Search

Piotr Poltorak

Examiner (ID: 10310)

Most Active Art Unit
2433
Art Unit(s)
2134, 2434, 2496, 2433
Total Applications
845
Issued Applications
607
Pending Applications
51
Abandoned Applications
200

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11818826 [patent_doc_number] => 09722797 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-08-01 [patent_title] => 'Computer-based optimization of digital signature generation for records based on eventual selection criteria for products and services' [patent_app_type] => utility [patent_app_number] => 14/500408 [patent_app_country] => US [patent_app_date] => 2014-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5154 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 316 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14500408 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/500408
Computer-based optimization of digital signature generation for records based on eventual selection criteria for products and services Sep 28, 2014 Issued
Array ( [id] => 10080848 [patent_doc_number] => 09118711 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-08-25 [patent_title] => 'Anti-vulnerability system, method, and computer program product' [patent_app_type] => utility [patent_app_number] => 14/499246 [patent_app_country] => US [patent_app_date] => 2014-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 13 [patent_no_of_words] => 13107 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 977 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14499246 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/499246
Anti-vulnerability system, method, and computer program product Sep 28, 2014 Issued
Array ( [id] => 9860216 [patent_doc_number] => 20150040233 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-05 [patent_title] => 'SDK-EQUIPPED ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT' [patent_app_type] => utility [patent_app_number] => 14/499244 [patent_app_country] => US [patent_app_date] => 2014-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 13022 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14499244 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/499244
SDK-EQUIPPED ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT Sep 28, 2014 Abandoned
Array ( [id] => 10080846 [patent_doc_number] => 09118709 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-08-25 [patent_title] => 'Anti-vulnerability system, method, and computer program product' [patent_app_type] => utility [patent_app_number] => 14/499236 [patent_app_country] => US [patent_app_date] => 2014-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 13 [patent_no_of_words] => 13189 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 574 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14499236 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/499236
Anti-vulnerability system, method, and computer program product Sep 27, 2014 Issued
Array ( [id] => 13241357 [patent_doc_number] => 10133882 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-11-20 [patent_title] => Implementation method for driving of software and hardware supporting OpenSC [patent_app_type] => utility [patent_app_number] => 15/029989 [patent_app_country] => US [patent_app_date] => 2014-09-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 11 [patent_no_of_words] => 5736 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 399 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15029989 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/029989
Implementation method for driving of software and hardware supporting OpenSC Sep 17, 2014 Issued
Array ( [id] => 10726474 [patent_doc_number] => 20160072622 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-10 [patent_title] => 'METHOD AND APPARATUS FOR SCALAR MULTIPLICATION SECURE AGAINST DIFFERENTIAL POWER ATTACKS' [patent_app_type] => utility [patent_app_number] => 14/384458 [patent_app_country] => US [patent_app_date] => 2014-09-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7718 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14384458 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/384458
Method and apparatus for scalar multiplication secure against differential power attacks Sep 4, 2014 Issued
Array ( [id] => 10228610 [patent_doc_number] => 20150113603 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-04-23 [patent_title] => 'SYSTEM AND METHOD FOR DATA AND REQUEST FILTERING' [patent_app_type] => utility [patent_app_number] => 14/457382 [patent_app_country] => US [patent_app_date] => 2014-08-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6407 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14457382 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/457382
System and method for data and request filtering Aug 11, 2014 Issued
Array ( [id] => 9960096 [patent_doc_number] => 09008313 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-04-14 [patent_title] => 'System and method for generating random key stream cipher texts' [patent_app_type] => utility [patent_app_number] => 14/339576 [patent_app_country] => US [patent_app_date] => 2014-07-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 2158 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 143 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14339576 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/339576
System and method for generating random key stream cipher texts Jul 23, 2014 Issued
Array ( [id] => 10970147 [patent_doc_number] => 20140373180 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-18 [patent_title] => 'SYSTEM AND METHOD FOR VIRTUAL IMAGE SECURITY IN A CLOUD ENVIRONMENT' [patent_app_type] => utility [patent_app_number] => 14/337771 [patent_app_country] => US [patent_app_date] => 2014-07-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 8977 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14337771 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/337771
System and method for virtual image security in a cloud environment Jul 21, 2014 Issued
Array ( [id] => 14605815 [patent_doc_number] => 10356109 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-16 [patent_title] => Security indicator linkage determination [patent_app_type] => utility [patent_app_number] => 15/328018 [patent_app_country] => US [patent_app_date] => 2014-07-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5317 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 164 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15328018 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/328018
Security indicator linkage determination Jul 20, 2014 Issued
Array ( [id] => 10922604 [patent_doc_number] => 20140325624 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-10-30 [patent_title] => 'PROJECTOR PROJECTING PASSWORD' [patent_app_type] => utility [patent_app_number] => 14/324644 [patent_app_country] => US [patent_app_date] => 2014-07-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3195 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14324644 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/324644
PROJECTOR PROJECTING PASSWORD Jul 6, 2014 Abandoned
Array ( [id] => 11482607 [patent_doc_number] => 09589154 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-03-07 [patent_title] => 'Programming on-chip non-volatile memory in a secure processor using a sequence number' [patent_app_type] => utility [patent_app_number] => 14/325266 [patent_app_country] => US [patent_app_date] => 2014-07-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5852 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 153 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14325266 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/325266
Programming on-chip non-volatile memory in a secure processor using a sequence number Jul 6, 2014 Issued
Array ( [id] => 10653183 [patent_doc_number] => 09369457 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-06-14 [patent_title] => 'Mobile multifactor single-sign-on authentication' [patent_app_type] => utility [patent_app_number] => 14/316657 [patent_app_country] => US [patent_app_date] => 2014-06-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 15668 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 253 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14316657 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/316657
Mobile multifactor single-sign-on authentication Jun 25, 2014 Issued
Array ( [id] => 10726619 [patent_doc_number] => 20160072768 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-10 [patent_title] => 'Cellular-call activated, mechanical interrupt device for a wired connection to the Internet' [patent_app_type] => utility [patent_app_number] => 14/310858 [patent_app_country] => US [patent_app_date] => 2014-06-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3061 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14310858 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/310858
Cellular-call activated, mechanical interrupt device for a wired connection to the Internet Jun 19, 2014 Abandoned
Array ( [id] => 14431871 [patent_doc_number] => 10320757 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-06-11 [patent_title] => Bounded access to critical data [patent_app_type] => utility [patent_app_number] => 14/298181 [patent_app_country] => US [patent_app_date] => 2014-06-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4467 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14298181 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/298181
Bounded access to critical data Jun 5, 2014 Issued
Array ( [id] => 10741806 [patent_doc_number] => 20160087957 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-24 [patent_title] => 'MULTI-FACTOR AUTHENTICATION TO ACHIEVE REQUIRED AUTHENTICATION ASSURANCE LEVEL' [patent_app_type] => utility [patent_app_number] => 14/786688 [patent_app_country] => US [patent_app_date] => 2014-04-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 58 [patent_figures_cnt] => 58 [patent_no_of_words] => 37708 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14786688 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/786688
MULTI-FACTOR AUTHENTICATION TO ACHIEVE REQUIRED AUTHENTICATION ASSURANCE LEVEL Apr 24, 2014 Abandoned
Array ( [id] => 10726476 [patent_doc_number] => 20160072624 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-10 [patent_title] => 'ENCRYPTED TEXT MATCHING SYSTEM, METHOD, AND COMPUTER READABLE MEDIUM' [patent_app_type] => utility [patent_app_number] => 14/786680 [patent_app_country] => US [patent_app_date] => 2014-04-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 11617 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14786680 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/786680
Encrypted text matching system, method, and computer readable medium Apr 22, 2014 Issued
Array ( [id] => 11397671 [patent_doc_number] => 20170018207 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-19 [patent_title] => 'SYMMETRIC ENCRYPTION DEVICE AND METHOD USED' [patent_app_type] => utility [patent_app_number] => 14/782753 [patent_app_country] => US [patent_app_date] => 2014-04-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4308 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14782753 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/782753
SYMMETRIC ENCRYPTION DEVICE AND METHOD USED Apr 9, 2014 Abandoned
Array ( [id] => 10496716 [patent_doc_number] => 20150381739 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-31 [patent_title] => 'NETWORK SESSION CONTROL' [patent_app_type] => utility [patent_app_number] => 14/768194 [patent_app_country] => US [patent_app_date] => 2014-02-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5574 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14768194 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/768194
NETWORK SESSION CONTROL Feb 12, 2014 Abandoned
Array ( [id] => 10330110 [patent_doc_number] => 20150215114 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-07-30 [patent_title] => 'METHOD FOR GENERATING A SECURE CRYPTOGRAPHIC HASH FUNCTION' [patent_app_type] => utility [patent_app_number] => 14/167902 [patent_app_country] => US [patent_app_date] => 2014-01-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8213 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14167902 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/167902
METHOD FOR GENERATING A SECURE CRYPTOGRAPHIC HASH FUNCTION Jan 28, 2014 Abandoned
Menu