a real-time attacking connection traceback using a packet watermark insertion technique and method therefor' [patent_app_type] => new [patent_app_number] => 10/329270 [patent_app_country] => US [patent_app_date] => 2002-12-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 2098 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 201 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0049/20040049695.pdf [firstpage_image] =>[orig_patent_app_number] => 10329270 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/329270
System for providing a real-time attacking connection traceback using a packet watermark insertion technique and method therefor Dec 23, 2002 Abandoned
Array ( [id] => 5284020 [patent_doc_number] => 20090097695 [patent_country] => US [patent_kind] => A9 [patent_issue_date] => 2009-04-16 [patent_title] => 'Personal document authentication system using watermarking' [patent_app_type] => utility [patent_app_number] => 10/326575 [patent_app_country] => US [patent_app_date] => 2002-12-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2739 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A9/0097/20090097695.pdf [firstpage_image] =>[orig_patent_app_number] => 10326575 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/326575
Personal document authentication system using watermarking Dec 19, 2002 Abandoned
Array ( [id] => 5284020 [patent_doc_number] => 20090097695 [patent_country] => US [patent_kind] => A9 [patent_issue_date] => 2009-04-16 [patent_title] => 'Personal document authentication system using watermarking' [patent_app_type] => utility [patent_app_number] => 10/326575 [patent_app_country] => US [patent_app_date] => 2002-12-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2739 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A9/0097/20090097695.pdf [firstpage_image] =>[orig_patent_app_number] => 10326575 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/326575
Personal document authentication system using watermarking Dec 19, 2002 Abandoned
Array ( [id] => 7477019 [patent_doc_number] => 20040123117 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-06-24 [patent_title] => 'Validation for behavior-blocking system' [patent_app_type] => new [patent_app_number] => 10/325580 [patent_app_country] => US [patent_app_date] => 2002-12-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6533 [patent_no_of_claims] => 36 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 30 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0123/20040123117.pdf [firstpage_image] =>[orig_patent_app_number] => 10325580 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/325580
Validation for behavior-blocking system Dec 17, 2002 Abandoned
Array ( [id] => 7293465 [patent_doc_number] => 20040111601 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-06-10 [patent_title] => 'System and method for the exchange of cryptographic keys' [patent_app_type] => new [patent_app_number] => 10/314089 [patent_app_country] => US [patent_app_date] => 2002-12-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5382 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 54 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0111/20040111601.pdf [firstpage_image] =>[orig_patent_app_number] => 10314089 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/314089
System and method for the exchange of cryptographic keys Dec 5, 2002 Abandoned
Array ( [id] => 7293474 [patent_doc_number] => 20040111610 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-06-10 [patent_title] => 'Secure file format' [patent_app_type] => new [patent_app_number] => 10/310189 [patent_app_country] => US [patent_app_date] => 2002-12-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 11405 [patent_no_of_claims] => 48 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 84 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0111/20040111610.pdf [firstpage_image] =>[orig_patent_app_number] => 10310189 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/310189
Secure file format Dec 4, 2002 Abandoned
Menu