Stephen K Cronin
Supervisory Patent Examiner (ID: 10179, Phone: (571)272-4536 , Office: P/3747 )
Most Active Art Unit | 3727 |
Art Unit(s) | 2401, 2899, 3727, 3207, 3747 |
Total Applications | 1665 |
Issued Applications | 1267 |
Pending Applications | 108 |
Abandoned Applications | 289 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 6836137
[patent_doc_number] => 20030163683
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2003-08-28
[patent_title] => 'Increasing peer privacy'
[patent_app_type] => new
[patent_app_number] => 10/084499
[patent_app_country] => US
[patent_app_date] => 2002-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9426
[patent_no_of_claims] => 42
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 72
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0163/20030163683.pdf
[firstpage_image] =>[orig_patent_app_number] => 10084499
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/084499 | Increasing peer privacy | Feb 27, 2002 | Issued |
Array
(
[id] => 6802422
[patent_doc_number] => 20030097587
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2003-05-22
[patent_title] => 'Hardware interlock mechanism using a watchdog timer'
[patent_app_type] => new
[patent_app_number] => 10/084596
[patent_app_country] => US
[patent_app_date] => 2002-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 8198
[patent_no_of_claims] => 65
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 54
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0097/20030097587.pdf
[firstpage_image] =>[orig_patent_app_number] => 10084596
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/084596 | Hardware interlock mechanism using a watchdog timer | Feb 26, 2002 | Abandoned |
Array
(
[id] => 7213019
[patent_doc_number] => 20040071288
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-04-15
[patent_title] => 'Secure encryption method and component using same'
[patent_app_type] => new
[patent_app_number] => 10/467698
[patent_app_country] => US
[patent_app_date] => 2003-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7560
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 18
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0071/20040071288.pdf
[firstpage_image] =>[orig_patent_app_number] => 10467698
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/467698 | Protected encryption method and associated component | Feb 5, 2002 | Issued |
Array
(
[id] => 6853014
[patent_doc_number] => 20030145217
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2003-07-31
[patent_title] => 'Writing-preventive device against computer viruses'
[patent_app_type] => new
[patent_app_number] => 10/057697
[patent_app_country] => US
[patent_app_date] => 2002-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 863
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0145/20030145217.pdf
[firstpage_image] =>[orig_patent_app_number] => 10057697
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/057697 | Writing-preventive device against computer viruses | Jan 24, 2002 | Abandoned |
Array
(
[id] => 6850620
[patent_doc_number] => 20030142823
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2003-07-31
[patent_title] => 'Method and apparatus for fragmenting and reassembling internet key exchange data packets'
[patent_app_type] => new
[patent_app_number] => 10/056889
[patent_app_country] => US
[patent_app_date] => 2002-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7600
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 67
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0142/20030142823.pdf
[firstpage_image] =>[orig_patent_app_number] => 10056889
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/056889 | Method and apparatus for fragmenting and reassembling internet key exchange data packets | Jan 24, 2002 | Issued |
Array
(
[id] => 6389114
[patent_doc_number] => 20020120847
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2002-08-29
[patent_title] => 'Authentication method and data transmission system'
[patent_app_type] => new
[patent_app_number] => 10/056097
[patent_app_country] => US
[patent_app_date] => 2002-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4015
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 61
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0120/20020120847.pdf
[firstpage_image] =>[orig_patent_app_number] => 10056097
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/056097 | Authentication method and data transmission system | Jan 23, 2002 | Abandoned |
Array
(
[id] => 5990757
[patent_doc_number] => 20020099941
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2002-07-25
[patent_title] => 'Email processing method, email processing apparatus and recording medium'
[patent_app_type] => new
[patent_app_number] => 10/057685
[patent_app_country] => US
[patent_app_date] => 2002-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3740
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 72
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0099/20020099941.pdf
[firstpage_image] =>[orig_patent_app_number] => 10057685
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/057685 | Email processing method, email processing apparatus and recording medium | Jan 22, 2002 | Abandoned |
Array
(
[id] => 5920381
[patent_doc_number] => 20020114457
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2002-08-22
[patent_title] => 'LSI having interpreter function and information recording/reproducing apparatus using the same'
[patent_app_type] => new
[patent_app_number] => 10/051585
[patent_app_country] => US
[patent_app_date] => 2002-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7673
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 51
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0114/20020114457.pdf
[firstpage_image] =>[orig_patent_app_number] => 10051585
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/051585 | LSI having interpreter function and information recording/reproducing apparatus using the same | Jan 17, 2002 | Abandoned |
Array
(
[id] => 6786866
[patent_doc_number] => 20030138105
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2003-07-24
[patent_title] => 'Storing keys in a cryptology device'
[patent_app_type] => new
[patent_app_number] => 10/051495
[patent_app_country] => US
[patent_app_date] => 2002-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 4739
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0138/20030138105.pdf
[firstpage_image] =>[orig_patent_app_number] => 10051495
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/051495 | Storing keys in a cryptology device | Jan 17, 2002 | Abandoned |
Array
(
[id] => 350787
[patent_doc_number] => 07496757
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-02-24
[patent_title] => 'Software verification system, method and computer program element'
[patent_app_type] => utility
[patent_app_number] => 10/050083
[patent_app_country] => US
[patent_app_date] => 2002-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2194
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 369
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/496/07496757.pdf
[firstpage_image] =>[orig_patent_app_number] => 10050083
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/050083 | Software verification system, method and computer program element | Jan 13, 2002 | Issued |
Array
(
[id] => 6448120
[patent_doc_number] => 20020128978
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2002-09-12
[patent_title] => 'Detecting compromised ballots'
[patent_app_type] => new
[patent_app_number] => 10/038752
[patent_app_country] => US
[patent_app_date] => 2001-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6369
[patent_no_of_claims] => 50
[patent_no_of_ind_claims] => 15
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0128/20020128978.pdf
[firstpage_image] =>[orig_patent_app_number] => 10038752
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/038752 | Detecting compromised ballots | Dec 30, 2001 | Issued |
Array
(
[id] => 5984601
[patent_doc_number] => 20020097876
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2002-07-25
[patent_title] => 'Communication methods, communication systems and to personal communication devices'
[patent_app_type] => new
[patent_app_number] => 10/023887
[patent_app_country] => US
[patent_app_date] => 2001-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2872
[patent_no_of_claims] => 46
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0097/20020097876.pdf
[firstpage_image] =>[orig_patent_app_number] => 10023887
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/023887 | Communication methods, communication systems and to personal communication devices | Dec 20, 2001 | Abandoned |
Array
(
[id] => 6685092
[patent_doc_number] => 20030120956
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2003-06-26
[patent_title] => 'Authorization method and system for storing and retrieving data'
[patent_app_type] => new
[patent_app_number] => 10/026596
[patent_app_country] => US
[patent_app_date] => 2001-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2862
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 295
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0120/20030120956.pdf
[firstpage_image] =>[orig_patent_app_number] => 10026596
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/026596 | Authorization method and system for storing and retrieving data | Dec 19, 2001 | Abandoned |
Array
(
[id] => 6156103
[patent_doc_number] => 20020146121
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2002-10-10
[patent_title] => 'Method and system for protecting data'
[patent_app_type] => new
[patent_app_number] => 10/027780
[patent_app_country] => US
[patent_app_date] => 2001-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5382
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0146/20020146121.pdf
[firstpage_image] =>[orig_patent_app_number] => 10027780
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/027780 | Method and system for protecting data | Dec 19, 2001 | Abandoned |
Array
(
[id] => 6667989
[patent_doc_number] => 20030112972
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2003-06-19
[patent_title] => 'Data carrier for the secure transmission of information and method thereof'
[patent_app_type] => new
[patent_app_number] => 10/025287
[patent_app_country] => US
[patent_app_date] => 2001-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3861
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 30
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0112/20030112972.pdf
[firstpage_image] =>[orig_patent_app_number] => 10025287
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/025287 | Data carrier for the secure transmission of information and method thereof | Dec 17, 2001 | Abandoned |
Array
(
[id] => 5971558
[patent_doc_number] => 20020091946
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2002-07-11
[patent_title] => 'Method and apparatus for activating a computer after user authentication by a password, program, and program storage medium therefor'
[patent_app_type] => new
[patent_app_number] => 10/023499
[patent_app_country] => US
[patent_app_date] => 2001-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4544
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0091/20020091946.pdf
[firstpage_image] =>[orig_patent_app_number] => 10023499
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/023499 | Method and apparatus for activating a computer after user authentication by a password, program, and program storage medium therefor | Dec 16, 2001 | Abandoned |
Array
(
[id] => 6387167
[patent_doc_number] => 20020120592
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2002-08-29
[patent_title] => 'Order invariant fuzzy commitment system'
[patent_app_type] => new
[patent_app_number] => 09/994476
[patent_app_country] => US
[patent_app_date] => 2001-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8418
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 11
[patent_words_short_claim] => 46
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0120/20020120592.pdf
[firstpage_image] =>[orig_patent_app_number] => 09994476
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/994476 | Order invariant fuzzy commitment system | Nov 25, 2001 | Issued |
Array
(
[id] => 5937874
[patent_doc_number] => 20020062450
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2002-05-23
[patent_title] => 'Methods, modems, and systems for blocking data transfers unless including predefined communications to provide access to a network'
[patent_app_type] => new
[patent_app_number] => 09/999655
[patent_app_country] => US
[patent_app_date] => 2001-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9407
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 41
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0062/20020062450.pdf
[firstpage_image] =>[orig_patent_app_number] => 09999655
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/999655 | Methods, modems, and systems for blocking data transfers unless including predefined communications to provide access to a network | Oct 29, 2001 | Abandoned |
10/046496 | Temporal access control for computer virus outbreaks | Oct 28, 2001 | Abandoned |
Array
(
[id] => 6871642
[patent_doc_number] => 20030084332
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2003-05-01
[patent_title] => 'Method for binding a software data domain to specific hardware'
[patent_app_type] => new
[patent_app_number] => 10/043388
[patent_app_country] => US
[patent_app_date] => 2001-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2740
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0084/20030084332.pdf
[firstpage_image] =>[orig_patent_app_number] => 10043388
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/043388 | Method for binding a software data domain to specific hardware | Oct 25, 2001 | Abandoned |