
Robert K. Carpenter
Examiner (ID: 12721, Phone: (571)270-5140 , Office: P/2896 )
| Most Active Art Unit | 2896 |
| Art Unit(s) | 2812, 2895, 2896, 2826 |
| Total Applications | 863 |
| Issued Applications | 717 |
| Pending Applications | 4 |
| Abandoned Applications | 146 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14166197
[patent_doc_number] => 20190110201
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-11
[patent_title] => WI-FI CONNECTION METHOD, MOBILE TERMINAL AND STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 16/190399
[patent_app_country] => US
[patent_app_date] => 2018-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6659
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16190399
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/190399 | Wi-Fi connection method, mobile terminal and storage medium | Nov 13, 2018 | Issued |
Array
(
[id] => 16921814
[patent_doc_number] => 20210194906
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-24
[patent_title] => METHOD AND SERVER FOR RECOGNIZING ABNORMAL ACCESS BEHAVIOR
[patent_app_type] => utility
[patent_app_number] => 16/767998
[patent_app_country] => US
[patent_app_date] => 2018-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4327
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16767998
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/767998 | METHOD AND SERVER FOR RECOGNIZING ABNORMAL ACCESS BEHAVIOR | Oct 30, 2018 | Abandoned |
Array
(
[id] => 17353783
[patent_doc_number] => 11228438
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-01-18
[patent_title] => Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device
[patent_app_type] => utility
[patent_app_number] => 16/146409
[patent_app_country] => US
[patent_app_date] => 2018-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 21
[patent_no_of_words] => 11018
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16146409
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/146409 | Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device | Sep 27, 2018 | Issued |
Array
(
[id] => 16685258
[patent_doc_number] => 10944758
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-03-09
[patent_title] => Computer resource vulnerability assessment and remediation
[patent_app_type] => utility
[patent_app_number] => 16/146439
[patent_app_country] => US
[patent_app_date] => 2018-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 13653
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16146439
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/146439 | Computer resource vulnerability assessment and remediation | Sep 27, 2018 | Issued |
Array
(
[id] => 16250505
[patent_doc_number] => 10749891
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-18
[patent_title] => Valuing cyber risks for insurance pricing and underwriting using network monitored sensors and methods of use
[patent_app_type] => utility
[patent_app_number] => 16/129820
[patent_app_country] => US
[patent_app_date] => 2018-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 9523
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 307
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16129820
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/129820 | Valuing cyber risks for insurance pricing and underwriting using network monitored sensors and methods of use | Sep 12, 2018 | Issued |
Array
(
[id] => 15705705
[patent_doc_number] => 10609048
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-31
[patent_title] => Systems and methods for the detection of advanced attackers using client side honeytokens
[patent_app_type] => utility
[patent_app_number] => 16/113124
[patent_app_country] => US
[patent_app_date] => 2018-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9175
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 249
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16113124
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/113124 | Systems and methods for the detection of advanced attackers using client side honeytokens | Aug 26, 2018 | Issued |
Array
(
[id] => 13611711
[patent_doc_number] => 20180357405
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-13
[patent_title] => Authentication Using an Interactive Cord
[patent_app_type] => utility
[patent_app_number] => 16/102216
[patent_app_country] => US
[patent_app_date] => 2018-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7389
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16102216
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/102216 | Authentication using an interactive cord | Aug 12, 2018 | Issued |
Array
(
[id] => 18982180
[patent_doc_number] => 11907354
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-02-20
[patent_title] => Secure authentication
[patent_app_type] => utility
[patent_app_number] => 16/059556
[patent_app_country] => US
[patent_app_date] => 2018-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10833
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 375
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16059556
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/059556 | Secure authentication | Aug 8, 2018 | Issued |
Array
(
[id] => 13572683
[patent_doc_number] => 20180337890
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-22
[patent_title] => NETWORK SECURITY PROCESSING
[patent_app_type] => utility
[patent_app_number] => 16/048470
[patent_app_country] => US
[patent_app_date] => 2018-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7876
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 244
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16048470
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/048470 | Network security processing | Jul 29, 2018 | Issued |
Array
(
[id] => 13615301
[patent_doc_number] => 20180359202
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-13
[patent_title] => METHOD AND APPARATUS FOR PROVIDING SOCIAL NETWORK SERVICE
[patent_app_type] => utility
[patent_app_number] => 16/047618
[patent_app_country] => US
[patent_app_date] => 2018-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7560
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16047618
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/047618 | Method and apparatus for providing social network service | Jul 26, 2018 | Issued |
Array
(
[id] => 18750698
[patent_doc_number] => 11810012
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-11-07
[patent_title] => Identifying event distributions using interrelated events
[patent_app_type] => utility
[patent_app_number] => 16/033788
[patent_app_country] => US
[patent_app_date] => 2018-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 19
[patent_no_of_words] => 25274
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 266
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16033788
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/033788 | Identifying event distributions using interrelated events | Jul 11, 2018 | Issued |
Array
(
[id] => 17211567
[patent_doc_number] => 11171958
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-11-09
[patent_title] => Secure session sharing between computing devices
[patent_app_type] => utility
[patent_app_number] => 16/030974
[patent_app_country] => US
[patent_app_date] => 2018-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8588
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16030974
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/030974 | Secure session sharing between computing devices | Jul 9, 2018 | Issued |
Array
(
[id] => 15349811
[patent_doc_number] => 20200012797
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-09
[patent_title] => METHOD AND SYSTEM FOR SEMANTIC PRESERVING LOCATION ENCRYPTION
[patent_app_type] => utility
[patent_app_number] => 16/029608
[patent_app_country] => US
[patent_app_date] => 2018-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4644
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 36
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16029608
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/029608 | Method and system for semantic preserving location encryption | Jul 7, 2018 | Issued |
Array
(
[id] => 14175539
[patent_doc_number] => 10261784
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-04-16
[patent_title] => Detecting copied computer code using cryptographically hashed overlapping shingles
[patent_app_type] => utility
[patent_app_number] => 16/013161
[patent_app_country] => US
[patent_app_date] => 2018-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3964
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16013161
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/013161 | Detecting copied computer code using cryptographically hashed overlapping shingles | Jun 19, 2018 | Issued |
Array
(
[id] => 16678767
[patent_doc_number] => 20210067533
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-04
[patent_title] => Network Anomaly Data Detection Method and Device as well as Computer Equipment and Storage Medium
[patent_app_type] => utility
[patent_app_number] => 16/960031
[patent_app_country] => US
[patent_app_date] => 2018-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7868
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16960031
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/960031 | Network anomaly data detection method and device as well as computer equipment and storage medium | May 27, 2018 | Issued |
Array
(
[id] => 15121573
[patent_doc_number] => 20190347420
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-14
[patent_title] => METHOD AND SYSTEM FOR INSTALLING AND RUNNING UNTRUSTED APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 15/977680
[patent_app_country] => US
[patent_app_date] => 2018-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8357
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15977680
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/977680 | METHOD AND SYSTEM FOR INSTALLING AND RUNNING UNTRUSTED APPLICATIONS | May 10, 2018 | Abandoned |
Array
(
[id] => 18046957
[patent_doc_number] => 11520913
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-12-06
[patent_title] => Secure execution support for A.I. systems (and other heterogeneous systems)
[patent_app_type] => utility
[patent_app_number] => 15/977429
[patent_app_country] => US
[patent_app_date] => 2018-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6460
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15977429
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/977429 | Secure execution support for A.I. systems (and other heterogeneous systems) | May 10, 2018 | Issued |
Array
(
[id] => 15121549
[patent_doc_number] => 20190347408
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-14
[patent_title] => PROCESS IDENTIFIER TRANSITION MONITORING AND ASSESSMENT
[patent_app_type] => utility
[patent_app_number] => 15/977134
[patent_app_country] => US
[patent_app_date] => 2018-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9080
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 35
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15977134
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/977134 | PROCESS IDENTIFIER TRANSITION MONITORING AND ASSESSMENT | May 10, 2018 | Abandoned |
Array
(
[id] => 13404023
[patent_doc_number] => 20180253554
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-06
[patent_title] => TECHNOLOGIES FOR PROTECTING SYSTEMS AND DATA TO PREVENT CYBER-ATTACKS
[patent_app_type] => utility
[patent_app_number] => 15/971487
[patent_app_country] => US
[patent_app_date] => 2018-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10550
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15971487
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/971487 | Technologies for protecting systems and data to prevent cyber-attacks | May 3, 2018 | Issued |
Array
(
[id] => 14431499
[patent_doc_number] => 10320569
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-06-11
[patent_title] => Systems and methods for authenticating a digitally signed assertion using verified evaluators
[patent_app_type] => utility
[patent_app_number] => 15/968720
[patent_app_country] => US
[patent_app_date] => 2018-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 28296
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15968720
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/968720 | Systems and methods for authenticating a digitally signed assertion using verified evaluators | Apr 30, 2018 | Issued |