
Piotr Poltorak
Examiner (ID: 10310)
| Most Active Art Unit | 2433 |
| Art Unit(s) | 2134, 2434, 2496, 2433 |
| Total Applications | 845 |
| Issued Applications | 607 |
| Pending Applications | 51 |
| Abandoned Applications | 200 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11818826
[patent_doc_number] => 09722797
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-01
[patent_title] => 'Computer-based optimization of digital signature generation for records based on eventual selection criteria for products and services'
[patent_app_type] => utility
[patent_app_number] => 14/500408
[patent_app_country] => US
[patent_app_date] => 2014-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5154
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 316
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14500408
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/500408 | Computer-based optimization of digital signature generation for records based on eventual selection criteria for products and services | Sep 28, 2014 | Issued |
Array
(
[id] => 10080848
[patent_doc_number] => 09118711
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-25
[patent_title] => 'Anti-vulnerability system, method, and computer program product'
[patent_app_type] => utility
[patent_app_number] => 14/499246
[patent_app_country] => US
[patent_app_date] => 2014-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 13107
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 977
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14499246
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/499246 | Anti-vulnerability system, method, and computer program product | Sep 28, 2014 | Issued |
Array
(
[id] => 9860216
[patent_doc_number] => 20150040233
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-05
[patent_title] => 'SDK-EQUIPPED ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 14/499244
[patent_app_country] => US
[patent_app_date] => 2014-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13022
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14499244
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/499244 | SDK-EQUIPPED ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT | Sep 28, 2014 | Abandoned |
Array
(
[id] => 10080846
[patent_doc_number] => 09118709
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-25
[patent_title] => 'Anti-vulnerability system, method, and computer program product'
[patent_app_type] => utility
[patent_app_number] => 14/499236
[patent_app_country] => US
[patent_app_date] => 2014-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 13189
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 574
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14499236
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/499236 | Anti-vulnerability system, method, and computer program product | Sep 27, 2014 | Issued |
Array
(
[id] => 13241357
[patent_doc_number] => 10133882
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-20
[patent_title] => Implementation method for driving of software and hardware supporting OpenSC
[patent_app_type] => utility
[patent_app_number] => 15/029989
[patent_app_country] => US
[patent_app_date] => 2014-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 11
[patent_no_of_words] => 5736
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 399
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15029989
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/029989 | Implementation method for driving of software and hardware supporting OpenSC | Sep 17, 2014 | Issued |
Array
(
[id] => 10726474
[patent_doc_number] => 20160072622
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'METHOD AND APPARATUS FOR SCALAR MULTIPLICATION SECURE AGAINST DIFFERENTIAL POWER ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 14/384458
[patent_app_country] => US
[patent_app_date] => 2014-09-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7718
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14384458
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/384458 | Method and apparatus for scalar multiplication secure against differential power attacks | Sep 4, 2014 | Issued |
Array
(
[id] => 10228610
[patent_doc_number] => 20150113603
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-23
[patent_title] => 'SYSTEM AND METHOD FOR DATA AND REQUEST FILTERING'
[patent_app_type] => utility
[patent_app_number] => 14/457382
[patent_app_country] => US
[patent_app_date] => 2014-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6407
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14457382
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/457382 | System and method for data and request filtering | Aug 11, 2014 | Issued |
Array
(
[id] => 9960096
[patent_doc_number] => 09008313
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-04-14
[patent_title] => 'System and method for generating random key stream cipher texts'
[patent_app_type] => utility
[patent_app_number] => 14/339576
[patent_app_country] => US
[patent_app_date] => 2014-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2158
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14339576
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/339576 | System and method for generating random key stream cipher texts | Jul 23, 2014 | Issued |
Array
(
[id] => 10970147
[patent_doc_number] => 20140373180
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-18
[patent_title] => 'SYSTEM AND METHOD FOR VIRTUAL IMAGE SECURITY IN A CLOUD ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/337771
[patent_app_country] => US
[patent_app_date] => 2014-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8977
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14337771
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/337771 | System and method for virtual image security in a cloud environment | Jul 21, 2014 | Issued |
Array
(
[id] => 14605815
[patent_doc_number] => 10356109
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-16
[patent_title] => Security indicator linkage determination
[patent_app_type] => utility
[patent_app_number] => 15/328018
[patent_app_country] => US
[patent_app_date] => 2014-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5317
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15328018
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/328018 | Security indicator linkage determination | Jul 20, 2014 | Issued |
Array
(
[id] => 10922604
[patent_doc_number] => 20140325624
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-30
[patent_title] => 'PROJECTOR PROJECTING PASSWORD'
[patent_app_type] => utility
[patent_app_number] => 14/324644
[patent_app_country] => US
[patent_app_date] => 2014-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3195
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14324644
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/324644 | PROJECTOR PROJECTING PASSWORD | Jul 6, 2014 | Abandoned |
Array
(
[id] => 11482607
[patent_doc_number] => 09589154
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-07
[patent_title] => 'Programming on-chip non-volatile memory in a secure processor using a sequence number'
[patent_app_type] => utility
[patent_app_number] => 14/325266
[patent_app_country] => US
[patent_app_date] => 2014-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5852
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14325266
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/325266 | Programming on-chip non-volatile memory in a secure processor using a sequence number | Jul 6, 2014 | Issued |
Array
(
[id] => 10653183
[patent_doc_number] => 09369457
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-14
[patent_title] => 'Mobile multifactor single-sign-on authentication'
[patent_app_type] => utility
[patent_app_number] => 14/316657
[patent_app_country] => US
[patent_app_date] => 2014-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 15668
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14316657
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/316657 | Mobile multifactor single-sign-on authentication | Jun 25, 2014 | Issued |
Array
(
[id] => 10726619
[patent_doc_number] => 20160072768
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'Cellular-call activated, mechanical interrupt device for a wired connection to the Internet'
[patent_app_type] => utility
[patent_app_number] => 14/310858
[patent_app_country] => US
[patent_app_date] => 2014-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3061
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14310858
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/310858 | Cellular-call activated, mechanical interrupt device for a wired connection to the Internet | Jun 19, 2014 | Abandoned |
Array
(
[id] => 14431871
[patent_doc_number] => 10320757
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-06-11
[patent_title] => Bounded access to critical data
[patent_app_type] => utility
[patent_app_number] => 14/298181
[patent_app_country] => US
[patent_app_date] => 2014-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4467
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14298181
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/298181 | Bounded access to critical data | Jun 5, 2014 | Issued |
Array
(
[id] => 10741806
[patent_doc_number] => 20160087957
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'MULTI-FACTOR AUTHENTICATION TO ACHIEVE REQUIRED AUTHENTICATION ASSURANCE LEVEL'
[patent_app_type] => utility
[patent_app_number] => 14/786688
[patent_app_country] => US
[patent_app_date] => 2014-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 58
[patent_figures_cnt] => 58
[patent_no_of_words] => 37708
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14786688
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/786688 | MULTI-FACTOR AUTHENTICATION TO ACHIEVE REQUIRED AUTHENTICATION ASSURANCE LEVEL | Apr 24, 2014 | Abandoned |
Array
(
[id] => 10726476
[patent_doc_number] => 20160072624
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'ENCRYPTED TEXT MATCHING SYSTEM, METHOD, AND COMPUTER READABLE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 14/786680
[patent_app_country] => US
[patent_app_date] => 2014-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11617
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14786680
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/786680 | Encrypted text matching system, method, and computer readable medium | Apr 22, 2014 | Issued |
Array
(
[id] => 11397671
[patent_doc_number] => 20170018207
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-19
[patent_title] => 'SYMMETRIC ENCRYPTION DEVICE AND METHOD USED'
[patent_app_type] => utility
[patent_app_number] => 14/782753
[patent_app_country] => US
[patent_app_date] => 2014-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4308
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14782753
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/782753 | SYMMETRIC ENCRYPTION DEVICE AND METHOD USED | Apr 9, 2014 | Abandoned |
Array
(
[id] => 10496716
[patent_doc_number] => 20150381739
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'NETWORK SESSION CONTROL'
[patent_app_type] => utility
[patent_app_number] => 14/768194
[patent_app_country] => US
[patent_app_date] => 2014-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5574
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14768194
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/768194 | NETWORK SESSION CONTROL | Feb 12, 2014 | Abandoned |
Array
(
[id] => 10330110
[patent_doc_number] => 20150215114
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-30
[patent_title] => 'METHOD FOR GENERATING A SECURE CRYPTOGRAPHIC HASH FUNCTION'
[patent_app_type] => utility
[patent_app_number] => 14/167902
[patent_app_country] => US
[patent_app_date] => 2014-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8213
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14167902
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/167902 | METHOD FOR GENERATING A SECURE CRYPTOGRAPHIC HASH FUNCTION | Jan 28, 2014 | Abandoned |