
Robert K. Carpenter
Examiner (ID: 12721, Phone: (571)270-5140 , Office: P/2896 )
| Most Active Art Unit | 2896 |
| Art Unit(s) | 2812, 2895, 2896, 2826 |
| Total Applications | 863 |
| Issued Applications | 717 |
| Pending Applications | 4 |
| Abandoned Applications | 146 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 5896705
[patent_doc_number] => 20060005244
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-01-05
[patent_title] => 'Virus detection in a network'
[patent_app_type] => utility
[patent_app_number] => 10/865252
[patent_app_country] => US
[patent_app_date] => 2004-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4924
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0005/20060005244.pdf
[firstpage_image] =>[orig_patent_app_number] => 10865252
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/865252 | Virus detection in a network | Jun 9, 2004 | Issued |
Array
(
[id] => 7255524
[patent_doc_number] => 20050273625
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-12-08
[patent_title] => 'Method and system for protecting a user\'s password'
[patent_app_type] => utility
[patent_app_number] => 10/860363
[patent_app_country] => US
[patent_app_date] => 2004-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2951
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0273/20050273625.pdf
[firstpage_image] =>[orig_patent_app_number] => 10860363
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/860363 | Method for protecting a user's password | Jun 2, 2004 | Issued |
Array
(
[id] => 4479327
[patent_doc_number] => 07945785
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-05-17
[patent_title] => 'Security of data over a network'
[patent_app_type] => utility
[patent_app_number] => 10/860561
[patent_app_country] => US
[patent_app_date] => 2004-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 7765
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/945/07945785.pdf
[firstpage_image] =>[orig_patent_app_number] => 10860561
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/860561 | Security of data over a network | Jun 1, 2004 | Issued |
Array
(
[id] => 7100388
[patent_doc_number] => 20050132198
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-06-16
[patent_title] => 'Document de-registration'
[patent_app_type] => utility
[patent_app_number] => 10/854005
[patent_app_country] => US
[patent_app_date] => 2004-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6202
[patent_no_of_claims] => 54
[patent_no_of_ind_claims] => 14
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0132/20050132198.pdf
[firstpage_image] =>[orig_patent_app_number] => 10854005
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/854005 | Document de-registration | May 24, 2004 | Issued |
Array
(
[id] => 5086985
[patent_doc_number] => 20070277036
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-29
[patent_title] => 'Intelligent data storage and processing using fpga devices'
[patent_app_type] => utility
[patent_app_number] => 10/550326
[patent_app_country] => US
[patent_app_date] => 2004-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 48
[patent_figures_cnt] => 48
[patent_no_of_words] => 20325
[patent_no_of_claims] => 44
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0277/20070277036.pdf
[firstpage_image] =>[orig_patent_app_number] => 10550326
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/550326 | Intelligent data storage and processing using fpga devices | May 20, 2004 | Abandoned |
Array
(
[id] => 7021641
[patent_doc_number] => 20050223230
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-06
[patent_title] => 'Asynchronous enhanced shared secret provisioning protocol'
[patent_app_type] => utility
[patent_app_number] => 10/813357
[patent_app_country] => US
[patent_app_date] => 2004-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6476
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0223/20050223230.pdf
[firstpage_image] =>[orig_patent_app_number] => 10813357
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/813357 | Asynchronous enhanced shared secret provisioning protocol | Mar 30, 2004 | Issued |
Array
(
[id] => 7193152
[patent_doc_number] => 20050193197
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-09-01
[patent_title] => 'Method of generating a cryptosync'
[patent_app_type] => utility
[patent_app_number] => 10/786454
[patent_app_country] => US
[patent_app_date] => 2004-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1833
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0193/20050193197.pdf
[firstpage_image] =>[orig_patent_app_number] => 10786454
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/786454 | Method of generating a cryptosync | Feb 25, 2004 | Abandoned |
Array
(
[id] => 7339334
[patent_doc_number] => 20040190715
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-09-30
[patent_title] => 'File security management method and file security management apparatus'
[patent_app_type] => new
[patent_app_number] => 10/785053
[patent_app_country] => US
[patent_app_date] => 2004-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 6763
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 15
[patent_words_short_claim] => 29
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0190/20040190715.pdf
[firstpage_image] =>[orig_patent_app_number] => 10785053
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/785053 | File security management method and file security management apparatus | Feb 24, 2004 | Abandoned |
Array
(
[id] => 7052495
[patent_doc_number] => 20050188214
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-08-25
[patent_title] => 'Authenticatable software modules'
[patent_app_type] => utility
[patent_app_number] => 10/785460
[patent_app_country] => US
[patent_app_date] => 2004-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 7337
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0188/20050188214.pdf
[firstpage_image] =>[orig_patent_app_number] => 10785460
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/785460 | Authenticatable software modules | Feb 22, 2004 | Abandoned |
Array
(
[id] => 8235767
[patent_doc_number] => 08201230
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-06-12
[patent_title] => 'Method and system for protecting user choices'
[patent_app_type] => utility
[patent_app_number] => 10/783558
[patent_app_country] => US
[patent_app_date] => 2004-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5352
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/201/08201230.pdf
[firstpage_image] =>[orig_patent_app_number] => 10783558
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/783558 | Method and system for protecting user choices | Feb 19, 2004 | Issued |
Array
(
[id] => 234053
[patent_doc_number] => 07599489
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2009-10-06
[patent_title] => 'Accelerating cryptographic hash computations'
[patent_app_type] => utility
[patent_app_number] => 10/783859
[patent_app_country] => US
[patent_app_date] => 2004-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 14
[patent_no_of_words] => 4646
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/599/07599489.pdf
[firstpage_image] =>[orig_patent_app_number] => 10783859
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/783859 | Accelerating cryptographic hash computations | Feb 18, 2004 | Issued |
Array
(
[id] => 5047576
[patent_doc_number] => 20070266250
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-15
[patent_title] => 'Mobile Data Transmission Method and System'
[patent_app_type] => utility
[patent_app_number] => 10/542960
[patent_app_country] => US
[patent_app_date] => 2004-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10924
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0266/20070266250.pdf
[firstpage_image] =>[orig_patent_app_number] => 10542960
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/542960 | Mobile Data Transmission Method and System | Jan 21, 2004 | Abandoned |
Array
(
[id] => 6919887
[patent_doc_number] => 20050097324
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-05-05
[patent_title] => 'Disk control unit'
[patent_app_type] => utility
[patent_app_number] => 10/754857
[patent_app_country] => US
[patent_app_date] => 2004-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5079
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0097/20050097324.pdf
[firstpage_image] =>[orig_patent_app_number] => 10754857
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/754857 | Disk control unit | Jan 8, 2004 | Issued |
Array
(
[id] => 7077217
[patent_doc_number] => 20050149729
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-07-07
[patent_title] => 'Method to support XML-based security and key management services in a pre-boot execution environment'
[patent_app_type] => utility
[patent_app_number] => 10/746919
[patent_app_country] => US
[patent_app_date] => 2003-12-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 13565
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0149/20050149729.pdf
[firstpage_image] =>[orig_patent_app_number] => 10746919
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/746919 | Method to support XML-based security and key management services in a pre-boot execution environment | Dec 23, 2003 | Abandoned |
Array
(
[id] => 4656634
[patent_doc_number] => 20080025495
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-01-31
[patent_title] => 'Method and System for Securing Scrambled Data'
[patent_app_type] => utility
[patent_app_number] => 10/541510
[patent_app_country] => US
[patent_app_date] => 2003-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 2371
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0025/20080025495.pdf
[firstpage_image] =>[orig_patent_app_number] => 10541510
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/541510 | Method and System for Securing Scrambled Data | Dec 21, 2003 | Abandoned |
Array
(
[id] => 9029954
[patent_doc_number] => 08539552
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-09-17
[patent_title] => 'System and method for network based policy enforcement of intelligent-client features'
[patent_app_type] => utility
[patent_app_number] => 10/671375
[patent_app_country] => US
[patent_app_date] => 2003-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11313
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 10671375
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/671375 | System and method for network based policy enforcement of intelligent-client features | Sep 24, 2003 | Issued |
Array
(
[id] => 7309177
[patent_doc_number] => 20040117636
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-06-17
[patent_title] => 'System, method and apparatus for secure two-tier backup and retrieval of authentication information'
[patent_app_type] => new
[patent_app_number] => 10/670755
[patent_app_country] => US
[patent_app_date] => 2003-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3179
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0117/20040117636.pdf
[firstpage_image] =>[orig_patent_app_number] => 10670755
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/670755 | System, method and apparatus for secure two-tier backup and retrieval of authentication information | Sep 23, 2003 | Abandoned |
Array
(
[id] => 7013304
[patent_doc_number] => 20050066043
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-03-24
[patent_title] => 'System and method for providing physical web security using IP addresses'
[patent_app_type] => utility
[patent_app_number] => 10/667852
[patent_app_country] => US
[patent_app_date] => 2003-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2392
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0066/20050066043.pdf
[firstpage_image] =>[orig_patent_app_number] => 10667852
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/667852 | System and method for providing physical web security using IP addresses | Sep 21, 2003 | Issued |
Array
(
[id] => 7360890
[patent_doc_number] => 20040049685
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-03-11
[patent_title] => 'Authorisation method for a user of a limited access system having an authorisation centre'
[patent_app_type] => new
[patent_app_number] => 10/658345
[patent_app_country] => US
[patent_app_date] => 2003-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6662
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 288
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0049/20040049685.pdf
[firstpage_image] =>[orig_patent_app_number] => 10658345
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/658345 | Authorisation method for a user of a limited access system having an authorisation centre | Sep 8, 2003 | Abandoned |
Array
(
[id] => 7316194
[patent_doc_number] => 20040034793
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-02-19
[patent_title] => 'Method for providing media communication across firewalls'
[patent_app_type] => new
[patent_app_number] => 10/642256
[patent_app_country] => US
[patent_app_date] => 2003-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 8184
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0034/20040034793.pdf
[firstpage_image] =>[orig_patent_app_number] => 10642256
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/642256 | Method for providing media communication across firewalls | Aug 14, 2003 | Issued |