
Peter Rosenberg
Examiner (ID: 13086)
| Most Active Art Unit | 1101 |
| Art Unit(s) | 1101, 1311, 1304, 1805 |
| Total Applications | 1725 |
| Issued Applications | 1636 |
| Pending Applications | 2 |
| Abandoned Applications | 87 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11235217
[patent_doc_number] => 09462469
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-04
[patent_title] => 'Systems and methods for short range wireless data transfer'
[patent_app_type] => utility
[patent_app_number] => 14/258007
[patent_app_country] => US
[patent_app_date] => 2014-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 15
[patent_no_of_words] => 6987
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14258007
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/258007 | Systems and methods for short range wireless data transfer | Apr 20, 2014 | Issued |
Array
(
[id] => 10386151
[patent_doc_number] => 20150271158
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-24
[patent_title] => 'Rule-based Validity of Cryptographic Key Material'
[patent_app_type] => utility
[patent_app_number] => 14/255745
[patent_app_country] => US
[patent_app_date] => 2014-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 19998
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14255745
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/255745 | Rule-based validity of cryptographic key material | Apr 16, 2014 | Issued |
Array
(
[id] => 11688189
[patent_doc_number] => 09686244
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-20
[patent_title] => 'Rule-based validity of cryptographic key material'
[patent_app_type] => utility
[patent_app_number] => 14/255762
[patent_app_country] => US
[patent_app_date] => 2014-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 20141
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14255762
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/255762 | Rule-based validity of cryptographic key material | Apr 16, 2014 | Issued |
Array
(
[id] => 10386150
[patent_doc_number] => 20150271157
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-24
[patent_title] => 'Rule-based Validity of Cryptographic Key Material'
[patent_app_type] => utility
[patent_app_number] => 14/255710
[patent_app_country] => US
[patent_app_date] => 2014-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 19999
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14255710
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/255710 | Rule-based validity of cryptographic key material | Apr 16, 2014 | Issued |
Array
(
[id] => 10410901
[patent_doc_number] => 20150295910
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-15
[patent_title] => 'AUTHENTICATING DATA AT A MICROCONTROLLER USING MESSAGE AUTHENTICATION CODES'
[patent_app_type] => utility
[patent_app_number] => 14/253454
[patent_app_country] => US
[patent_app_date] => 2014-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5754
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14253454
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/253454 | Authenticating data at a microcontroller using message authentication codes | Apr 14, 2014 | Issued |
Array
(
[id] => 10409113
[patent_doc_number] => 20150294122
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-15
[patent_title] => 'METHOD AND APPARATUS FOR DOWNLOADABLE DRM IN A TRUSTED EXECUTION ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/252537
[patent_app_country] => US
[patent_app_date] => 2014-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4321
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14252537
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/252537 | METHOD AND APPARATUS FOR DOWNLOADABLE DRM IN A TRUSTED EXECUTION ENVIRONMENT | Apr 13, 2014 | Abandoned |
Array
(
[id] => 10719428
[patent_doc_number] => 20160065575
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'Communication Managing Method and Communication System'
[patent_app_type] => utility
[patent_app_number] => 14/786990
[patent_app_country] => US
[patent_app_date] => 2013-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7025
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14786990
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/786990 | Communication managing method and communication system | Apr 10, 2014 | Issued |
Array
(
[id] => 10408971
[patent_doc_number] => 20150293980
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-15
[patent_title] => 'DATA COMPASS'
[patent_app_type] => utility
[patent_app_number] => 14/251067
[patent_app_country] => US
[patent_app_date] => 2014-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10269
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14251067
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/251067 | Data compass | Apr 10, 2014 | Issued |
Array
(
[id] => 11777029
[patent_doc_number] => 09386018
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-05
[patent_title] => 'Distributed cryptography system'
[patent_app_type] => utility
[patent_app_number] => 14/251561
[patent_app_country] => US
[patent_app_date] => 2014-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 3614
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 263
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14251561
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/251561 | Distributed cryptography system | Apr 10, 2014 | Issued |
Array
(
[id] => 10410890
[patent_doc_number] => 20150295899
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-15
[patent_title] => 'Group Member Recovery Techniques'
[patent_app_type] => utility
[patent_app_number] => 14/248399
[patent_app_country] => US
[patent_app_date] => 2014-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7147
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14248399
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/248399 | Group member recovery techniques | Apr 8, 2014 | Issued |
Array
(
[id] => 9645070
[patent_doc_number] => 20140223183
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-07
[patent_title] => 'Apparatus and Method for Securing Digital Data with a Security Token'
[patent_app_type] => utility
[patent_app_number] => 14/247114
[patent_app_country] => US
[patent_app_date] => 2014-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6833
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14247114
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/247114 | Apparatus and Method for Securing Digital Data with a Security Token | Apr 6, 2014 | Abandoned |
Array
(
[id] => 10632546
[patent_doc_number] => 09350709
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-24
[patent_title] => 'Synchronizing a routing-plane and crypto-plane for routers in virtual private networks'
[patent_app_type] => utility
[patent_app_number] => 14/246359
[patent_app_country] => US
[patent_app_date] => 2014-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5939
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14246359
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/246359 | Synchronizing a routing-plane and crypto-plane for routers in virtual private networks | Apr 6, 2014 | Issued |
Array
(
[id] => 10195104
[patent_doc_number] => 09224015
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-29
[patent_title] => 'Smart wallet'
[patent_app_type] => utility
[patent_app_number] => 14/246735
[patent_app_country] => US
[patent_app_date] => 2014-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 19
[patent_no_of_words] => 4370
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14246735
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/246735 | Smart wallet | Apr 6, 2014 | Issued |
Array
(
[id] => 10401799
[patent_doc_number] => 20150286808
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'MARKED IMAGE FILE SECURITY SYSTEM AND PROCESS'
[patent_app_type] => utility
[patent_app_number] => 14/246000
[patent_app_country] => US
[patent_app_date] => 2014-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7103
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14246000
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/246000 | MARKED IMAGE FILE SECURITY SYSTEM AND PROCESS | Apr 3, 2014 | Abandoned |
Array
(
[id] => 10401797
[patent_doc_number] => 20150286807
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'MARKED IMAGE FILE SECURITY SYSTEM AND PROCESS'
[patent_app_type] => utility
[patent_app_number] => 14/245995
[patent_app_country] => US
[patent_app_date] => 2014-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7103
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14245995
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/245995 | MARKED IMAGE FILE SECURITY SYSTEM AND PROCESS | Apr 3, 2014 | Abandoned |
Array
(
[id] => 10401823
[patent_doc_number] => 20150286832
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'PHOTOBOOK WITH AUGMENTED SOCIAL CAPABILITY'
[patent_app_type] => utility
[patent_app_number] => 14/244109
[patent_app_country] => US
[patent_app_date] => 2014-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5708
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14244109
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/244109 | Photobook with augmented social capability | Apr 2, 2014 | Issued |
Array
(
[id] => 9787986
[patent_doc_number] => 20140304807
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-09
[patent_title] => 'METHOD TO ACTIVATE AND RESTRICT CONTROL OF A DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/244212
[patent_app_country] => US
[patent_app_date] => 2014-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1002
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14244212
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/244212 | METHOD TO ACTIVATE AND RESTRICT CONTROL OF A DEVICE | Apr 2, 2014 | Abandoned |
Array
(
[id] => 10550624
[patent_doc_number] => 09275251
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-01
[patent_title] => 'Segment deduplication system with encryption and compression of segments'
[patent_app_type] => utility
[patent_app_number] => 14/244777
[patent_app_country] => US
[patent_app_date] => 2014-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 16
[patent_no_of_words] => 7134
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14244777
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/244777 | Segment deduplication system with encryption and compression of segments | Apr 2, 2014 | Issued |
Array
(
[id] => 10396265
[patent_doc_number] => 20150281273
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-01
[patent_title] => 'SYSTEM AND METHOD FOR DETERMINING MALICIOUS NETWORK ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 14/242235
[patent_app_country] => US
[patent_app_date] => 2014-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8160
[patent_no_of_claims] => 42
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14242235
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/242235 | System and method for deterring malicious network attacks | Mar 31, 2014 | Issued |
Array
(
[id] => 10598321
[patent_doc_number] => 09319422
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-19
[patent_title] => 'Detecting remote operation of a computer'
[patent_app_type] => utility
[patent_app_number] => 14/230436
[patent_app_country] => US
[patent_app_date] => 2014-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3647
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14230436
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/230436 | Detecting remote operation of a computer | Mar 30, 2014 | Issued |