
Piotr Poltorak
Examiner (ID: 10310)
| Most Active Art Unit | 2433 |
| Art Unit(s) | 2134, 2434, 2496, 2433 |
| Total Applications | 845 |
| Issued Applications | 607 |
| Pending Applications | 51 |
| Abandoned Applications | 200 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10342730
[patent_doc_number] => 20150227735
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-13
[patent_title] => 'SYSTEM AND METHOD FOR EYE TRACKING AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/622800
[patent_app_country] => US
[patent_app_date] => 2015-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2780
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14622800
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/622800 | SYSTEM AND METHOD FOR EYE TRACKING AUTHENTICATION | Feb 12, 2015 | Abandoned |
Array
(
[id] => 10384361
[patent_doc_number] => 20150269368
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-24
[patent_title] => 'RELAY APPARATUS, SYSTEM, RELAY METHOD, AND COMPUTER READABLE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 14/620400
[patent_app_country] => US
[patent_app_date] => 2015-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7187
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620400
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/620400 | Relay apparatus, system, relay method, and computer readable medium | Feb 11, 2015 | Issued |
Array
(
[id] => 11035413
[patent_doc_number] => 20160232369
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'Managing Access To Images Using Roles'
[patent_app_type] => utility
[patent_app_number] => 14/619533
[patent_app_country] => US
[patent_app_date] => 2015-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 16608
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14619533
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/619533 | Managing Access To Images Using Roles | Feb 10, 2015 | |
Array
(
[id] => 11586866
[patent_doc_number] => 09641527
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-02
[patent_title] => 'Apparatus, method, and recording medium of information processing'
[patent_app_type] => utility
[patent_app_number] => 14/619482
[patent_app_country] => US
[patent_app_date] => 2015-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8814
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 313
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14619482
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/619482 | Apparatus, method, and recording medium of information processing | Feb 10, 2015 | Issued |
Array
(
[id] => 10801832
[patent_doc_number] => 20160147989
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'METHOD AND SYSTEM FOR AUTHENTICATING ACCESS TO A COMPUTING DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/618908
[patent_app_country] => US
[patent_app_date] => 2015-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6147
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14618908
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/618908 | METHOD AND SYSTEM FOR AUTHENTICATING ACCESS TO A COMPUTING DEVICE | Feb 9, 2015 | Abandoned |
Array
(
[id] => 11702843
[patent_doc_number] => 09692782
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-27
[patent_title] => 'Detecting malicious resources in a network based upon active client reputation monitoring'
[patent_app_type] => utility
[patent_app_number] => 14/612896
[patent_app_country] => US
[patent_app_date] => 2015-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8328
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14612896
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/612896 | Detecting malicious resources in a network based upon active client reputation monitoring | Feb 2, 2015 | Issued |
Array
(
[id] => 11274579
[patent_doc_number] => 20160337126
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'Method for Authorizing a Transaction'
[patent_app_type] => utility
[patent_app_number] => 15/111895
[patent_app_country] => US
[patent_app_date] => 2015-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2696
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15111895
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/111895 | Method for authorizing a transaction | Jan 18, 2015 | Issued |
Array
(
[id] => 11000938
[patent_doc_number] => 20160197885
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-07
[patent_title] => 'TECHNOLOGY-AGNOSTIC APPLICATION FOR HIGH CONFIDENCE EXCHANGE OF DATA BETWEEN AN ENTERPRISE AND THIRD PARTIES'
[patent_app_type] => utility
[patent_app_number] => 14/588425
[patent_app_country] => US
[patent_app_date] => 2015-01-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8708
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14588425
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/588425 | Technology-agnostic application for high confidence exchange of data between an enterprise and third parties | Dec 31, 2014 | Issued |
Array
(
[id] => 16355799
[patent_doc_number] => 10796315
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-06
[patent_title] => Automated recertification of a safety critical system
[patent_app_type] => utility
[patent_app_number] => 14/586818
[patent_app_country] => US
[patent_app_date] => 2014-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 4498
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14586818
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/586818 | Automated recertification of a safety critical system | Dec 29, 2014 | Issued |
Array
(
[id] => 13753341
[patent_doc_number] => 10169618
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-01
[patent_title] => Encryption method for execute-in-place memories
[patent_app_type] => utility
[patent_app_number] => 14/580753
[patent_app_country] => US
[patent_app_date] => 2014-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 14289
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14580753
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/580753 | Encryption method for execute-in-place memories | Dec 22, 2014 | Issued |
Array
(
[id] => 10985293
[patent_doc_number] => 20160182239
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-23
[patent_title] => 'METHOD FOR CERTIFYING AND AUTHENTIFYING SECURITY DOCUMENTS BASED ON A MEASURE OF THE RELATIVE VARIATIONS OF THE DIFFERENT PROCESSES INVOLVED IN ITS MANUFACTURE'
[patent_app_type] => utility
[patent_app_number] => 14/581984
[patent_app_country] => US
[patent_app_date] => 2014-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6802
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14581984
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/581984 | Method for certifying and authentifying security documents based on a measure of the relative variations of the different processes involved in its manufacture | Dec 22, 2014 | Issued |
Array
(
[id] => 12203286
[patent_doc_number] => 09906368
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-27
[patent_title] => 'General encoding functions for modular exponentiation encryption schemes'
[patent_app_type] => utility
[patent_app_number] => 14/580963
[patent_app_country] => US
[patent_app_date] => 2014-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7082
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14580963
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/580963 | General encoding functions for modular exponentiation encryption schemes | Dec 22, 2014 | Issued |
Array
(
[id] => 10983156
[patent_doc_number] => 20160180100
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-23
[patent_title] => 'SYSTEM AND METHOD FOR SECURELY CONNECTING NETWORK DEVICES USING OPTICAL LABELS'
[patent_app_type] => utility
[patent_app_number] => 14/575535
[patent_app_country] => US
[patent_app_date] => 2014-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8033
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14575535
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/575535 | SYSTEM AND METHOD FOR SECURELY CONNECTING NETWORK DEVICES USING OPTICAL LABELS | Dec 17, 2014 | Abandoned |
Array
(
[id] => 10726478
[patent_doc_number] => 20160072627
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'Generation of cryptographic keys'
[patent_app_type] => utility
[patent_app_number] => 14/572163
[patent_app_country] => US
[patent_app_date] => 2014-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3505
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14572163
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/572163 | Generation of cryptographic keys | Dec 15, 2014 | Issued |
Array
(
[id] => 11118805
[patent_doc_number] => 20160315779
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-27
[patent_title] => 'Entity Authentication in Network'
[patent_app_type] => utility
[patent_app_number] => 15/105706
[patent_app_country] => US
[patent_app_date] => 2014-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9909
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15105706
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/105706 | Entity authentication in network | Dec 11, 2014 | Issued |
Array
(
[id] => 12039721
[patent_doc_number] => 09817956
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-14
[patent_title] => 'User authentication and data encryption'
[patent_app_type] => utility
[patent_app_number] => 14/568956
[patent_app_country] => US
[patent_app_date] => 2014-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 17002
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14568956
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/568956 | User authentication and data encryption | Dec 11, 2014 | Issued |
Array
(
[id] => 12196564
[patent_doc_number] => 09900311
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-20
[patent_title] => 'Method and device for protecting access to a message'
[patent_app_type] => utility
[patent_app_number] => 15/100823
[patent_app_country] => US
[patent_app_date] => 2014-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3319
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15100823
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/100823 | Method and device for protecting access to a message | Dec 1, 2014 | Issued |
Array
(
[id] => 13190037
[patent_doc_number] => 10110561
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-23
[patent_title] => Firewall with application packet classifer
[patent_app_type] => utility
[patent_app_number] => 14/554621
[patent_app_country] => US
[patent_app_date] => 2014-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 15
[patent_no_of_words] => 9348
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14554621
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/554621 | Firewall with application packet classifer | Nov 25, 2014 | Issued |
Array
(
[id] => 10796758
[patent_doc_number] => 20160142916
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-19
[patent_title] => 'Data Stitching For Networked Automation'
[patent_app_type] => utility
[patent_app_number] => 14/546902
[patent_app_country] => US
[patent_app_date] => 2014-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9594
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14546902
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/546902 | Data stitching for networked automation | Nov 17, 2014 | Issued |
Array
(
[id] => 10726628
[patent_doc_number] => 20160072777
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'HARDWARE CRYPTO MODULE AND SYSTEM FOR COMMUNICATING WITH AN EXTERNAL ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/542036
[patent_app_country] => US
[patent_app_date] => 2014-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 10924
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14542036
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/542036 | HARDWARE CRYPTO MODULE AND SYSTEM FOR COMMUNICATING WITH AN EXTERNAL ENVIRONMENT | Nov 13, 2014 | Abandoned |