Search

Robert K. Carpenter

Examiner (ID: 12721, Phone: (571)270-5140 , Office: P/2896 )

Most Active Art Unit
2896
Art Unit(s)
2812, 2895, 2896, 2826
Total Applications
863
Issued Applications
717
Pending Applications
4
Abandoned Applications
146

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 14166197 [patent_doc_number] => 20190110201 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-04-11 [patent_title] => WI-FI CONNECTION METHOD, MOBILE TERMINAL AND STORAGE MEDIUM [patent_app_type] => utility [patent_app_number] => 16/190399 [patent_app_country] => US [patent_app_date] => 2018-11-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6659 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -8 [patent_words_short_claim] => 99 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16190399 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/190399
Wi-Fi connection method, mobile terminal and storage medium Nov 13, 2018 Issued
Array ( [id] => 16921814 [patent_doc_number] => 20210194906 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-06-24 [patent_title] => METHOD AND SERVER FOR RECOGNIZING ABNORMAL ACCESS BEHAVIOR [patent_app_type] => utility [patent_app_number] => 16/767998 [patent_app_country] => US [patent_app_date] => 2018-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4327 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -14 [patent_words_short_claim] => 76 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16767998 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/767998
METHOD AND SERVER FOR RECOGNIZING ABNORMAL ACCESS BEHAVIOR Oct 30, 2018 Abandoned
Array ( [id] => 17353783 [patent_doc_number] => 11228438 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-01-18 [patent_title] => Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device [patent_app_type] => utility [patent_app_number] => 16/146409 [patent_app_country] => US [patent_app_date] => 2018-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 21 [patent_no_of_words] => 11018 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 150 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16146409 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/146409
Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device Sep 27, 2018 Issued
Array ( [id] => 16685258 [patent_doc_number] => 10944758 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-03-09 [patent_title] => Computer resource vulnerability assessment and remediation [patent_app_type] => utility [patent_app_number] => 16/146439 [patent_app_country] => US [patent_app_date] => 2018-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 13653 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 204 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16146439 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/146439
Computer resource vulnerability assessment and remediation Sep 27, 2018 Issued
Array ( [id] => 16250505 [patent_doc_number] => 10749891 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-08-18 [patent_title] => Valuing cyber risks for insurance pricing and underwriting using network monitored sensors and methods of use [patent_app_type] => utility [patent_app_number] => 16/129820 [patent_app_country] => US [patent_app_date] => 2018-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 11 [patent_no_of_words] => 9523 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 307 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16129820 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/129820
Valuing cyber risks for insurance pricing and underwriting using network monitored sensors and methods of use Sep 12, 2018 Issued
Array ( [id] => 15705705 [patent_doc_number] => 10609048 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-03-31 [patent_title] => Systems and methods for the detection of advanced attackers using client side honeytokens [patent_app_type] => utility [patent_app_number] => 16/113124 [patent_app_country] => US [patent_app_date] => 2018-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 9175 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 249 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16113124 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/113124
Systems and methods for the detection of advanced attackers using client side honeytokens Aug 26, 2018 Issued
Array ( [id] => 13611711 [patent_doc_number] => 20180357405 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-12-13 [patent_title] => Authentication Using an Interactive Cord [patent_app_type] => utility [patent_app_number] => 16/102216 [patent_app_country] => US [patent_app_date] => 2018-08-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7389 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 105 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16102216 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/102216
Authentication using an interactive cord Aug 12, 2018 Issued
Array ( [id] => 18982180 [patent_doc_number] => 11907354 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-02-20 [patent_title] => Secure authentication [patent_app_type] => utility [patent_app_number] => 16/059556 [patent_app_country] => US [patent_app_date] => 2018-08-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 10833 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 375 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16059556 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/059556
Secure authentication Aug 8, 2018 Issued
Array ( [id] => 13572683 [patent_doc_number] => 20180337890 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-11-22 [patent_title] => NETWORK SECURITY PROCESSING [patent_app_type] => utility [patent_app_number] => 16/048470 [patent_app_country] => US [patent_app_date] => 2018-07-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7876 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 244 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16048470 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/048470
Network security processing Jul 29, 2018 Issued
Array ( [id] => 13615301 [patent_doc_number] => 20180359202 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-12-13 [patent_title] => METHOD AND APPARATUS FOR PROVIDING SOCIAL NETWORK SERVICE [patent_app_type] => utility [patent_app_number] => 16/047618 [patent_app_country] => US [patent_app_date] => 2018-07-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7560 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16047618 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/047618
Method and apparatus for providing social network service Jul 26, 2018 Issued
Array ( [id] => 18750698 [patent_doc_number] => 11810012 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-11-07 [patent_title] => Identifying event distributions using interrelated events [patent_app_type] => utility [patent_app_number] => 16/033788 [patent_app_country] => US [patent_app_date] => 2018-07-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 19 [patent_no_of_words] => 25274 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 266 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16033788 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/033788
Identifying event distributions using interrelated events Jul 11, 2018 Issued
Array ( [id] => 17211567 [patent_doc_number] => 11171958 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-11-09 [patent_title] => Secure session sharing between computing devices [patent_app_type] => utility [patent_app_number] => 16/030974 [patent_app_country] => US [patent_app_date] => 2018-07-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8588 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 193 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16030974 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/030974
Secure session sharing between computing devices Jul 9, 2018 Issued
Array ( [id] => 15349811 [patent_doc_number] => 20200012797 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-09 [patent_title] => METHOD AND SYSTEM FOR SEMANTIC PRESERVING LOCATION ENCRYPTION [patent_app_type] => utility [patent_app_number] => 16/029608 [patent_app_country] => US [patent_app_date] => 2018-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4644 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 36 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16029608 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/029608
Method and system for semantic preserving location encryption Jul 7, 2018 Issued
Array ( [id] => 14175539 [patent_doc_number] => 10261784 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-04-16 [patent_title] => Detecting copied computer code using cryptographically hashed overlapping shingles [patent_app_type] => utility [patent_app_number] => 16/013161 [patent_app_country] => US [patent_app_date] => 2018-06-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3964 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 221 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16013161 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/013161
Detecting copied computer code using cryptographically hashed overlapping shingles Jun 19, 2018 Issued
Array ( [id] => 16678767 [patent_doc_number] => 20210067533 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-03-04 [patent_title] => Network Anomaly Data Detection Method and Device as well as Computer Equipment and Storage Medium [patent_app_type] => utility [patent_app_number] => 16/960031 [patent_app_country] => US [patent_app_date] => 2018-05-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7868 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -15 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16960031 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/960031
Network anomaly data detection method and device as well as computer equipment and storage medium May 27, 2018 Issued
Array ( [id] => 15121573 [patent_doc_number] => 20190347420 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-11-14 [patent_title] => METHOD AND SYSTEM FOR INSTALLING AND RUNNING UNTRUSTED APPLICATIONS [patent_app_type] => utility [patent_app_number] => 15/977680 [patent_app_country] => US [patent_app_date] => 2018-05-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8357 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 175 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15977680 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/977680
METHOD AND SYSTEM FOR INSTALLING AND RUNNING UNTRUSTED APPLICATIONS May 10, 2018 Abandoned
Array ( [id] => 18046957 [patent_doc_number] => 11520913 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-12-06 [patent_title] => Secure execution support for A.I. systems (and other heterogeneous systems) [patent_app_type] => utility [patent_app_number] => 15/977429 [patent_app_country] => US [patent_app_date] => 2018-05-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6460 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 212 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15977429 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/977429
Secure execution support for A.I. systems (and other heterogeneous systems) May 10, 2018 Issued
Array ( [id] => 15121549 [patent_doc_number] => 20190347408 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-11-14 [patent_title] => PROCESS IDENTIFIER TRANSITION MONITORING AND ASSESSMENT [patent_app_type] => utility [patent_app_number] => 15/977134 [patent_app_country] => US [patent_app_date] => 2018-05-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9080 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 35 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15977134 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/977134
PROCESS IDENTIFIER TRANSITION MONITORING AND ASSESSMENT May 10, 2018 Abandoned
Array ( [id] => 13404023 [patent_doc_number] => 20180253554 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-09-06 [patent_title] => TECHNOLOGIES FOR PROTECTING SYSTEMS AND DATA TO PREVENT CYBER-ATTACKS [patent_app_type] => utility [patent_app_number] => 15/971487 [patent_app_country] => US [patent_app_date] => 2018-05-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10550 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 214 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15971487 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/971487
Technologies for protecting systems and data to prevent cyber-attacks May 3, 2018 Issued
Array ( [id] => 14431499 [patent_doc_number] => 10320569 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-06-11 [patent_title] => Systems and methods for authenticating a digitally signed assertion using verified evaluators [patent_app_type] => utility [patent_app_number] => 15/968720 [patent_app_country] => US [patent_app_date] => 2018-05-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 28296 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 189 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15968720 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/968720
Systems and methods for authenticating a digitally signed assertion using verified evaluators Apr 30, 2018 Issued
Menu