
Thurman K. Page
Examiner (ID: 7675)
| Most Active Art Unit | 1502 |
| Art Unit(s) | 1508, 1615, 1621, 1502 |
| Total Applications | 1343 |
| Issued Applications | 1074 |
| Pending Applications | 36 |
| Abandoned Applications | 233 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 7972541
[patent_doc_number] => 07941849
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-05-10
[patent_title] => 'System and method for audit tracking'
[patent_app_type] => utility
[patent_app_number] => 10/395034
[patent_app_country] => US
[patent_app_date] => 2003-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6329
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/941/07941849.pdf
[firstpage_image] =>[orig_patent_app_number] => 10395034
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/395034 | System and method for audit tracking | Mar 20, 2003 | Issued |
Array
(
[id] => 7457216
[patent_doc_number] => 20040186990
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-09-23
[patent_title] => 'Method of e-mail encryption'
[patent_app_type] => new
[patent_app_number] => 10/388645
[patent_app_country] => US
[patent_app_date] => 2003-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1742
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0186/20040186990.pdf
[firstpage_image] =>[orig_patent_app_number] => 10388645
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/388645 | Method of e-mail encryption | Mar 16, 2003 | Abandoned |
Array
(
[id] => 7140385
[patent_doc_number] => 20050182802
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-08-18
[patent_title] => 'Method of updating an authentication algorithm in a computer system'
[patent_app_type] => utility
[patent_app_number] => 10/507291
[patent_app_country] => US
[patent_app_date] => 2003-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3245
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0182/20050182802.pdf
[firstpage_image] =>[orig_patent_app_number] => 10507291
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/507291 | Method of updating an authentication algorithm in a computer system | Mar 10, 2003 | Issued |
Array
(
[id] => 7103002
[patent_doc_number] => 20050105728
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-05-19
[patent_title] => 'Information recording medium, usage management method, and usage management apparatus'
[patent_app_type] => utility
[patent_app_number] => 10/504746
[patent_app_country] => US
[patent_app_date] => 2003-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 17584
[patent_no_of_claims] => 71
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0105/20050105728.pdf
[firstpage_image] =>[orig_patent_app_number] => 10504746
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/504746 | Information recording medium, usage management method, and usage management apparatus | Mar 6, 2003 | Issued |
Array
(
[id] => 7158142
[patent_doc_number] => 20050084108
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-04-21
[patent_title] => 'Device for processing and method for transmission of encoded data for a first domain in a network pertaining to a second domain'
[patent_app_type] => utility
[patent_app_number] => 10/504897
[patent_app_country] => US
[patent_app_date] => 2003-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8492
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0084/20050084108.pdf
[firstpage_image] =>[orig_patent_app_number] => 10504897
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/504897 | Device for processing and method for transmission of encoded data for a first domain in a network pertaining to a second domain | Feb 20, 2003 | Issued |
Array
(
[id] => 7158143
[patent_doc_number] => 20050084109
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-04-21
[patent_title] => 'Method for processing encoded data for first domain received in a network pertaining to a second domian'
[patent_app_type] => utility
[patent_app_number] => 10/505390
[patent_app_country] => US
[patent_app_date] => 2003-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6739
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0084/20050084109.pdf
[firstpage_image] =>[orig_patent_app_number] => 10505390
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/505390 | Method for processing encrypted data for first domain received in a network pertaining to a second domain | Feb 20, 2003 | Issued |
Array
(
[id] => 7167020
[patent_doc_number] => 20050086506
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-04-21
[patent_title] => 'Method for initialising an application terminals'
[patent_app_type] => utility
[patent_app_number] => 10/498646
[patent_app_country] => US
[patent_app_date] => 2002-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7814
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0086/20050086506.pdf
[firstpage_image] =>[orig_patent_app_number] => 10498646
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/498646 | Method for initialising an application terminals | Dec 16, 2002 | Abandoned |
Array
(
[id] => 6990152
[patent_doc_number] => 20050089189
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-04-28
[patent_title] => 'Embedding a watermark in an image signal'
[patent_app_type] => utility
[patent_app_number] => 10/497334
[patent_app_country] => US
[patent_app_date] => 2002-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4114
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0089/20050089189.pdf
[firstpage_image] =>[orig_patent_app_number] => 10497334
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/497334 | Embedding a watermark in an image signal | Nov 12, 2002 | Abandoned |
Array
(
[id] => 7259130
[patent_doc_number] => 20040240672
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-12-02
[patent_title] => 'Public key cryptographic method based on braid groups'
[patent_app_type] => new
[patent_app_number] => 10/492894
[patent_app_country] => US
[patent_app_date] => 2004-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4625
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0240/20040240672.pdf
[firstpage_image] =>[orig_patent_app_number] => 10492894
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/492894 | Public key cryptographic method based on braid groups | Oct 23, 2002 | Issued |
Array
(
[id] => 6764959
[patent_doc_number] => 20030099357
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2003-05-29
[patent_title] => 'Apparatus and method for generating scrambling code in a CDMA mobile communication system'
[patent_app_type] => new
[patent_app_number] => 10/265147
[patent_app_country] => US
[patent_app_date] => 2002-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 8584
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0099/20030099357.pdf
[firstpage_image] =>[orig_patent_app_number] => 10265147
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/265147 | Apparatus and method for generating scrambling code in a CDMA mobile communication system | Oct 6, 2002 | Abandoned |
Array
(
[id] => 7510418
[patent_doc_number] => 08037302
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-10-11
[patent_title] => 'Method and system for ensuring secure forwarding of messages'
[patent_app_type] => utility
[patent_app_number] => 10/490933
[patent_app_country] => US
[patent_app_date] => 2002-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 6256
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/037/08037302.pdf
[firstpage_image] =>[orig_patent_app_number] => 10490933
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/490933 | Method and system for ensuring secure forwarding of messages | Sep 26, 2002 | Issued |
Array
(
[id] => 6652631
[patent_doc_number] => 20030076859
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2003-04-24
[patent_title] => 'Modification of ciphering activation time by RLC reset procedure during ciphering configuration change procedure in a wireless communications protocol'
[patent_app_type] => new
[patent_app_number] => 10/247139
[patent_app_country] => US
[patent_app_date] => 2002-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3932
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0076/20030076859.pdf
[firstpage_image] =>[orig_patent_app_number] => 10247139
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/247139 | Modification of ciphering activation time by RLC reset procedure during ciphering configuration change procedure in a wireless communications protocol | Sep 18, 2002 | Abandoned |
Array
(
[id] => 350786
[patent_doc_number] => 07496756
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-02-24
[patent_title] => 'Content usage-right management system and management method'
[patent_app_type] => utility
[patent_app_number] => 10/415852
[patent_app_country] => US
[patent_app_date] => 2002-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 55
[patent_figures_cnt] => 55
[patent_no_of_words] => 49854
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/496/07496756.pdf
[firstpage_image] =>[orig_patent_app_number] => 10415852
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/415852 | Content usage-right management system and management method | Aug 14, 2002 | Issued |
Array
(
[id] => 7154352
[patent_doc_number] => 20040172536
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-09-02
[patent_title] => 'Method for authentication between a portable telecommunication object and a public access terminal'
[patent_app_type] => new
[patent_app_number] => 10/480148
[patent_app_country] => US
[patent_app_date] => 2003-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4652
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 21
[patent_words_short_claim] => 22
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0172/20040172536.pdf
[firstpage_image] =>[orig_patent_app_number] => 10480148
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/480148 | Method for authentication between a portable telecommunication object and a public access terminal | Jun 2, 2002 | Issued |
Array
(
[id] => 9819753
[patent_doc_number] => 08929552
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-06
[patent_title] => 'Electronic information and cryptographic key management system'
[patent_app_type] => utility
[patent_app_number] => 10/479646
[patent_app_country] => US
[patent_app_date] => 2002-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8862
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 10479646
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/479646 | Electronic information and cryptographic key management system | Jun 2, 2002 | Issued |
Array
(
[id] => 7472559
[patent_doc_number] => 20040199776
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-10-07
[patent_title] => 'Personal identity verification process and system'
[patent_app_type] => new
[patent_app_number] => 10/479171
[patent_app_country] => US
[patent_app_date] => 2004-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5047
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 3
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0199/20040199776.pdf
[firstpage_image] =>[orig_patent_app_number] => 10479171
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/479171 | Personal identity verification process and system | May 29, 2002 | Issued |
Array
(
[id] => 188616
[patent_doc_number] => 07647495
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-01-12
[patent_title] => 'Method for protecting a computer from the manipulation of register contents and a corresponding computer for carrying out this method'
[patent_app_type] => utility
[patent_app_number] => 10/477140
[patent_app_country] => US
[patent_app_date] => 2002-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 1920
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 58
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/647/07647495.pdf
[firstpage_image] =>[orig_patent_app_number] => 10477140
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/477140 | Method for protecting a computer from the manipulation of register contents and a corresponding computer for carrying out this method | May 5, 2002 | Issued |
Array
(
[id] => 6115554
[patent_doc_number] => 20020174359
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2002-11-21
[patent_title] => 'Thorough operation restriction'
[patent_app_type] => new
[patent_app_number] => 10/076948
[patent_app_country] => US
[patent_app_date] => 2002-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4755
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0174/20020174359.pdf
[firstpage_image] =>[orig_patent_app_number] => 10076948
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/076948 | Thorough operation restriction | Feb 18, 2002 | Issued |
Array
(
[id] => 581587
[patent_doc_number] => 07472273
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-12-30
[patent_title] => 'Authentication in data communication'
[patent_app_type] => utility
[patent_app_number] => 10/451875
[patent_app_country] => US
[patent_app_date] => 2001-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 10
[patent_no_of_words] => 9604
[patent_no_of_claims] => 46
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 20
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/472/07472273.pdf
[firstpage_image] =>[orig_patent_app_number] => 10451875
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/451875 | Authentication in data communication | Dec 20, 2001 | Issued |
Array
(
[id] => 7149037
[patent_doc_number] => 20050120232
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-06-02
[patent_title] => 'Data terminal managing ciphered content data and license acquired by software'
[patent_app_type] => utility
[patent_app_number] => 10/416538
[patent_app_country] => US
[patent_app_date] => 2001-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 91
[patent_figures_cnt] => 91
[patent_no_of_words] => 56500
[patent_no_of_claims] => 56
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0120/20050120232.pdf
[firstpage_image] =>[orig_patent_app_number] => 10416538
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/416538 | Data terminal managing ciphered content data and license acquired by software | Nov 26, 2001 | Abandoned |