
Robert K. Carpenter
Examiner (ID: 12721, Phone: (571)270-5140 , Office: P/2896 )
| Most Active Art Unit | 2896 |
| Art Unit(s) | 2812, 2895, 2896, 2826 |
| Total Applications | 863 |
| Issued Applications | 717 |
| Pending Applications | 4 |
| Abandoned Applications | 146 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10447047
[patent_doc_number] => 20150332060
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-19
[patent_title] => 'SYSTEM, COMMUNICATION APPARATUS, AND COMMUNICATION METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/715809
[patent_app_country] => US
[patent_app_date] => 2015-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 33
[patent_figures_cnt] => 33
[patent_no_of_words] => 20382
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14715809
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/715809 | SYSTEM, COMMUNICATION APPARATUS, AND COMMUNICATION METHOD | May 18, 2015 | Abandoned |
Array
(
[id] => 11027827
[patent_doc_number] => 20160224782
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-04
[patent_title] => 'ACCESS TOKEN MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 14/713786
[patent_app_country] => US
[patent_app_date] => 2015-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 10437
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14713786
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/713786 | Access token management | May 14, 2015 | Issued |
Array
(
[id] => 13483731
[patent_doc_number] => 20180293408
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-11
[patent_title] => PERIPHERAL DEVICE SECURITY
[patent_app_type] => utility
[patent_app_number] => 15/570739
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5378
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 40
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15570739
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/570739 | PERIPHERAL DEVICE SECURITY | May 10, 2015 | Abandoned |
Array
(
[id] => 11425779
[patent_doc_number] => 20170033925
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-02
[patent_title] => 'METHODS AND APPARATUS FOR IMPLEMENTING A COMMUNICATIONS SYSTEM SECURED USING ONE-TIME PADS'
[patent_app_type] => utility
[patent_app_number] => 15/303425
[patent_app_country] => US
[patent_app_date] => 2015-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10109
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 16
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15303425
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/303425 | METHODS AND APPARATUS FOR IMPLEMENTING A COMMUNICATIONS SYSTEM SECURED USING ONE-TIME PADS | Apr 9, 2015 | Abandoned |
Array
(
[id] => 13569601
[patent_doc_number] => 20180336348
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-22
[patent_title] => MODIFYING WEB PAGE CODE TO INCLUDE CODE TO PROTECT OUTPUT
[patent_app_type] => utility
[patent_app_number] => 15/559642
[patent_app_country] => US
[patent_app_date] => 2015-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7939
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 63
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15559642
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/559642 | Modifying web page code to include code to protect output | Apr 9, 2015 | Issued |
Array
(
[id] => 10330116
[patent_doc_number] => 20150215120
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-30
[patent_title] => 'Storage Encryption'
[patent_app_type] => utility
[patent_app_number] => 14/679363
[patent_app_country] => US
[patent_app_date] => 2015-04-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12336
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14679363
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/679363 | Storage encryption | Apr 5, 2015 | Issued |
Array
(
[id] => 11488831
[patent_doc_number] => 09594902
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-14
[patent_title] => 'Analyzing a password-protected file for malware'
[patent_app_type] => utility
[patent_app_number] => 14/674262
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7489
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674262
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674262 | Analyzing a password-protected file for malware | Mar 30, 2015 | Issued |
Array
(
[id] => 10392405
[patent_doc_number] => 20150277412
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-01
[patent_title] => 'METHOD FOR THE FUNCTIONAL EXTENSION OF AN ELECTRIC WELDING APPARATUS AND WELDING APPARATUS FOR CARRYING OUT THE METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/645510
[patent_app_country] => US
[patent_app_date] => 2015-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5451
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14645510
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/645510 | METHOD FOR THE FUNCTIONAL EXTENSION OF AN ELECTRIC WELDING APPARATUS AND WELDING APPARATUS FOR CARRYING OUT THE METHOD | Mar 11, 2015 | Abandoned |
Array
(
[id] => 11501897
[patent_doc_number] => 20170076082
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-16
[patent_title] => 'Identity Verification System and Method'
[patent_app_type] => utility
[patent_app_number] => 15/126046
[patent_app_country] => US
[patent_app_date] => 2015-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7081
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15126046
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/126046 | Identity Verification System and Method | Mar 11, 2015 | Abandoned |
Array
(
[id] => 10379066
[patent_doc_number] => 20150264073
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'SYSTEM AND METHOD FOR DETECTING INTRUSIONS THROUGH REAL-TIME PROCESSING OF TRAFFIC WITH EXTENSIVE HISTORICAL PERSPECTIVE'
[patent_app_type] => utility
[patent_app_number] => 14/643931
[patent_app_country] => US
[patent_app_date] => 2015-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7325
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14643931
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/643931 | SYSTEM AND METHOD FOR DETECTING INTRUSIONS THROUGH REAL-TIME PROCESSING OF TRAFFIC WITH EXTENSIVE HISTORICAL PERSPECTIVE | Mar 9, 2015 | Abandoned |
Array
(
[id] => 10810446
[patent_doc_number] => 20160156605
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-02
[patent_title] => 'A METHOD FOR RETRIEVING INTERNET AUTHENTICATION INFORMATION AND MEANS THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/902845
[patent_app_country] => US
[patent_app_date] => 2015-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2517
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14902845
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/902845 | A METHOD FOR RETRIEVING INTERNET AUTHENTICATION INFORMATION AND MEANS THEREOF | Mar 1, 2015 | Abandoned |
Array
(
[id] => 11398819
[patent_doc_number] => 20170019357
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-19
[patent_title] => 'METHOD AND APPARATUS FOR PROVIDING SOCIAL NETWORK SERVICE'
[patent_app_type] => utility
[patent_app_number] => 15/124232
[patent_app_country] => US
[patent_app_date] => 2015-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 7781
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15124232
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/124232 | METHOD AND APPARATUS FOR PROVIDING SOCIAL NETWORK SERVICE | Mar 1, 2015 | Abandoned |
Array
(
[id] => 11998910
[patent_doc_number] => 20170303065
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-19
[patent_title] => 'METHOD AND DEVICE FOR CREATING SUBSCRIPTION RESOURCE'
[patent_app_type] => utility
[patent_app_number] => 15/518124
[patent_app_country] => US
[patent_app_date] => 2015-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4466
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15518124
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/518124 | METHOD AND DEVICE FOR CREATING SUBSCRIPTION RESOURCE | Feb 15, 2015 | Abandoned |
Array
(
[id] => 17353773
[patent_doc_number] => 11228427
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-01-18
[patent_title] => System and method for securing content keys delivered in manifest files
[patent_app_type] => utility
[patent_app_number] => 14/618598
[patent_app_country] => US
[patent_app_date] => 2015-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 13
[patent_no_of_words] => 8164
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14618598
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/618598 | System and method for securing content keys delivered in manifest files | Feb 9, 2015 | Issued |
Array
(
[id] => 11661162
[patent_doc_number] => 09674185
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-06
[patent_title] => 'Authentication using individual\'s inherent expression as secondary signature'
[patent_app_type] => utility
[patent_app_number] => 14/608308
[patent_app_country] => US
[patent_app_date] => 2015-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5993
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14608308
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/608308 | Authentication using individual's inherent expression as secondary signature | Jan 28, 2015 | Issued |
Array
(
[id] => 11695243
[patent_doc_number] => 20170170960
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-15
[patent_title] => 'DATA ANALYTICS ON ENCRYPTED DATA ELEMENTS'
[patent_app_type] => utility
[patent_app_number] => 15/325800
[patent_app_country] => US
[patent_app_date] => 2015-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9770
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15325800
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/325800 | Data analytics on encrypted data elements | Jan 28, 2015 | Issued |
Array
(
[id] => 11899248
[patent_doc_number] => 09769197
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-09-19
[patent_title] => 'Malware detection using external malware detection operations'
[patent_app_type] => utility
[patent_app_number] => 14/606780
[patent_app_country] => US
[patent_app_date] => 2015-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 12749
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14606780
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/606780 | Malware detection using external malware detection operations | Jan 26, 2015 | Issued |
Array
(
[id] => 11181771
[patent_doc_number] => 09413782
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-08-09
[patent_title] => 'Malware detection using internal malware detection operations'
[patent_app_type] => utility
[patent_app_number] => 14/606752
[patent_app_country] => US
[patent_app_date] => 2015-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 12801
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14606752
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/606752 | Malware detection using internal malware detection operations | Jan 26, 2015 | Issued |
Array
(
[id] => 10320960
[patent_doc_number] => 20150205964
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-23
[patent_title] => 'TECHNOLOGIES FOR PROTECTING SYSTEMS AND DATA TO PREVENT CYBER-ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 14/600672
[patent_app_country] => US
[patent_app_date] => 2015-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10723
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14600672
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/600672 | Technologies for protecting systems and data to prevent cyber-attacks | Jan 19, 2015 | Issued |
Array
(
[id] => 11803347
[patent_doc_number] => 09544278
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-10
[patent_title] => 'Using domain name system security extensions in a mixed-mode environment'
[patent_app_type] => utility
[patent_app_number] => 14/591121
[patent_app_country] => US
[patent_app_date] => 2015-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8021
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14591121
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/591121 | Using domain name system security extensions in a mixed-mode environment | Jan 6, 2015 | Issued |