
Robert W. Ramsuer
Examiner (ID: 5936)
| Most Active Art Unit | 1201 |
| Art Unit(s) | 1209, 1613, 1202, 1201, 1626 |
| Total Applications | 2049 |
| Issued Applications | 1669 |
| Pending Applications | 106 |
| Abandoned Applications | 274 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 7123677
[patent_doc_number] => 20050015506
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-01-20
[patent_title] => 'System and method for anonymous information exchange'
[patent_app_type] => utility
[patent_app_number] => 10/859065
[patent_app_country] => US
[patent_app_date] => 2004-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4528
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0015/20050015506.pdf
[firstpage_image] =>[orig_patent_app_number] => 10859065
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/859065 | System and method for anonymous information exchange | May 31, 2004 | Abandoned |
Array
(
[id] => 7091816
[patent_doc_number] => 20050010759
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-01-13
[patent_title] => 'Communications system and packet structure'
[patent_app_type] => utility
[patent_app_number] => 10/852190
[patent_app_country] => US
[patent_app_date] => 2004-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7957
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0010/20050010759.pdf
[firstpage_image] =>[orig_patent_app_number] => 10852190
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/852190 | Communications system and packet structure | May 24, 2004 | Issued |
Array
(
[id] => 7255363
[patent_doc_number] => 20050273596
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-12-08
[patent_title] => 'Architecture and design for central authentication and authorization in an on-demand utility environment using a secured global hashtable'
[patent_app_type] => utility
[patent_app_number] => 10/850398
[patent_app_country] => US
[patent_app_date] => 2004-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3540
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0273/20050273596.pdf
[firstpage_image] =>[orig_patent_app_number] => 10850398
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/850398 | Architecture and design for central authentication and authorization in an on-demand utility environment using a secured global hashtable | May 19, 2004 | Issued |
Array
(
[id] => 7255322
[patent_doc_number] => 20050273592
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-12-08
[patent_title] => 'System, method and program for protecting communication'
[patent_app_type] => utility
[patent_app_number] => 10/850997
[patent_app_country] => US
[patent_app_date] => 2004-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6166
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0273/20050273592.pdf
[firstpage_image] =>[orig_patent_app_number] => 10850997
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/850997 | System, method and program for protecting communication | May 19, 2004 | Issued |
Array
(
[id] => 7232201
[patent_doc_number] => 20050262207
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-11-24
[patent_title] => 'Offline message security via selective data replication'
[patent_app_type] => utility
[patent_app_number] => 10/849600
[patent_app_country] => US
[patent_app_date] => 2004-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2310
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0262/20050262207.pdf
[firstpage_image] =>[orig_patent_app_number] => 10849600
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/849600 | Offline message security via selective data replication | May 19, 2004 | Issued |
Array
(
[id] => 8728650
[patent_doc_number] => 08407792
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-03-26
[patent_title] => 'Systems and methods for computer security'
[patent_app_type] => utility
[patent_app_number] => 10/849633
[patent_app_country] => US
[patent_app_date] => 2004-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 2821
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 10849633
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/849633 | Systems and methods for computer security | May 18, 2004 | Issued |
Array
(
[id] => 7277297
[patent_doc_number] => 20040236748
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-11-25
[patent_title] => 'Coordinating, auditing, and controlling multi-site data collection without sharing sensitive data'
[patent_app_type] => new
[patent_app_number] => 10/849681
[patent_app_country] => US
[patent_app_date] => 2004-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4999
[patent_no_of_claims] => 41
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0236/20040236748.pdf
[firstpage_image] =>[orig_patent_app_number] => 10849681
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/849681 | Coordinating, auditing, and controlling multi-site data collection without sharing sensitive data | May 18, 2004 | Issued |
Array
(
[id] => 7416244
[patent_doc_number] => 20040228492
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-11-18
[patent_title] => 'Method of distributing encryption keys among nodes in mobile ad hoc network and network device using the same'
[patent_app_type] => new
[patent_app_number] => 10/845195
[patent_app_country] => US
[patent_app_date] => 2004-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5068
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 62
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0228/20040228492.pdf
[firstpage_image] =>[orig_patent_app_number] => 10845195
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/845195 | Method of distributing encryption keys among nodes in mobile ad hoc network and network device using the same | May 13, 2004 | Issued |
Array
(
[id] => 7241061
[patent_doc_number] => 20050257039
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-11-17
[patent_title] => 'Virtual private network configuration system and method'
[patent_app_type] => utility
[patent_app_number] => 10/845770
[patent_app_country] => US
[patent_app_date] => 2004-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7055
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0257/20050257039.pdf
[firstpage_image] =>[orig_patent_app_number] => 10845770
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/845770 | Virtual private network configuration system and method | May 12, 2004 | Abandoned |
Array
(
[id] => 7242855
[patent_doc_number] => 20050257259
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-11-17
[patent_title] => 'Method for controlling the re-use of prefilled reagent dispensers and other consumables'
[patent_app_type] => utility
[patent_app_number] => 10/844678
[patent_app_country] => US
[patent_app_date] => 2004-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3985
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0257/20050257259.pdf
[firstpage_image] =>[orig_patent_app_number] => 10844678
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/844678 | Method for controlling the re-use of prefilled reagent dispensers and other consumables | May 11, 2004 | Abandoned |
Array
(
[id] => 6927738
[patent_doc_number] => 20050240995
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-27
[patent_title] => 'Computer security system and method'
[patent_app_type] => utility
[patent_app_number] => 10/831477
[patent_app_country] => US
[patent_app_date] => 2004-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2876
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0240/20050240995.pdf
[firstpage_image] =>[orig_patent_app_number] => 10831477
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/831477 | Computer security system and method | Apr 22, 2004 | Abandoned |
Array
(
[id] => 7030577
[patent_doc_number] => 20050021973
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-01-27
[patent_title] => 'Cryptographic method and apparatus'
[patent_app_type] => utility
[patent_app_number] => 10/831776
[patent_app_country] => US
[patent_app_date] => 2004-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7199
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0021/20050021973.pdf
[firstpage_image] =>[orig_patent_app_number] => 10831776
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/831776 | Cryptographic method and apparatus | Apr 21, 2004 | Abandoned |
Array
(
[id] => 6968291
[patent_doc_number] => 20050235164
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-20
[patent_title] => 'Systems and methods for computer security'
[patent_app_type] => utility
[patent_app_number] => 10/826987
[patent_app_country] => US
[patent_app_date] => 2004-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 2695
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20050235164.pdf
[firstpage_image] =>[orig_patent_app_number] => 10826987
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/826987 | Systems and methods for computer security | Apr 18, 2004 | Issued |
Array
(
[id] => 7300473
[patent_doc_number] => 20040215966
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-10-28
[patent_title] => 'Bending USB token'
[patent_app_type] => new
[patent_app_number] => 10/827086
[patent_app_country] => US
[patent_app_date] => 2004-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2357
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0215/20040215966.pdf
[firstpage_image] =>[orig_patent_app_number] => 10827086
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/827086 | Bending USB token | Apr 18, 2004 | Abandoned |
Array
(
[id] => 6968851
[patent_doc_number] => 20050235361
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-20
[patent_title] => 'Rendering protected digital content within a network of computing devices or the like'
[patent_app_type] => utility
[patent_app_number] => 10/827167
[patent_app_country] => US
[patent_app_date] => 2004-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8923
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20050235361.pdf
[firstpage_image] =>[orig_patent_app_number] => 10827167
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/827167 | Rendering protected digital content within a network of computing devices or the like | Apr 18, 2004 | Issued |
Array
(
[id] => 6968265
[patent_doc_number] => 20050235150
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-20
[patent_title] => 'Bi-directionally verifying measurable aspects associated with modules, pre-computing solutions to configuration challenges, and using configuration challenges along with other authentication mechanisms'
[patent_app_type] => utility
[patent_app_number] => 10/827082
[patent_app_country] => US
[patent_app_date] => 2004-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8485
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20050235150.pdf
[firstpage_image] =>[orig_patent_app_number] => 10827082
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/827082 | Bi-directionally verifying measurable aspects associated with modules, pre-computing solutions to configuration challenges, and using configuration challenges along with other authentication mechanisms | Apr 18, 2004 | Abandoned |
Array
(
[id] => 7333311
[patent_doc_number] => 20040255130
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-12-16
[patent_title] => 'Microprocessor apparatus and method for providing configurable cryptographic key size'
[patent_app_type] => new
[patent_app_number] => 10/826632
[patent_app_country] => US
[patent_app_date] => 2004-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 16045
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 51
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0255/20040255130.pdf
[firstpage_image] =>[orig_patent_app_number] => 10826632
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/826632 | Apparatus and method for generating a cryptographic key schedule in a microprocessor | Apr 15, 2004 | Issued |
Array
(
[id] => 343181
[patent_doc_number] => 07502943
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-03-10
[patent_title] => 'Microprocessor apparatus and method for providing configurable cryptographic block cipher round results'
[patent_app_type] => utility
[patent_app_number] => 10/826435
[patent_app_country] => US
[patent_app_date] => 2004-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 15
[patent_no_of_words] => 14706
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/502/07502943.pdf
[firstpage_image] =>[orig_patent_app_number] => 10826435
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/826435 | Microprocessor apparatus and method for providing configurable cryptographic block cipher round results | Apr 15, 2004 | Issued |
Array
(
[id] => 7419037
[patent_doc_number] => 20040208072
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-10-21
[patent_title] => 'Microprocessor apparatus and method for providing configurable cryptographic key size'
[patent_app_type] => new
[patent_app_number] => 10/826475
[patent_app_country] => US
[patent_app_date] => 2004-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 15179
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 48
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0208/20040208072.pdf
[firstpage_image] =>[orig_patent_app_number] => 10826475
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/826475 | Microprocessor apparatus and method for providing configurable cryptographic key size | Apr 15, 2004 | Issued |
Array
(
[id] => 325220
[patent_doc_number] => 07519833
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-04-14
[patent_title] => 'Microprocessor apparatus and method for enabling configurable data block size in a cryptographic engine'
[patent_app_type] => utility
[patent_app_number] => 10/826433
[patent_app_country] => US
[patent_app_date] => 2004-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 15
[patent_no_of_words] => 15052
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/519/07519833.pdf
[firstpage_image] =>[orig_patent_app_number] => 10826433
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/826433 | Microprocessor apparatus and method for enabling configurable data block size in a cryptographic engine | Apr 15, 2004 | Issued |