| Application number | Title of the application | Filing Date | Status |
|---|
| 09/603169 | Method and apparatus for using a cellular telephone as an authentification device | Jun 25, 2000 | Abandoned |
| 09/603079 | Method and apparatus for securely managing membership in group communications | Jun 25, 2000 | Abandoned |
Array
(
[id] => 706815
[patent_doc_number] => 07065652
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2006-06-20
[patent_title] => 'System for obfuscating computer code upon disassembly'
[patent_app_type] => utility
[patent_app_number] => 09/603575
[patent_app_country] => US
[patent_app_date] => 2000-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1982
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/065/07065652.pdf
[firstpage_image] =>[orig_patent_app_number] => 09603575
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/603575 | System for obfuscating computer code upon disassembly | Jun 20, 2000 | Issued |
Array
(
[id] => 581293
[patent_doc_number] => 07162536
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2007-01-09
[patent_title] => 'Validation of a connection between arbitrary end-nodes in a communications network'
[patent_app_type] => utility
[patent_app_number] => 09/597974
[patent_app_country] => US
[patent_app_date] => 2000-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6570
[patent_no_of_claims] => 59
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/162/07162536.pdf
[firstpage_image] =>[orig_patent_app_number] => 09597974
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/597974 | Validation of a connection between arbitrary end-nodes in a communications network | Jun 19, 2000 | Issued |
| 09/597982 | WIM manufacturer certificate | Jun 18, 2000 | Abandoned |
Array
(
[id] => 1037174
[patent_doc_number] => 06877095
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2005-04-05
[patent_title] => 'Session-state manager'
[patent_app_type] => utility
[patent_app_number] => 09/522063
[patent_app_country] => US
[patent_app_date] => 2000-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 8922
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/877/06877095.pdf
[firstpage_image] =>[orig_patent_app_number] => 09522063
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/522063 | Session-state manager | Mar 8, 2000 | Issued |
Array
(
[id] => 400625
[patent_doc_number] => 07296161
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2007-11-13
[patent_title] => 'Image processing apparatus and image processing method'
[patent_app_type] => utility
[patent_app_number] => 09/521424
[patent_app_country] => US
[patent_app_date] => 2000-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 28
[patent_no_of_words] => 15268
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/296/07296161.pdf
[firstpage_image] =>[orig_patent_app_number] => 09521424
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/521424 | Image processing apparatus and image processing method | Mar 7, 2000 | Issued |
Array
(
[id] => 750036
[patent_doc_number] => 07032240
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2006-04-18
[patent_title] => 'Portable authorization device for authorizing use of protected information and associated method'
[patent_app_type] => utility
[patent_app_number] => 09/503778
[patent_app_country] => US
[patent_app_date] => 2000-02-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 12
[patent_no_of_words] => 12860
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/032/07032240.pdf
[firstpage_image] =>[orig_patent_app_number] => 09503778
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/503778 | Portable authorization device for authorizing use of protected information and associated method | Feb 13, 2000 | Issued |
Array
(
[id] => 630157
[patent_doc_number] => 07137144
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2006-11-14
[patent_title] => 'Technique of defending against network connection flooding attacks'
[patent_app_type] => utility
[patent_app_number] => 09/502478
[patent_app_country] => US
[patent_app_date] => 2000-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1559
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/137/07137144.pdf
[firstpage_image] =>[orig_patent_app_number] => 09502478
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/502478 | Technique of defending against network connection flooding attacks | Feb 10, 2000 | Issued |
Array
(
[id] => 753134
[patent_doc_number] => 07028186
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2006-04-11
[patent_title] => 'Key management methods for wireless LANs'
[patent_app_type] => utility
[patent_app_number] => 09/502567
[patent_app_country] => US
[patent_app_date] => 2000-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3555
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/028/07028186.pdf
[firstpage_image] =>[orig_patent_app_number] => 09502567
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/502567 | Key management methods for wireless LANs | Feb 10, 2000 | Issued |
Array
(
[id] => 740298
[patent_doc_number] => 07039944
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2006-05-02
[patent_title] => 'Digital data file management method and recording medium for recording digital data file management program thereon'
[patent_app_type] => utility
[patent_app_number] => 09/500573
[patent_app_country] => US
[patent_app_date] => 2000-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2231
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/039/07039944.pdf
[firstpage_image] =>[orig_patent_app_number] => 09500573
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/500573 | Digital data file management method and recording medium for recording digital data file management program thereon | Feb 9, 2000 | Issued |
Array
(
[id] => 1075171
[patent_doc_number] => 06839839
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2005-01-04
[patent_title] => 'Public key distribution using an approximate linear function'
[patent_app_type] => utility
[patent_app_number] => 09/501181
[patent_app_country] => US
[patent_app_date] => 2000-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5598
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/839/06839839.pdf
[firstpage_image] =>[orig_patent_app_number] => 09501181
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/501181 | Public key distribution using an approximate linear function | Feb 9, 2000 | Issued |
Array
(
[id] => 1061606
[patent_doc_number] => 06853729
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2005-02-08
[patent_title] => 'Method and apparatus for performing a key update using update key'
[patent_app_type] => utility
[patent_app_number] => 09/500869
[patent_app_country] => US
[patent_app_date] => 2000-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 8332
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/853/06853729.pdf
[firstpage_image] =>[orig_patent_app_number] => 09500869
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/500869 | Method and apparatus for performing a key update using update key | Feb 8, 2000 | Issued |
Array
(
[id] => 1030639
[patent_doc_number] => 06883101
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2005-04-19
[patent_title] => 'System and method for assessing the security posture of a network using goal oriented fuzzy logic decision rules'
[patent_app_type] => utility
[patent_app_number] => 09/500269
[patent_app_country] => US
[patent_app_date] => 2000-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 18
[patent_no_of_words] => 8234
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/883/06883101.pdf
[firstpage_image] =>[orig_patent_app_number] => 09500269
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/500269 | System and method for assessing the security posture of a network using goal oriented fuzzy logic decision rules | Feb 7, 2000 | Issued |
Array
(
[id] => 1139160
[patent_doc_number] => 06789188
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2004-09-07
[patent_title] => 'Methods and apparatus for secure content distribution'
[patent_app_type] => B1
[patent_app_number] => 09/498883
[patent_app_country] => US
[patent_app_date] => 2000-02-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 5352
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/789/06789188.pdf
[firstpage_image] =>[orig_patent_app_number] => 09498883
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/498883 | Methods and apparatus for secure content distribution | Feb 6, 2000 | Issued |
Array
(
[id] => 716184
[patent_doc_number] => 07058613
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2006-06-06
[patent_title] => 'Device and method for user identification check based on user-specific formula'
[patent_app_type] => utility
[patent_app_number] => 09/441081
[patent_app_country] => US
[patent_app_date] => 1999-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 9808
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/058/07058613.pdf
[firstpage_image] =>[orig_patent_app_number] => 09441081
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/441081 | Device and method for user identification check based on user-specific formula | Nov 15, 1999 | Issued |
Array
(
[id] => 716895
[patent_doc_number] => 07058808
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2006-06-06
[patent_title] => 'Method for making a blind RSA-signature and apparatus therefor'
[patent_app_type] => utility
[patent_app_number] => 09/445385
[patent_app_country] => US
[patent_app_date] => 1999-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 13517
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/058/07058808.pdf
[firstpage_image] =>[orig_patent_app_number] => 09445385
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/445385 | Method for making a blind RSA-signature and apparatus therefor | Jun 15, 1999 | Issued |