
Piotr Poltorak
Examiner (ID: 10310)
| Most Active Art Unit | 2433 |
| Art Unit(s) | 2134, 2434, 2496, 2433 |
| Total Applications | 845 |
| Issued Applications | 607 |
| Pending Applications | 51 |
| Abandoned Applications | 200 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10059332
[patent_doc_number] => 09098694
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-08-04
[patent_title] => 'Clone-resistant logic'
[patent_app_type] => utility
[patent_app_number] => 13/531244
[patent_app_country] => US
[patent_app_date] => 2012-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5256
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 4
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13531244
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/531244 | Clone-resistant logic | Jun 21, 2012 | Issued |
Array
(
[id] => 8589016
[patent_doc_number] => 20130007837
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-03
[patent_title] => 'HOSTED VULNERABILITY MANAGEMENT FOR WIRELESS DEVICES'
[patent_app_type] => utility
[patent_app_number] => 13/489584
[patent_app_country] => US
[patent_app_date] => 2012-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 37
[patent_figures_cnt] => 37
[patent_no_of_words] => 24947
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13489584
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/489584 | HOSTED VULNERABILITY MANAGEMENT FOR WIRELESS DEVICES | Jun 5, 2012 | Abandoned |
Array
(
[id] => 8501516
[patent_doc_number] => 20120300925
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-29
[patent_title] => 'RANDOMNESS FOR ENCRYPTION OPERATIONS'
[patent_app_type] => utility
[patent_app_number] => 13/481077
[patent_app_country] => US
[patent_app_date] => 2012-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8359
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13481077
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/481077 | Randomness for encryption operations | May 24, 2012 | Issued |
Array
(
[id] => 11232727
[patent_doc_number] => 09459955
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-04
[patent_title] => 'System and method to scramble data based on a scramble key'
[patent_app_type] => utility
[patent_app_number] => 13/479442
[patent_app_country] => US
[patent_app_date] => 2012-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5898
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13479442
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/479442 | System and method to scramble data based on a scramble key | May 23, 2012 | Issued |
Array
(
[id] => 9176584
[patent_doc_number] => 20130318569
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-28
[patent_title] => 'Propagating Delegated Authorized Credentials Through Legacy Systems'
[patent_app_type] => utility
[patent_app_number] => 13/477052
[patent_app_country] => US
[patent_app_date] => 2012-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4866
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13477052
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/477052 | Propagating delegated authorized credentials through legacy systems | May 21, 2012 | Issued |
Array
(
[id] => 10577913
[patent_doc_number] => 09300570
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-29
[patent_title] => 'Multi-tunnel virtual private network'
[patent_app_type] => utility
[patent_app_number] => 13/477185
[patent_app_country] => US
[patent_app_date] => 2012-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9414
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 415
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13477185
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/477185 | Multi-tunnel virtual private network | May 21, 2012 | Issued |
Array
(
[id] => 9176595
[patent_doc_number] => 20130318580
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-28
[patent_title] => 'SECURITY BASED ON USAGE ACTIVITY ASSOCIATED WITH USER DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/477207
[patent_app_country] => US
[patent_app_date] => 2012-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7184
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13477207
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/477207 | Security based on usage activity associated with user device | May 21, 2012 | Issued |
Array
(
[id] => 9163818
[patent_doc_number] => 20130312095
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-21
[patent_title] => 'IDENTIFYING ROOTKITS BASED ON ACCESS PERMISSIONS'
[patent_app_type] => utility
[patent_app_number] => 13/476898
[patent_app_country] => US
[patent_app_date] => 2012-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5071
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13476898
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/476898 | Identifying rootkits based on access permissions | May 20, 2012 | Issued |
Array
(
[id] => 11280724
[patent_doc_number] => 09497212
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-15
[patent_title] => 'Detecting malicious resources in a network based upon active client reputation monitoring'
[patent_app_type] => utility
[patent_app_number] => 13/476171
[patent_app_country] => US
[patent_app_date] => 2012-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8284
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13476171
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/476171 | Detecting malicious resources in a network based upon active client reputation monitoring | May 20, 2012 | Issued |
Array
(
[id] => 8661467
[patent_doc_number] => 20130042297
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-02-14
[patent_title] => 'METHOD AND APPARATUS FOR PROVIDING SECURE SOFTWARE EXECUTION ENVIRONMENT BASED ON DOMAIN SEPARATION'
[patent_app_type] => utility
[patent_app_number] => 13/476998
[patent_app_country] => US
[patent_app_date] => 2012-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3243
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13476998
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/476998 | METHOD AND APPARATUS FOR PROVIDING SECURE SOFTWARE EXECUTION ENVIRONMENT BASED ON DOMAIN SEPARATION | May 20, 2012 | Abandoned |
Array
(
[id] => 9163822
[patent_doc_number] => 20130312099
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-21
[patent_title] => 'Realtime Kernel Object Table and Type Protection'
[patent_app_type] => utility
[patent_app_number] => 13/476881
[patent_app_country] => US
[patent_app_date] => 2012-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 41089
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13476881
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/476881 | Realtime Kernel Object Table and Type Protection | May 20, 2012 | Abandoned |
Array
(
[id] => 11775418
[patent_doc_number] => 09384349
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-05
[patent_title] => 'Negative light-weight rules'
[patent_app_type] => utility
[patent_app_number] => 13/476869
[patent_app_country] => US
[patent_app_date] => 2012-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 16
[patent_no_of_words] => 42171
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13476869
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/476869 | Negative light-weight rules | May 20, 2012 | Issued |
Array
(
[id] => 10509310
[patent_doc_number] => 09237188
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-01-12
[patent_title] => 'Virtual machine based content processing'
[patent_app_type] => utility
[patent_app_number] => 13/476987
[patent_app_country] => US
[patent_app_date] => 2012-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6606
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13476987
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/476987 | Virtual machine based content processing | May 20, 2012 | Issued |
Array
(
[id] => 8504889
[patent_doc_number] => 20120304297
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-29
[patent_title] => 'DETECTING MALICIOUS DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/476347
[patent_app_country] => US
[patent_app_date] => 2012-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8456
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13476347
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/476347 | Detecting malicious device | May 20, 2012 | Issued |
Array
(
[id] => 9163490
[patent_doc_number] => 20130311768
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-21
[patent_title] => 'SECURE AUTHENTICATION OF A USER USING A MOBILE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/476886
[patent_app_country] => US
[patent_app_date] => 2012-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 16450
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13476886
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/476886 | Secure authentication of a user using a mobile device | May 20, 2012 | Issued |
Array
(
[id] => 9765868
[patent_doc_number] => 08850216
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-09-30
[patent_title] => 'Client device and media client authentication mechanism'
[patent_app_type] => utility
[patent_app_number] => 13/476190
[patent_app_country] => US
[patent_app_date] => 2012-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 4113
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13476190
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/476190 | Client device and media client authentication mechanism | May 20, 2012 | Issued |
Array
(
[id] => 10861061
[patent_doc_number] => 08887280
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-11
[patent_title] => 'Distributed denial-of-service defense mechanism'
[patent_app_type] => utility
[patent_app_number] => 13/476856
[patent_app_country] => US
[patent_app_date] => 2012-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6431
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13476856
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/476856 | Distributed denial-of-service defense mechanism | May 20, 2012 | Issued |
Array
(
[id] => 9163494
[patent_doc_number] => 20130311771
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-21
[patent_title] => 'SUBSCRIBER CERTIFICATE PROVISIONING'
[patent_app_type] => utility
[patent_app_number] => 13/473745
[patent_app_country] => US
[patent_app_date] => 2012-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4531
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13473745
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/473745 | Subscriber certificate provisioning | May 16, 2012 | Issued |
Array
(
[id] => 9341970
[patent_doc_number] => 20140068754
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-06
[patent_title] => 'PASSWORD GENERATION AND RECALL'
[patent_app_type] => utility
[patent_app_number] => 14/114382
[patent_app_country] => US
[patent_app_date] => 2012-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9291
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 14
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14114382
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/114382 | Password generation and recall | Apr 23, 2012 | Issued |
Array
(
[id] => 8428992
[patent_doc_number] => 20120250867
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-04
[patent_title] => 'INFORMATION PROCESSING APPARATUS AND PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 13/423410
[patent_app_country] => US
[patent_app_date] => 2012-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8875
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13423410
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/423410 | Information processing apparatus and program product | Mar 18, 2012 | Issued |