
Robert K. Carpenter
Examiner (ID: 12721, Phone: (571)270-5140 , Office: P/2896 )
| Most Active Art Unit | 2896 |
| Art Unit(s) | 2812, 2895, 2896, 2826 |
| Total Applications | 863 |
| Issued Applications | 717 |
| Pending Applications | 4 |
| Abandoned Applications | 146 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11131606
[patent_doc_number] => 20160328580
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-10
[patent_title] => 'SYSTEMS, APPARATUSES AND METHODS FOR COMPUTER SECURITY IN A COMPUTER NETWORK'
[patent_app_type] => utility
[patent_app_number] => 15/150375
[patent_app_country] => US
[patent_app_date] => 2016-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 93
[patent_figures_cnt] => 93
[patent_no_of_words] => 22598
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15150375
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/150375 | SYSTEMS, APPARATUSES AND METHODS FOR COMPUTER SECURITY IN A COMPUTER NETWORK | May 8, 2016 | Abandoned |
Array
(
[id] => 11056522
[patent_doc_number] => 20160253485
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-01
[patent_title] => 'SUPPORT FOR SECURE OBJECTS IN A COMPUTER SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/149884
[patent_app_country] => US
[patent_app_date] => 2016-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5547
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15149884
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/149884 | Support for secure objects in a computer system | May 8, 2016 | Issued |
Array
(
[id] => 11741314
[patent_doc_number] => 09705917
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-11
[patent_title] => 'Document modification detection and prevention'
[patent_app_type] => utility
[patent_app_number] => 15/080812
[patent_app_country] => US
[patent_app_date] => 2016-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5878
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15080812
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/080812 | Document modification detection and prevention | Mar 24, 2016 | Issued |
Array
(
[id] => 12696865
[patent_doc_number] => 20180124121
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-03
[patent_title] => ONE-WAY COUPLING DEVICE, REQUEST APPARATUS AND METHOD FOR FEEDBACK-FREE TRANSMISSION OF DATA
[patent_app_type] => utility
[patent_app_number] => 15/559524
[patent_app_country] => US
[patent_app_date] => 2016-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5184
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -11
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15559524
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/559524 | One-way coupling device, request apparatus and method for feedback-free transmission of data | Mar 17, 2016 | Issued |
Array
(
[id] => 11226939
[patent_doc_number] => 09454662
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-09-27
[patent_title] => 'Method for booting and dumping a confidential image on a trusted computer system'
[patent_app_type] => utility
[patent_app_number] => 15/071303
[patent_app_country] => US
[patent_app_date] => 2016-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4028
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 311
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15071303
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/071303 | Method for booting and dumping a confidential image on a trusted computer system | Mar 15, 2016 | Issued |
Array
(
[id] => 12242378
[patent_doc_number] => 20180075240
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-15
[patent_title] => 'METHOD AND DEVICE FOR DETECTING A SUSPICIOUS PROCESS BY ANALYZING DATA FLOW CHARACTERISTICS OF A COMPUTING DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/559176
[patent_app_country] => US
[patent_app_date] => 2016-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6987
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15559176
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/559176 | METHOD AND DEVICE FOR DETECTING A SUSPICIOUS PROCESS BY ANALYZING DATA FLOW CHARACTERISTICS OF A COMPUTING DEVICE | Mar 13, 2016 | Abandoned |
Array
(
[id] => 11280730
[patent_doc_number] => 09497218
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-11-15
[patent_title] => 'System and method for detection of phishing scripts'
[patent_app_type] => utility
[patent_app_number] => 15/062715
[patent_app_country] => US
[patent_app_date] => 2016-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7751
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15062715
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/062715 | System and method for detection of phishing scripts | Mar 6, 2016 | Issued |
Array
(
[id] => 12141784
[patent_doc_number] => 20180019868
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-18
[patent_title] => 'A SYSTEM AND METHODS FOR PROTECTING KEYS USING GARBLED CIRCUITS'
[patent_app_type] => utility
[patent_app_number] => 15/545883
[patent_app_country] => US
[patent_app_date] => 2016-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5197
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15545883
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/545883 | System and methods for protecting keys using garbled circuits | Feb 27, 2016 | Issued |
Array
(
[id] => 11892033
[patent_doc_number] => 09762605
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-12
[patent_title] => 'Apparatus and method for assessing financial loss from cyber threats capable of affecting at least one computer network'
[patent_app_type] => utility
[patent_app_number] => 15/012182
[patent_app_country] => US
[patent_app_date] => 2016-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 9883
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 322
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15012182
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/012182 | Apparatus and method for assessing financial loss from cyber threats capable of affecting at least one computer network | Jan 31, 2016 | Issued |
Array
(
[id] => 11029903
[patent_doc_number] => 20160226860
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-04
[patent_title] => 'VIRTUAL SUBSCRIBER IDENTITY MODULE'
[patent_app_type] => utility
[patent_app_number] => 15/012269
[patent_app_country] => US
[patent_app_date] => 2016-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11424
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15012269
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/012269 | VIRTUAL SUBSCRIBER IDENTITY MODULE | Jan 31, 2016 | Abandoned |
Array
(
[id] => 17017382
[patent_doc_number] => 11087024
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-10
[patent_title] => System and method to enable privacy-preserving real time services against inference attacks
[patent_app_type] => utility
[patent_app_number] => 15/011368
[patent_app_country] => US
[patent_app_date] => 2016-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 11207
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 305
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15011368
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/011368 | System and method to enable privacy-preserving real time services against inference attacks | Jan 28, 2016 | Issued |
Array
(
[id] => 10801852
[patent_doc_number] => 20160148009
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'QUICK USAGE CONTROL'
[patent_app_type] => utility
[patent_app_number] => 15/009347
[patent_app_country] => US
[patent_app_date] => 2016-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 8983
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15009347
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/009347 | Quick usage control | Jan 27, 2016 | Issued |
Array
(
[id] => 11761205
[patent_doc_number] => 20170208074
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-20
[patent_title] => 'ACCESS DETECTION OF AN UNAUTHORIZED DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/001650
[patent_app_country] => US
[patent_app_date] => 2016-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6828
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15001650
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/001650 | ACCESS DETECTION OF AN UNAUTHORIZED DEVICE | Jan 19, 2016 | Abandoned |
Array
(
[id] => 13147721
[patent_doc_number] => 10091207
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-02
[patent_title] => Social network based mobile access
[patent_app_type] => utility
[patent_app_number] => 14/992741
[patent_app_country] => US
[patent_app_date] => 2016-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9679
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14992741
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/992741 | Social network based mobile access | Jan 10, 2016 | Issued |
Array
(
[id] => 11819029
[patent_doc_number] => 09723002
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-01
[patent_title] => 'Protecting access to a hardware device through use of an aggregate identity instance'
[patent_app_type] => utility
[patent_app_number] => 14/986747
[patent_app_country] => US
[patent_app_date] => 2016-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8095
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 238
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14986747
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/986747 | Protecting access to a hardware device through use of an aggregate identity instance | Jan 3, 2016 | Issued |
Array
(
[id] => 11819018
[patent_doc_number] => 09722991
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-01
[patent_title] => 'Confidence-based authentication discovery for an outbound proxy'
[patent_app_type] => utility
[patent_app_number] => 14/987061
[patent_app_country] => US
[patent_app_date] => 2016-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 8326
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14987061
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/987061 | Confidence-based authentication discovery for an outbound proxy | Jan 3, 2016 | Issued |
Array
(
[id] => 11733904
[patent_doc_number] => 20170195346
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-06
[patent_title] => 'SYSTEMS AND METHODS FOR THE DETECTION OF ADVANCED ATTACKERS USING CLIENT SIDE HONEYTOKENS'
[patent_app_type] => utility
[patent_app_number] => 14/986753
[patent_app_country] => US
[patent_app_date] => 2016-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 9836
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14986753
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/986753 | Systems and methods for the detection of advanced attackers using client side honeytokens | Jan 3, 2016 | Issued |
Array
(
[id] => 11518466
[patent_doc_number] => 20170085541
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-23
[patent_title] => 'ROLE-BASED NOTIFICATION SERVICE'
[patent_app_type] => utility
[patent_app_number] => 14/986044
[patent_app_country] => US
[patent_app_date] => 2015-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7648
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14986044
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/986044 | Role-based notification service | Dec 30, 2015 | Issued |
Array
(
[id] => 13269237
[patent_doc_number] => 10146703
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-12-04
[patent_title] => Encrypting data objects in a data storage system
[patent_app_type] => utility
[patent_app_number] => 14/984185
[patent_app_country] => US
[patent_app_date] => 2015-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5566
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 415
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14984185
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/984185 | Encrypting data objects in a data storage system | Dec 29, 2015 | Issued |
Array
(
[id] => 11731763
[patent_doc_number] => 20170193206
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-06
[patent_title] => 'Apparatus and Method for Camera-Based User Authentication for Content Acess'
[patent_app_type] => utility
[patent_app_number] => 14/985035
[patent_app_country] => US
[patent_app_date] => 2015-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4323
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14985035
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/985035 | Apparatus and Method for Camera-Based User Authentication for Content Acess | Dec 29, 2015 | Abandoned |