
Robert K. Carpenter
Examiner (ID: 12721, Phone: (571)270-5140 , Office: P/2896 )
| Most Active Art Unit | 2896 |
| Art Unit(s) | 2812, 2895, 2896, 2826 |
| Total Applications | 863 |
| Issued Applications | 717 |
| Pending Applications | 4 |
| Abandoned Applications | 146 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 8728346
[patent_doc_number] => 08407487
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-03-26
[patent_title] => 'Electronic device and method for security monitoring thereof'
[patent_app_type] => utility
[patent_app_number] => 12/859269
[patent_app_country] => US
[patent_app_date] => 2010-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1601
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12859269
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/859269 | Electronic device and method for security monitoring thereof | Aug 18, 2010 | Issued |
Array
(
[id] => 8843335
[patent_doc_number] => 20130138963
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-30
[patent_title] => 'STATE-MAINTAINED MULTI-PARTY SIGNATURES'
[patent_app_type] => utility
[patent_app_number] => 12/859738
[patent_app_country] => US
[patent_app_date] => 2010-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3823
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12859738
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/859738 | State-maintained multi-party signatures | Aug 18, 2010 | Issued |
Array
(
[id] => 6031563
[patent_doc_number] => 20110055558
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-03
[patent_title] => 'GALOIS/COUNTER MODE ENCRYPTION IN A WIRELESS NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/858950
[patent_app_country] => US
[patent_app_date] => 2010-08-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 9623
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0055/20110055558.pdf
[firstpage_image] =>[orig_patent_app_number] => 12858950
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/858950 | Galois/counter mode encryption in a wireless network | Aug 17, 2010 | Issued |
Array
(
[id] => 6073662
[patent_doc_number] => 20110047379
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-02-24
[patent_title] => 'APPARATUS AND METHOD FOR TRANSMITTING DIGITAL MULTIMEDIA BROADCASTING DATA, AND METHOD AND APPARATUS FOR RECEIVING DIGITAL MULTIMEDIA BROADCASTING DATA'
[patent_app_type] => utility
[patent_app_number] => 12/858677
[patent_app_country] => US
[patent_app_date] => 2010-08-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 5507
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0047/20110047379.pdf
[firstpage_image] =>[orig_patent_app_number] => 12858677
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/858677 | Apparatus and method for transmitting digital multimedia broadcasting data, and method and apparatus for receiving digital multimedia broadcasting data | Aug 17, 2010 | Issued |
Array
(
[id] => 10179916
[patent_doc_number] => 09210140
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-08
[patent_title] => 'Remote functionality selection'
[patent_app_type] => utility
[patent_app_number] => 12/858345
[patent_app_country] => US
[patent_app_date] => 2010-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 11542
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12858345
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/858345 | Remote functionality selection | Aug 16, 2010 | Issued |
Array
(
[id] => 7786004
[patent_doc_number] => 20120047560
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-23
[patent_title] => 'Social Age Verification Engine'
[patent_app_type] => utility
[patent_app_number] => 12/858403
[patent_app_country] => US
[patent_app_date] => 2010-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6869
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0047/20120047560.pdf
[firstpage_image] =>[orig_patent_app_number] => 12858403
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/858403 | Social age verification engine | Aug 16, 2010 | Issued |
Array
(
[id] => 7582647
[patent_doc_number] => 20110296530
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-01
[patent_title] => 'ELECTRONIC READING APPARATUS AND THE DATA SECURITY METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 12/857663
[patent_app_country] => US
[patent_app_date] => 2010-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3014
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0296/20110296530.pdf
[firstpage_image] =>[orig_patent_app_number] => 12857663
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/857663 | ELECTRONIC READING APPARATUS AND THE DATA SECURITY METHOD THEREOF | Aug 16, 2010 | Abandoned |
Array
(
[id] => 11392621
[patent_doc_number] => 09553878
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-24
[patent_title] => 'People directory with social privacy and contact association features'
[patent_app_type] => utility
[patent_app_number] => 12/857192
[patent_app_country] => US
[patent_app_date] => 2010-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8744
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12857192
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/857192 | People directory with social privacy and contact association features | Aug 15, 2010 | Issued |
Array
(
[id] => 6140647
[patent_doc_number] => 20110010540
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-13
[patent_title] => 'Method for Providing Information Security for Wireless Transmissions'
[patent_app_type] => utility
[patent_app_number] => 12/848745
[patent_app_country] => US
[patent_app_date] => 2010-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3128
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0010/20110010540.pdf
[firstpage_image] =>[orig_patent_app_number] => 12848745
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/848745 | Method for Providing Information Security for Wireless Transmissions | Aug 1, 2010 | Abandoned |
Array
(
[id] => 6273643
[patent_doc_number] => 20100299749
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-11-25
[patent_title] => 'Secure Booting System And Method'
[patent_app_type] => utility
[patent_app_number] => 12/846488
[patent_app_country] => US
[patent_app_date] => 2010-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 91
[patent_figures_cnt] => 91
[patent_no_of_words] => 21328
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0299/20100299749.pdf
[firstpage_image] =>[orig_patent_app_number] => 12846488
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/846488 | Secure booting system and method | Jul 28, 2010 | Issued |
Array
(
[id] => 9110264
[patent_doc_number] => 20130283396
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-24
[patent_title] => 'SYSTEM AND METHOD FOR LIMITING EXECUTION OF SOFTWARE TO AUTHORIZED USERS'
[patent_app_type] => utility
[patent_app_number] => 13/387914
[patent_app_country] => US
[patent_app_date] => 2010-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4923
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13387914
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/387914 | SYSTEM AND METHOD FOR LIMITING EXECUTION OF SOFTWARE TO AUTHORIZED USERS | Jul 25, 2010 | Abandoned |
Array
(
[id] => 8978974
[patent_doc_number] => 20130212404
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-15
[patent_title] => 'DOCUMENT MODIFICATION DETECTION AND PREVENTION'
[patent_app_type] => utility
[patent_app_number] => 12/795502
[patent_app_country] => US
[patent_app_date] => 2010-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5820
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12795502
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/795502 | Document modification detection and prevention | Jun 6, 2010 | Issued |
Array
(
[id] => 6584986
[patent_doc_number] => 20100235624
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-16
[patent_title] => 'METHOD AND APPARATUS FOR PROTECTING THE TRANSFER OF DATA'
[patent_app_type] => utility
[patent_app_number] => 12/790108
[patent_app_country] => US
[patent_app_date] => 2010-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 11019
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20100235624.pdf
[firstpage_image] =>[orig_patent_app_number] => 12790108
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/790108 | Method and apparatus for protecting the transfer of data | May 27, 2010 | Issued |
Array
(
[id] => 8144025
[patent_doc_number] => 20120096558
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-19
[patent_title] => 'Assessing Threat to at Least One Computer Network'
[patent_app_type] => utility
[patent_app_number] => 13/322298
[patent_app_country] => US
[patent_app_date] => 2010-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9796
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0096/20120096558.pdf
[firstpage_image] =>[orig_patent_app_number] => 13322298
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/322298 | Assessing threat to at least one computer network | May 18, 2010 | Issued |
Array
(
[id] => 8941840
[patent_doc_number] => 20130191637
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-25
[patent_title] => 'METHOD AND APPARATUS FOR AUTHENTICATED ENCRYPTION OF AUDIO'
[patent_app_type] => utility
[patent_app_number] => 13/638647
[patent_app_country] => US
[patent_app_date] => 2010-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1688
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13638647
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/638647 | METHOD AND APPARATUS FOR AUTHENTICATED ENCRYPTION OF AUDIO | Mar 30, 2010 | Abandoned |
Array
(
[id] => 6126364
[patent_doc_number] => 20110078794
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-31
[patent_title] => 'Network-Based Binary File Extraction and Analysis for Malware Detection'
[patent_app_type] => utility
[patent_app_number] => 12/571294
[patent_app_country] => US
[patent_app_date] => 2009-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8916
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0078/20110078794.pdf
[firstpage_image] =>[orig_patent_app_number] => 12571294
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/571294 | Network-based binary file extraction and analysis for malware detection | Sep 29, 2009 | Issued |
Array
(
[id] => 8445556
[patent_doc_number] => 08287603
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-10-16
[patent_title] => 'Electronic device with protection from unauthorized utilization'
[patent_app_type] => utility
[patent_app_number] => 12/538099
[patent_app_country] => US
[patent_app_date] => 2009-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 90
[patent_figures_cnt] => 99
[patent_no_of_words] => 21279
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12538099
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/538099 | Electronic device with protection from unauthorized utilization | Aug 6, 2009 | Issued |
Array
(
[id] => 6094072
[patent_doc_number] => 20110002460
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-06
[patent_title] => 'HIGH-SPEED CRYPTOGRAPHIC SYSTEM USING CHAOTIC SEQUENCES'
[patent_app_type] => utility
[patent_app_number] => 12/496085
[patent_app_country] => US
[patent_app_date] => 2009-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12406
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0002/20110002460.pdf
[firstpage_image] =>[orig_patent_app_number] => 12496085
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/496085 | High-speed cryptographic system using chaotic sequences | Jun 30, 2009 | Issued |
Array
(
[id] => 9878948
[patent_doc_number] => 08966244
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-24
[patent_title] => 'Embedded apparatus, remote-processing method, and computer program product'
[patent_app_type] => utility
[patent_app_number] => 12/495938
[patent_app_country] => US
[patent_app_date] => 2009-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 19
[patent_no_of_words] => 10104
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 303
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12495938
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/495938 | Embedded apparatus, remote-processing method, and computer program product | Jun 30, 2009 | Issued |
Array
(
[id] => 8985102
[patent_doc_number] => 08516232
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-20
[patent_title] => 'Method and memory device for performing an operation on data'
[patent_app_type] => utility
[patent_app_number] => 12/495302
[patent_app_country] => US
[patent_app_date] => 2009-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4585
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12495302
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/495302 | Method and memory device for performing an operation on data | Jun 29, 2009 | Issued |