
Robert K. Carpenter
Examiner (ID: 12721, Phone: (571)270-5140 , Office: P/2896 )
| Most Active Art Unit | 2896 |
| Art Unit(s) | 2812, 2895, 2896, 2826 |
| Total Applications | 863 |
| Issued Applications | 717 |
| Pending Applications | 4 |
| Abandoned Applications | 146 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11586825
[patent_doc_number] => 09641486
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-05-02
[patent_title] => 'Data transfer in a data protection system'
[patent_app_type] => utility
[patent_app_number] => 13/930004
[patent_app_country] => US
[patent_app_date] => 2013-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4300
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 314
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13930004
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/930004 | Data transfer in a data protection system | Jun 27, 2013 | Issued |
Array
(
[id] => 9795354
[patent_doc_number] => 20150007298
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-01
[patent_title] => 'MULTI-DEVICE SINGLE NETWORK SIGN-ON'
[patent_app_type] => utility
[patent_app_number] => 13/929750
[patent_app_country] => US
[patent_app_date] => 2013-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2689
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13929750
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/929750 | Multi-device single network sign-on | Jun 26, 2013 | Issued |
Array
(
[id] => 9795325
[patent_doc_number] => 20150007269
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-01
[patent_title] => 'DELEGATING AUTHENTICATION FOR A WEB SERVICE'
[patent_app_type] => utility
[patent_app_number] => 13/928450
[patent_app_country] => US
[patent_app_date] => 2013-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8419
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13928450
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/928450 | DELEGATING AUTHENTICATION FOR A WEB SERVICE | Jun 26, 2013 | Abandoned |
Array
(
[id] => 10196818
[patent_doc_number] => 09225736
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-12-29
[patent_title] => 'Techniques for detecting anomalous network traffic'
[patent_app_type] => utility
[patent_app_number] => 13/929123
[patent_app_country] => US
[patent_app_date] => 2013-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6291
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13929123
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/929123 | Techniques for detecting anomalous network traffic | Jun 26, 2013 | Issued |
Array
(
[id] => 11265216
[patent_doc_number] => 09489513
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-11-08
[patent_title] => 'Systems and methods for securing computing devices against imposter processes'
[patent_app_type] => utility
[patent_app_number] => 13/926050
[patent_app_country] => US
[patent_app_date] => 2013-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9432
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 320
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13926050
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/926050 | Systems and methods for securing computing devices against imposter processes | Jun 24, 2013 | Issued |
Array
(
[id] => 11418354
[patent_doc_number] => 09565194
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-07
[patent_title] => 'Utilizing a social graph for network access and admission control'
[patent_app_type] => utility
[patent_app_number] => 13/866788
[patent_app_country] => US
[patent_app_date] => 2013-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 5406
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13866788
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/866788 | Utilizing a social graph for network access and admission control | Apr 18, 2013 | Issued |
Array
(
[id] => 9137485
[patent_doc_number] => 20130298200
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-07
[patent_title] => 'ACCOUNT SECURITY PROTECTION METHOD AND SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/864932
[patent_app_country] => US
[patent_app_date] => 2013-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5088
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13864932
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/864932 | ACCOUNT SECURITY PROTECTION METHOD AND SYSTEM | Apr 16, 2013 | Abandoned |
Array
(
[id] => 10179914
[patent_doc_number] => 09210138
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-08
[patent_title] => 'Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC)'
[patent_app_type] => utility
[patent_app_number] => 13/865078
[patent_app_country] => US
[patent_app_date] => 2013-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 5501
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13865078
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/865078 | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC) | Apr 16, 2013 | Issued |
Array
(
[id] => 11431285
[patent_doc_number] => 09569604
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-14
[patent_title] => 'User access control to a secured application'
[patent_app_type] => utility
[patent_app_number] => 13/862516
[patent_app_country] => US
[patent_app_date] => 2013-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3925
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 360
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13862516
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/862516 | User access control to a secured application | Apr 14, 2013 | Issued |
Array
(
[id] => 9096434
[patent_doc_number] => 20130275745
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-17
[patent_title] => 'System and Method for Secure Communication'
[patent_app_type] => utility
[patent_app_number] => 13/862269
[patent_app_country] => US
[patent_app_date] => 2013-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5649
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13862269
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/862269 | System and Method for Secure Communication | Apr 11, 2013 | Abandoned |
Array
(
[id] => 10907787
[patent_doc_number] => 20140310801
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-16
[patent_title] => 'Method and Apparatus for Performing Authentication'
[patent_app_type] => utility
[patent_app_number] => 13/861356
[patent_app_country] => US
[patent_app_date] => 2013-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 16349
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13861356
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/861356 | Method and Apparatus for Performing Authentication | Apr 10, 2013 | Abandoned |
Array
(
[id] => 10171328
[patent_doc_number] => 09202038
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-12-01
[patent_title] => 'Risk based authentication'
[patent_app_type] => utility
[patent_app_number] => 13/858792
[patent_app_country] => US
[patent_app_date] => 2013-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8738
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13858792
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/858792 | Risk based authentication | Apr 7, 2013 | Issued |
Array
(
[id] => 10185535
[patent_doc_number] => 09215224
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-15
[patent_title] => 'Automated security token administrative services'
[patent_app_type] => utility
[patent_app_number] => 13/858464
[patent_app_country] => US
[patent_app_date] => 2013-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 2436
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13858464
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/858464 | Automated security token administrative services | Apr 7, 2013 | Issued |
Array
(
[id] => 8991760
[patent_doc_number] => 20130219041
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-22
[patent_title] => 'EXTENSIBLE PROTOCOL FOR LOW MEMORY AGENT'
[patent_app_type] => utility
[patent_app_number] => 13/855193
[patent_app_country] => US
[patent_app_date] => 2013-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 17285
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13855193
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/855193 | EXTENSIBLE PROTOCOL FOR LOW MEMORY AGENT | Apr 1, 2013 | Abandoned |
Array
(
[id] => 9700833
[patent_doc_number] => 20140250518
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-04
[patent_title] => 'COMPUTER IMPLEMENTED MULTI-FACTOR AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 13/853947
[patent_app_country] => US
[patent_app_date] => 2013-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 11166
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13853947
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/853947 | COMPUTER IMPLEMENTED MULTI-FACTOR AUTHENTICATION | Mar 28, 2013 | Abandoned |
Array
(
[id] => 10841601
[patent_doc_number] => 08869303
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-10-21
[patent_title] => 'Method and system for generation of dynamic password'
[patent_app_type] => utility
[patent_app_number] => 13/769304
[patent_app_country] => US
[patent_app_date] => 2013-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3468
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13769304
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/769304 | Method and system for generation of dynamic password | Feb 15, 2013 | Issued |
Array
(
[id] => 8992177
[patent_doc_number] => 20130219458
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-22
[patent_title] => 'METHODS AND SYSTEMS FOR SECURE DIGITAL CONTENT DISTRIBUTION AND ANALYTICAL REPORTING'
[patent_app_type] => utility
[patent_app_number] => 13/768774
[patent_app_country] => US
[patent_app_date] => 2013-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 18375
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13768774
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/768774 | METHODS AND SYSTEMS FOR SECURE DIGITAL CONTENT DISTRIBUTION AND ANALYTICAL REPORTING | Feb 14, 2013 | Abandoned |
Array
(
[id] => 8979251
[patent_doc_number] => 20130212681
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-15
[patent_title] => 'Security Monitoring System and Security Monitoring Method'
[patent_app_type] => utility
[patent_app_number] => 13/767336
[patent_app_country] => US
[patent_app_date] => 2013-02-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 12631
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13767336
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/767336 | Security monitoring system and security monitoring method | Feb 13, 2013 | Issued |
Array
(
[id] => 9954391
[patent_doc_number] => 09003203
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-07
[patent_title] => 'Storage encryption'
[patent_app_type] => utility
[patent_app_number] => 13/748032
[patent_app_country] => US
[patent_app_date] => 2013-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 12
[patent_no_of_words] => 12318
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13748032
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/748032 | Storage encryption | Jan 22, 2013 | Issued |
Array
(
[id] => 9618550
[patent_doc_number] => 20140208406
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-24
[patent_title] => 'TWO-FACTOR AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 13/748153
[patent_app_country] => US
[patent_app_date] => 2013-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4950
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13748153
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/748153 | TWO-FACTOR AUTHENTICATION | Jan 22, 2013 | Abandoned |