
Robert K. Carpenter
Examiner (ID: 12721, Phone: (571)270-5140 , Office: P/2896 )
| Most Active Art Unit | 2896 |
| Art Unit(s) | 2812, 2895, 2896, 2826 |
| Total Applications | 863 |
| Issued Applications | 717 |
| Pending Applications | 4 |
| Abandoned Applications | 146 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 8865107
[patent_doc_number] => 20130148810
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-13
[patent_title] => 'SINGLE USE RECOVERY KEY'
[patent_app_type] => utility
[patent_app_number] => 13/316587
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9021
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13316587
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/316587 | Single use recovery key | Dec 11, 2011 | Issued |
Array
(
[id] => 8242860
[patent_doc_number] => 20120151600
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-14
[patent_title] => 'METHOD AND SYSTEM FOR PROTECTING INTELLECTUAL PROPERTY IN SOFTWARE'
[patent_app_type] => utility
[patent_app_number] => 13/323786
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 6855
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323786
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/323786 | Method and system for protecting intellectual property in software | Dec 11, 2011 | Issued |
Array
(
[id] => 11780751
[patent_doc_number] => 09389933
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'Facilitating system service request interactions for hardware-protected applications'
[patent_app_type] => utility
[patent_app_number] => 13/323562
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7299
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323562
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/323562 | Facilitating system service request interactions for hardware-protected applications | Dec 11, 2011 | Issued |
Array
(
[id] => 10172891
[patent_doc_number] => 09203609
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-01
[patent_title] => 'Method and apparatus for implementing key stream hierarchy'
[patent_app_type] => utility
[patent_app_number] => 13/316932
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 9714
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13316932
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/316932 | Method and apparatus for implementing key stream hierarchy | Dec 11, 2011 | Issued |
Array
(
[id] => 8868485
[patent_doc_number] => 20130152188
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-13
[patent_title] => 'PORT ALLOCATION IN A FIREWALL CLUSTER'
[patent_app_type] => utility
[patent_app_number] => 13/323815
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2932
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323815
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/323815 | Port allocation in a firewall cluster | Dec 11, 2011 | Issued |
Array
(
[id] => 8864950
[patent_doc_number] => 20130148653
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-13
[patent_title] => 'MECHANISM FOR ESTABLISHING REPUTATION IN A NETWORK ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 13/313933
[patent_app_country] => US
[patent_app_date] => 2011-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12180
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13313933
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/313933 | Mechanism for establishing reputation in a network environment | Dec 6, 2011 | Issued |
Array
(
[id] => 8693189
[patent_doc_number] => 08392725
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-03-05
[patent_title] => 'Method for fast decryption of processor instructions'
[patent_app_type] => utility
[patent_app_number] => 13/301227
[patent_app_country] => US
[patent_app_date] => 2011-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 3347
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13301227
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/301227 | Method for fast decryption of processor instructions | Nov 20, 2011 | Issued |
Array
(
[id] => 8677424
[patent_doc_number] => 08385552
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-02-26
[patent_title] => 'Techniques for managing keys using a key server in a network segment'
[patent_app_type] => utility
[patent_app_number] => 13/285938
[patent_app_country] => US
[patent_app_date] => 2011-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 4625
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 249
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13285938
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/285938 | Techniques for managing keys using a key server in a network segment | Oct 30, 2011 | Issued |
Array
(
[id] => 8202115
[patent_doc_number] => 20120124657
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-17
[patent_title] => 'AUTOMATED SECURITY TOKEN ADMINISTRATIVE SERVICES'
[patent_app_type] => utility
[patent_app_number] => 13/275665
[patent_app_country] => US
[patent_app_date] => 2011-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 2413
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0124/20120124657.pdf
[firstpage_image] =>[orig_patent_app_number] => 13275665
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/275665 | Automated security token administrative services | Oct 17, 2011 | Issued |
Array
(
[id] => 11484395
[patent_doc_number] => 09590967
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-07
[patent_title] => 'Application authentication policy for a plurality of computing devices'
[patent_app_type] => utility
[patent_app_number] => 13/995972
[patent_app_country] => US
[patent_app_date] => 2011-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6270
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 291
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13995972
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/995972 | Application authentication policy for a plurality of computing devices | Sep 29, 2011 | Issued |
Array
(
[id] => 11433157
[patent_doc_number] => 09571489
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-14
[patent_title] => 'System and method for performing commands from a remote source'
[patent_app_type] => utility
[patent_app_number] => 13/209212
[patent_app_country] => US
[patent_app_date] => 2011-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 8
[patent_no_of_words] => 3091
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 362
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13209212
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/209212 | System and method for performing commands from a remote source | Aug 11, 2011 | Issued |
Array
(
[id] => 8280014
[patent_doc_number] => 20120173886
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-07-05
[patent_title] => 'ELECTRONIC DEVICE WITH A FILE AUTHORIZATION MANAGEMENT FUNCTION AND METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 13/163738
[patent_app_country] => US
[patent_app_date] => 2011-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 844
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13163738
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/163738 | ELECTRONIC DEVICE WITH A FILE AUTHORIZATION MANAGEMENT FUNCTION AND METHOD THEREOF | Jun 19, 2011 | Abandoned |
Array
(
[id] => 9022300
[patent_doc_number] => 08532291
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-09-10
[patent_title] => 'Copy control method'
[patent_app_type] => utility
[patent_app_number] => 13/161808
[patent_app_country] => US
[patent_app_date] => 2011-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 44
[patent_figures_cnt] => 52
[patent_no_of_words] => 30612
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 371
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13161808
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/161808 | Copy control method | Jun 15, 2011 | Issued |
Array
(
[id] => 9242258
[patent_doc_number] => 08607064
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-12-10
[patent_title] => 'Biometric authentication device and biometric authentication method'
[patent_app_type] => utility
[patent_app_number] => 13/161123
[patent_app_country] => US
[patent_app_date] => 2011-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6494
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13161123
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/161123 | Biometric authentication device and biometric authentication method | Jun 14, 2011 | Issued |
Array
(
[id] => 10179903
[patent_doc_number] => 09210127
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-08
[patent_title] => 'System and method for limiting data leakage'
[patent_app_type] => utility
[patent_app_number] => 13/161493
[patent_app_country] => US
[patent_app_date] => 2011-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5725
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13161493
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/161493 | System and method for limiting data leakage | Jun 14, 2011 | Issued |
Array
(
[id] => 7650410
[patent_doc_number] => 20110299679
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-08
[patent_title] => 'CONTROLLER, CONTROL METHOD, COMPUTER PROGRAM, RECORDING MEDIUM FOR COMPUTER PROGRAM, RECORDING APPARATUS, AND MANUFACTURING METHOD FOR RECORDING APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 13/152498
[patent_app_country] => US
[patent_app_date] => 2011-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 19125
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0299/20110299679.pdf
[firstpage_image] =>[orig_patent_app_number] => 13152498
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/152498 | CONTROLLER, CONTROL METHOD, COMPUTER PROGRAM, RECORDING MEDIUM FOR COMPUTER PROGRAM, RECORDING APPARATUS, AND MANUFACTURING METHOD FOR RECORDING APPARATUS | Jun 2, 2011 | Abandoned |
Array
(
[id] => 7579209
[patent_doc_number] => 20110293092
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-01
[patent_title] => 'SECURITY METHOD FOR PREVENTING THE UNAUTHORIZED USE OF MULTIMEDIA CONTENTS'
[patent_app_type] => utility
[patent_app_number] => 13/111202
[patent_app_country] => US
[patent_app_date] => 2011-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6353
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0293/20110293092.pdf
[firstpage_image] =>[orig_patent_app_number] => 13111202
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/111202 | Security method for preventing the unauthorized use of multimedia contents | May 18, 2011 | Issued |
Array
(
[id] => 7588604
[patent_doc_number] => 20110283115
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-17
[patent_title] => 'DEVICE AND A METHOD FOR GENERATING SOFTWARE CODE'
[patent_app_type] => utility
[patent_app_number] => 13/109502
[patent_app_country] => US
[patent_app_date] => 2011-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3544
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0283/20110283115.pdf
[firstpage_image] =>[orig_patent_app_number] => 13109502
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/109502 | Device and a method for generating software code | May 16, 2011 | Issued |
Array
(
[id] => 7665005
[patent_doc_number] => 20110314274
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-22
[patent_title] => 'METHOD AND APPARATUS FOR SECURITY ENCAPSULATING IP DATAGRAMS'
[patent_app_type] => utility
[patent_app_number] => 13/109201
[patent_app_country] => US
[patent_app_date] => 2011-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6151
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13109201
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/109201 | Method and apparatus for security encapsulating IP datagrams | May 16, 2011 | Issued |
Array
(
[id] => 9049512
[patent_doc_number] => 08544070
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-09-24
[patent_title] => 'Techniques for non repudiation of storage in cloud or shared storage environments'
[patent_app_type] => utility
[patent_app_number] => 13/108094
[patent_app_country] => US
[patent_app_date] => 2011-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5081
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 20
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13108094
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/108094 | Techniques for non repudiation of storage in cloud or shared storage environments | May 15, 2011 | Issued |