
Piotr Poltorak
Examiner (ID: 10310)
| Most Active Art Unit | 2433 |
| Art Unit(s) | 2134, 2434, 2496, 2433 |
| Total Applications | 845 |
| Issued Applications | 607 |
| Pending Applications | 51 |
| Abandoned Applications | 200 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15521471
[patent_doc_number] => 10567346
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-18
[patent_title] => Remote browsing session management
[patent_app_type] => utility
[patent_app_number] => 14/853769
[patent_app_country] => US
[patent_app_date] => 2015-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 21637
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 333
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14853769
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/853769 | Remote browsing session management | Sep 13, 2015 | Issued |
Array
(
[id] => 12048307
[patent_doc_number] => 09825924
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-21
[patent_title] => 'File sharing method and apparatus'
[patent_app_type] => utility
[patent_app_number] => 14/847415
[patent_app_country] => US
[patent_app_date] => 2015-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 9230
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14847415
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/847415 | File sharing method and apparatus | Sep 7, 2015 | Issued |
Array
(
[id] => 11327358
[patent_doc_number] => 20160357970
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-08
[patent_title] => 'ELECTRONIC PERSONAL ASSISTANT PRIVACY'
[patent_app_type] => utility
[patent_app_number] => 14/844203
[patent_app_country] => US
[patent_app_date] => 2015-09-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3789
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14844203
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/844203 | Electronic personal assistant privacy | Sep 2, 2015 | Issued |
Array
(
[id] => 10748425
[patent_doc_number] => 20160094576
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-31
[patent_title] => 'ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 14/834170
[patent_app_country] => US
[patent_app_date] => 2015-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13108
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14834170
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/834170 | ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT | Aug 23, 2015 | Abandoned |
Array
(
[id] => 13707473
[patent_doc_number] => 20170364691
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-21
[patent_title] => Method and System for Controlling Encryption of Information and Analyzing Information as well as Terminal
[patent_app_type] => utility
[patent_app_number] => 15/541378
[patent_app_country] => US
[patent_app_date] => 2015-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11934
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15541378
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/541378 | Method and System for Controlling Encryption of Information and Analyzing Information as well as Terminal | Aug 18, 2015 | Abandoned |
Array
(
[id] => 12459738
[patent_doc_number] => 09985787
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-29
[patent_title] => Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management
[patent_app_type] => utility
[patent_app_number] => 14/829359
[patent_app_country] => US
[patent_app_date] => 2015-08-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 14
[patent_no_of_words] => 12255
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 313
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14829359
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/829359 | Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management | Aug 17, 2015 | Issued |
Array
(
[id] => 12439572
[patent_doc_number] => 09979712
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-22
[patent_title] => Synchronizing authentication sessions between applications
[patent_app_type] => utility
[patent_app_number] => 14/817846
[patent_app_country] => US
[patent_app_date] => 2015-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 7637
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14817846
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/817846 | Synchronizing authentication sessions between applications | Aug 3, 2015 | Issued |
Array
(
[id] => 12011482
[patent_doc_number] => 09804800
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-31
[patent_title] => 'Detecting heap-spray in memory images'
[patent_app_type] => utility
[patent_app_number] => 14/753057
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 5373
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14753057
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/753057 | Detecting heap-spray in memory images | Jun 28, 2015 | Issued |
Array
(
[id] => 13684641
[patent_doc_number] => 20160381057
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-29
[patent_title] => Customized Network Traffic Models To Detect Application Anomalies
[patent_app_type] => utility
[patent_app_number] => 14/753666
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12680
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14753666
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/753666 | Customized network traffic models to detect application anomalies | Jun 28, 2015 | Issued |
Array
(
[id] => 11686741
[patent_doc_number] => 09684788
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-20
[patent_title] => 'Self-repair and distributed-repair of applications'
[patent_app_type] => utility
[patent_app_number] => 14/753569
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 6657
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14753569
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/753569 | Self-repair and distributed-repair of applications | Jun 28, 2015 | Issued |
Array
(
[id] => 12201716
[patent_doc_number] => 09904783
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-27
[patent_title] => 'Information processing method and electronic device'
[patent_app_type] => utility
[patent_app_number] => 14/753355
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 19
[patent_no_of_words] => 11690
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14753355
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/753355 | Information processing method and electronic device | Jun 28, 2015 | Issued |
Array
(
[id] => 11433121
[patent_doc_number] => 09571452
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-14
[patent_title] => 'Deploying a security policy based on domain names'
[patent_app_type] => utility
[patent_app_number] => 14/753339
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 15826
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14753339
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/753339 | Deploying a security policy based on domain names | Jun 28, 2015 | Issued |
Array
(
[id] => 12230564
[patent_doc_number] => 09917820
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-03-13
[patent_title] => 'Secure information sharing'
[patent_app_type] => utility
[patent_app_number] => 14/753443
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6011
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 311
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14753443
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/753443 | Secure information sharing | Jun 28, 2015 | Issued |
Array
(
[id] => 13497849
[patent_doc_number] => 20180300467
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-18
[patent_title] => PAIRING A USER WITH A WEARABLE COMPUTING DEVICE
[patent_app_type] => utility
[patent_app_number] => 15/577835
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4818
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15577835
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/577835 | PAIRING A USER WITH A WEARABLE COMPUTING DEVICE | Jun 28, 2015 | Abandoned |
Array
(
[id] => 13684649
[patent_doc_number] => 20160381061
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-29
[patent_title] => PROXY FOR MITIGATION OF ATTACKS EXPLOITING MISCONFIGURED OR COMPROMISED WEB SERVERS
[patent_app_type] => utility
[patent_app_number] => 14/752955
[patent_app_country] => US
[patent_app_date] => 2015-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5531
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 59
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14752955
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/752955 | PROXY FOR MITIGATION OF ATTACKS EXPLOITING MISCONFIGURED OR COMPROMISED WEB SERVERS | Jun 27, 2015 | Abandoned |
Array
(
[id] => 15923867
[patent_doc_number] => 10659187
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-19
[patent_title] => Securely providing a receiver unit with a replica pseudo-random noise code
[patent_app_type] => utility
[patent_app_number] => 14/752936
[patent_app_country] => US
[patent_app_date] => 2015-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4638
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 304
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14752936
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/752936 | Securely providing a receiver unit with a replica pseudo-random noise code | Jun 26, 2015 | Issued |
Array
(
[id] => 10403759
[patent_doc_number] => 20150288768
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'SYSTEMS AND METHODS FOR MANAGING A GUEST VIRTUAL MACHINE EXECUTING WITHIN A VIRTUALIZED ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/746300
[patent_app_country] => US
[patent_app_date] => 2015-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 39094
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14746300
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/746300 | Systems and methods for managing a guest virtual machine executing within a virtualized environment | Jun 21, 2015 | Issued |
Array
(
[id] => 11848597
[patent_doc_number] => 09736165
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-15
[patent_title] => 'Centralized authentication for granting access to online services'
[patent_app_type] => utility
[patent_app_number] => 14/726117
[patent_app_country] => US
[patent_app_date] => 2015-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 21
[patent_no_of_words] => 22798
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14726117
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/726117 | Centralized authentication for granting access to online services | May 28, 2015 | Issued |
Array
(
[id] => 13216773
[patent_doc_number] => 10122767
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-06
[patent_title] => Systems and methods for conducting secure VOIP multi-party calls
[patent_app_type] => utility
[patent_app_number] => 14/726108
[patent_app_country] => US
[patent_app_date] => 2015-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 10076
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 299
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14726108
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/726108 | Systems and methods for conducting secure VOIP multi-party calls | May 28, 2015 | Issued |
Array
(
[id] => 11467839
[patent_doc_number] => 09584489
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-28
[patent_title] => 'Controlling access to resource functions at a control point of the resource via a user device'
[patent_app_type] => utility
[patent_app_number] => 14/725818
[patent_app_country] => US
[patent_app_date] => 2015-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7055
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14725818
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/725818 | Controlling access to resource functions at a control point of the resource via a user device | May 28, 2015 | Issued |