
Robert W. Ramsuer
Examiner (ID: 5936)
| Most Active Art Unit | 1201 |
| Art Unit(s) | 1209, 1613, 1202, 1201, 1626 |
| Total Applications | 2049 |
| Issued Applications | 1669 |
| Pending Applications | 106 |
| Abandoned Applications | 274 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9765877
[patent_doc_number] => 08850225
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-30
[patent_title] => 'Method and system for cryptographic processing core'
[patent_app_type] => utility
[patent_app_number] => 12/762246
[patent_app_country] => US
[patent_app_date] => 2010-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4864
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12762246
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/762246 | Method and system for cryptographic processing core | Apr 15, 2010 | Issued |
Array
(
[id] => 8449164
[patent_doc_number] => 08291232
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-10-16
[patent_title] => 'Method and a system for a secure execution of workflow tasks of a workflow in a decentralized workflow system'
[patent_app_type] => utility
[patent_app_number] => 12/758264
[patent_app_country] => US
[patent_app_date] => 2010-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11324
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12758264
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/758264 | Method and a system for a secure execution of workflow tasks of a workflow in a decentralized workflow system | Apr 11, 2010 | Issued |
Array
(
[id] => 8412584
[patent_doc_number] => 08275996
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-09-25
[patent_title] => 'Incremental encryption of stored information'
[patent_app_type] => utility
[patent_app_number] => 12/758499
[patent_app_country] => US
[patent_app_date] => 2010-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 14
[patent_no_of_words] => 7537
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 299
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12758499
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/758499 | Incremental encryption of stored information | Apr 11, 2010 | Issued |
Array
(
[id] => 7490570
[patent_doc_number] => 20110252237
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-10-13
[patent_title] => 'Authorizing Remote Access Points'
[patent_app_type] => utility
[patent_app_number] => 12/757771
[patent_app_country] => US
[patent_app_date] => 2010-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1958
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0252/20110252237.pdf
[firstpage_image] =>[orig_patent_app_number] => 12757771
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/757771 | Authorizing remote access points | Apr 8, 2010 | Issued |
Array
(
[id] => 8804924
[patent_doc_number] => 08443207
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-05-14
[patent_title] => 'File system filter authentication'
[patent_app_type] => utility
[patent_app_number] => 12/727030
[patent_app_country] => US
[patent_app_date] => 2010-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 9523
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12727030
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/727030 | File system filter authentication | Mar 17, 2010 | Issued |
Array
(
[id] => 9458913
[patent_doc_number] => 08719939
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-05-06
[patent_title] => 'Malware detection via reputation system'
[patent_app_type] => utility
[patent_app_number] => 12/693765
[patent_app_country] => US
[patent_app_date] => 2010-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3160
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12693765
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/693765 | Malware detection via reputation system | Jan 25, 2010 | Issued |
Array
(
[id] => 8536113
[patent_doc_number] => 08312275
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-11-13
[patent_title] => 'Network device authentication'
[patent_app_type] => utility
[patent_app_number] => 12/652957
[patent_app_country] => US
[patent_app_date] => 2010-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10580
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12652957
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/652957 | Network device authentication | Jan 5, 2010 | Issued |
Array
(
[id] => 6646782
[patent_doc_number] => 20100174901
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-08
[patent_title] => 'IMPLEMENTING IEEE 802.1AE AND 802.1af SECURITY IN EPON (1GEPON AND 10GEPON) NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 12/652057
[patent_app_country] => US
[patent_app_date] => 2010-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9207
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0174/20100174901.pdf
[firstpage_image] =>[orig_patent_app_number] => 12652057
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/652057 | Implementing IEEE 802.1AE and 802.1 af security in EPON (1GEPON and 10GEPON) networks | Jan 4, 2010 | Issued |
Array
(
[id] => 6074518
[patent_doc_number] => 20110047592
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-02-24
[patent_title] => 'PRE-REGISTRATION SECURITY SUPPORT IN MULTI-TECHNOLOGY INTERWORKING'
[patent_app_type] => utility
[patent_app_number] => 12/652315
[patent_app_country] => US
[patent_app_date] => 2010-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6660
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0047/20110047592.pdf
[firstpage_image] =>[orig_patent_app_number] => 12652315
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/652315 | Pre-registration security support in multi-technology interworking | Jan 4, 2010 | Issued |
Array
(
[id] => 8449146
[patent_doc_number] => 08291214
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-10-16
[patent_title] => 'Apparatus and method for secure remote processing'
[patent_app_type] => utility
[patent_app_number] => 12/650564
[patent_app_country] => US
[patent_app_date] => 2009-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 4877
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12650564
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/650564 | Apparatus and method for secure remote processing | Dec 30, 2009 | Issued |
Array
(
[id] => 6446698
[patent_doc_number] => 20100153490
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-17
[patent_title] => 'CENTRALIZED DATA TRANSFORMATION'
[patent_app_type] => utility
[patent_app_number] => 12/640854
[patent_app_country] => US
[patent_app_date] => 2009-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7831
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0153/20100153490.pdf
[firstpage_image] =>[orig_patent_app_number] => 12640854
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/640854 | Centralized data transformation | Dec 16, 2009 | Issued |
Array
(
[id] => 9378922
[patent_doc_number] => 08683204
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-25
[patent_title] => 'Efficient techniques for achieving secure transactions using tamper-resistant tokens'
[patent_app_type] => utility
[patent_app_number] => 12/592907
[patent_app_country] => US
[patent_app_date] => 2009-12-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 4814
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12592907
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/592907 | Efficient techniques for achieving secure transactions using tamper-resistant tokens | Dec 3, 2009 | Issued |
Array
(
[id] => 8377131
[patent_doc_number] => 08259934
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-09-04
[patent_title] => 'Methods and devices for a chained encryption mode'
[patent_app_type] => utility
[patent_app_number] => 12/592696
[patent_app_country] => US
[patent_app_date] => 2009-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 5151
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12592696
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/592696 | Methods and devices for a chained encryption mode | Nov 30, 2009 | Issued |
Array
(
[id] => 8627155
[patent_doc_number] => 08359660
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-01-22
[patent_title] => 'Method and apparatus of securing data in a portable flash memory'
[patent_app_type] => utility
[patent_app_number] => 12/591689
[patent_app_country] => US
[patent_app_date] => 2009-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 2899
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12591689
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/591689 | Method and apparatus of securing data in a portable flash memory | Nov 29, 2009 | Issued |
Array
(
[id] => 8763530
[patent_doc_number] => 08424069
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-04-16
[patent_title] => 'Method and system for authenticating subaccount users'
[patent_app_type] => utility
[patent_app_number] => 12/592204
[patent_app_country] => US
[patent_app_date] => 2009-11-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3138
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12592204
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/592204 | Method and system for authenticating subaccount users | Nov 19, 2009 | Issued |
Array
(
[id] => 6313655
[patent_doc_number] => 20100071058
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-03-18
[patent_title] => 'ELECTRONIC DEVICE AND CONTROLLING METHOD OF ELECTRONIC DEVICE'
[patent_app_type] => utility
[patent_app_number] => 12/622041
[patent_app_country] => US
[patent_app_date] => 2009-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 37
[patent_figures_cnt] => 37
[patent_no_of_words] => 7952
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0071/20100071058.pdf
[firstpage_image] =>[orig_patent_app_number] => 12622041
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/622041 | Electronic device and controlling method of electronic device | Nov 18, 2009 | Issued |
Array
(
[id] => 8752393
[patent_doc_number] => 08418237
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-04-09
[patent_title] => 'Resource access based on multiple credentials'
[patent_app_type] => utility
[patent_app_number] => 12/582185
[patent_app_country] => US
[patent_app_date] => 2009-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7295
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12582185
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/582185 | Resource access based on multiple credentials | Oct 19, 2009 | Issued |
Array
(
[id] => 7679356
[patent_doc_number] => 20100107231
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-29
[patent_title] => 'FAILURE INDICATION'
[patent_app_type] => utility
[patent_app_number] => 12/582544
[patent_app_country] => US
[patent_app_date] => 2009-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4333
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0107/20100107231.pdf
[firstpage_image] =>[orig_patent_app_number] => 12582544
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/582544 | FAILURE INDICATION | Oct 19, 2009 | Abandoned |
Array
(
[id] => 8308948
[patent_doc_number] => 08230503
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-07-24
[patent_title] => 'Method of extracting windows executable file using hardware based on session matching and pattern matching and apparatus using the same'
[patent_app_type] => utility
[patent_app_number] => 12/503288
[patent_app_country] => US
[patent_app_date] => 2009-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 13
[patent_no_of_words] => 5433
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12503288
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/503288 | Method of extracting windows executable file using hardware based on session matching and pattern matching and apparatus using the same | Aug 16, 2009 | Issued |
Array
(
[id] => 6647220
[patent_doc_number] => 20100036955
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-02-11
[patent_title] => 'Creating Rules For Routing Resource Access Requests'
[patent_app_type] => utility
[patent_app_number] => 12/512891
[patent_app_country] => US
[patent_app_date] => 2009-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 10614
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0036/20100036955.pdf
[firstpage_image] =>[orig_patent_app_number] => 12512891
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/512891 | Creating rules for routing resource access requests | Jul 29, 2009 | Issued |