Search

Robert K. Carpenter

Examiner (ID: 12721, Phone: (571)270-5140 , Office: P/2896 )

Most Active Art Unit
2896
Art Unit(s)
2812, 2895, 2896, 2826
Total Applications
863
Issued Applications
717
Pending Applications
4
Abandoned Applications
146

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 8865107 [patent_doc_number] => 20130148810 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-06-13 [patent_title] => 'SINGLE USE RECOVERY KEY' [patent_app_type] => utility [patent_app_number] => 13/316587 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9021 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13316587 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/316587
Single use recovery key Dec 11, 2011 Issued
Array ( [id] => 8242860 [patent_doc_number] => 20120151600 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-14 [patent_title] => 'METHOD AND SYSTEM FOR PROTECTING INTELLECTUAL PROPERTY IN SOFTWARE' [patent_app_type] => utility [patent_app_number] => 13/323786 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 27 [patent_figures_cnt] => 27 [patent_no_of_words] => 6855 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323786 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/323786
Method and system for protecting intellectual property in software Dec 11, 2011 Issued
Array ( [id] => 11780751 [patent_doc_number] => 09389933 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-07-12 [patent_title] => 'Facilitating system service request interactions for hardware-protected applications' [patent_app_type] => utility [patent_app_number] => 13/323562 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7299 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323562 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/323562
Facilitating system service request interactions for hardware-protected applications Dec 11, 2011 Issued
Array ( [id] => 10172891 [patent_doc_number] => 09203609 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-01 [patent_title] => 'Method and apparatus for implementing key stream hierarchy' [patent_app_type] => utility [patent_app_number] => 13/316932 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 9714 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 157 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13316932 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/316932
Method and apparatus for implementing key stream hierarchy Dec 11, 2011 Issued
Array ( [id] => 8868485 [patent_doc_number] => 20130152188 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-06-13 [patent_title] => 'PORT ALLOCATION IN A FIREWALL CLUSTER' [patent_app_type] => utility [patent_app_number] => 13/323815 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2932 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323815 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/323815
Port allocation in a firewall cluster Dec 11, 2011 Issued
Array ( [id] => 8864950 [patent_doc_number] => 20130148653 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-06-13 [patent_title] => 'MECHANISM FOR ESTABLISHING REPUTATION IN A NETWORK ENVIRONMENT' [patent_app_type] => utility [patent_app_number] => 13/313933 [patent_app_country] => US [patent_app_date] => 2011-12-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 12180 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13313933 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/313933
Mechanism for establishing reputation in a network environment Dec 6, 2011 Issued
Array ( [id] => 8693189 [patent_doc_number] => 08392725 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-03-05 [patent_title] => 'Method for fast decryption of processor instructions' [patent_app_type] => utility [patent_app_number] => 13/301227 [patent_app_country] => US [patent_app_date] => 2011-11-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 3347 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 94 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13301227 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/301227
Method for fast decryption of processor instructions Nov 20, 2011 Issued
Array ( [id] => 8677424 [patent_doc_number] => 08385552 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-02-26 [patent_title] => 'Techniques for managing keys using a key server in a network segment' [patent_app_type] => utility [patent_app_number] => 13/285938 [patent_app_country] => US [patent_app_date] => 2011-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 4625 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 249 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13285938 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/285938
Techniques for managing keys using a key server in a network segment Oct 30, 2011 Issued
Array ( [id] => 8202115 [patent_doc_number] => 20120124657 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-05-17 [patent_title] => 'AUTOMATED SECURITY TOKEN ADMINISTRATIVE SERVICES' [patent_app_type] => utility [patent_app_number] => 13/275665 [patent_app_country] => US [patent_app_date] => 2011-10-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 2413 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0124/20120124657.pdf [firstpage_image] =>[orig_patent_app_number] => 13275665 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/275665
Automated security token administrative services Oct 17, 2011 Issued
Array ( [id] => 11484395 [patent_doc_number] => 09590967 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-03-07 [patent_title] => 'Application authentication policy for a plurality of computing devices' [patent_app_type] => utility [patent_app_number] => 13/995972 [patent_app_country] => US [patent_app_date] => 2011-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6270 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 291 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13995972 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/995972
Application authentication policy for a plurality of computing devices Sep 29, 2011 Issued
Array ( [id] => 11433157 [patent_doc_number] => 09571489 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-02-14 [patent_title] => 'System and method for performing commands from a remote source' [patent_app_type] => utility [patent_app_number] => 13/209212 [patent_app_country] => US [patent_app_date] => 2011-08-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 8 [patent_no_of_words] => 3091 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 362 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13209212 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/209212
System and method for performing commands from a remote source Aug 11, 2011 Issued
Array ( [id] => 8280014 [patent_doc_number] => 20120173886 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-07-05 [patent_title] => 'ELECTRONIC DEVICE WITH A FILE AUTHORIZATION MANAGEMENT FUNCTION AND METHOD THEREOF' [patent_app_type] => utility [patent_app_number] => 13/163738 [patent_app_country] => US [patent_app_date] => 2011-06-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 844 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13163738 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/163738
ELECTRONIC DEVICE WITH A FILE AUTHORIZATION MANAGEMENT FUNCTION AND METHOD THEREOF Jun 19, 2011 Abandoned
Array ( [id] => 9022300 [patent_doc_number] => 08532291 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-09-10 [patent_title] => 'Copy control method' [patent_app_type] => utility [patent_app_number] => 13/161808 [patent_app_country] => US [patent_app_date] => 2011-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 44 [patent_figures_cnt] => 52 [patent_no_of_words] => 30612 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 371 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13161808 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/161808
Copy control method Jun 15, 2011 Issued
Array ( [id] => 9242258 [patent_doc_number] => 08607064 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-12-10 [patent_title] => 'Biometric authentication device and biometric authentication method' [patent_app_type] => utility [patent_app_number] => 13/161123 [patent_app_country] => US [patent_app_date] => 2011-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6494 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 192 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13161123 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/161123
Biometric authentication device and biometric authentication method Jun 14, 2011 Issued
Array ( [id] => 10179903 [patent_doc_number] => 09210127 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-08 [patent_title] => 'System and method for limiting data leakage' [patent_app_type] => utility [patent_app_number] => 13/161493 [patent_app_country] => US [patent_app_date] => 2011-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5725 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13161493 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/161493
System and method for limiting data leakage Jun 14, 2011 Issued
Array ( [id] => 7650410 [patent_doc_number] => 20110299679 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-12-08 [patent_title] => 'CONTROLLER, CONTROL METHOD, COMPUTER PROGRAM, RECORDING MEDIUM FOR COMPUTER PROGRAM, RECORDING APPARATUS, AND MANUFACTURING METHOD FOR RECORDING APPARATUS' [patent_app_type] => utility [patent_app_number] => 13/152498 [patent_app_country] => US [patent_app_date] => 2011-06-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 21 [patent_no_of_words] => 19125 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0299/20110299679.pdf [firstpage_image] =>[orig_patent_app_number] => 13152498 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/152498
CONTROLLER, CONTROL METHOD, COMPUTER PROGRAM, RECORDING MEDIUM FOR COMPUTER PROGRAM, RECORDING APPARATUS, AND MANUFACTURING METHOD FOR RECORDING APPARATUS Jun 2, 2011 Abandoned
Array ( [id] => 7579209 [patent_doc_number] => 20110293092 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-12-01 [patent_title] => 'SECURITY METHOD FOR PREVENTING THE UNAUTHORIZED USE OF MULTIMEDIA CONTENTS' [patent_app_type] => utility [patent_app_number] => 13/111202 [patent_app_country] => US [patent_app_date] => 2011-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6353 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0293/20110293092.pdf [firstpage_image] =>[orig_patent_app_number] => 13111202 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/111202
Security method for preventing the unauthorized use of multimedia contents May 18, 2011 Issued
Array ( [id] => 7588604 [patent_doc_number] => 20110283115 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-11-17 [patent_title] => 'DEVICE AND A METHOD FOR GENERATING SOFTWARE CODE' [patent_app_type] => utility [patent_app_number] => 13/109502 [patent_app_country] => US [patent_app_date] => 2011-05-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3544 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0283/20110283115.pdf [firstpage_image] =>[orig_patent_app_number] => 13109502 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/109502
Device and a method for generating software code May 16, 2011 Issued
Array ( [id] => 7665005 [patent_doc_number] => 20110314274 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-12-22 [patent_title] => 'METHOD AND APPARATUS FOR SECURITY ENCAPSULATING IP DATAGRAMS' [patent_app_type] => utility [patent_app_number] => 13/109201 [patent_app_country] => US [patent_app_date] => 2011-05-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6151 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13109201 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/109201
Method and apparatus for security encapsulating IP datagrams May 16, 2011 Issued
Array ( [id] => 9049512 [patent_doc_number] => 08544070 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-09-24 [patent_title] => 'Techniques for non repudiation of storage in cloud or shared storage environments' [patent_app_type] => utility [patent_app_number] => 13/108094 [patent_app_country] => US [patent_app_date] => 2011-05-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5081 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 20 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13108094 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/108094
Techniques for non repudiation of storage in cloud or shared storage environments May 15, 2011 Issued
Menu