
William H. Beisner
Examiner (ID: 3722, Phone: (571)272-1269 , Office: P/1799 )
| Most Active Art Unit | 1744 |
| Art Unit(s) | 1303, 1642, 1799, 1744, 1815, 1801, 1809, 1775, 1807, 1797 |
| Total Applications | 2507 |
| Issued Applications | 1495 |
| Pending Applications | 315 |
| Abandoned Applications | 716 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9555636
[patent_doc_number] => 08762709
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-06-24
[patent_title] => 'Cloud computing method and system'
[patent_app_type] => utility
[patent_app_number] => 13/112758
[patent_app_country] => US
[patent_app_date] => 2011-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4411
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 334
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13112758
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/112758 | Cloud computing method and system | May 19, 2011 | Issued |
Array
(
[id] => 7569525
[patent_doc_number] => 20110289588
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-24
[patent_title] => 'Unification of security monitoring and IT-GRC'
[patent_app_type] => utility
[patent_app_number] => 13/112240
[patent_app_country] => US
[patent_app_date] => 2011-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 26
[patent_no_of_words] => 6802
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0289/20110289588.pdf
[firstpage_image] =>[orig_patent_app_number] => 13112240
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/112240 | Unification of security monitoring and IT-GRC | May 19, 2011 | Abandoned |
Array
(
[id] => 9458557
[patent_doc_number] => 08719583
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-05-06
[patent_title] => 'Apparatus for verifying and for generating an encrypted token and methods for same'
[patent_app_type] => utility
[patent_app_number] => 13/112367
[patent_app_country] => US
[patent_app_date] => 2011-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13926
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13112367
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/112367 | Apparatus for verifying and for generating an encrypted token and methods for same | May 19, 2011 | Issued |
Array
(
[id] => 8899453
[patent_doc_number] => 08478987
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-02
[patent_title] => 'Wireless activation of IP devices'
[patent_app_type] => utility
[patent_app_number] => 13/046776
[patent_app_country] => US
[patent_app_date] => 2011-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 2723
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 299
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13046776
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/046776 | Wireless activation of IP devices | Mar 13, 2011 | Issued |
Array
(
[id] => 9088197
[patent_doc_number] => 08559636
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-10-15
[patent_title] => 'Authenticating network elements in a communication system'
[patent_app_type] => utility
[patent_app_number] => 13/046757
[patent_app_country] => US
[patent_app_date] => 2011-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 5344
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13046757
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/046757 | Authenticating network elements in a communication system | Mar 12, 2011 | Issued |
Array
(
[id] => 9486517
[patent_doc_number] => 08732479
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-05-20
[patent_title] => 'Methods, apparatus and systems for remote file storage using local client status files'
[patent_app_type] => utility
[patent_app_number] => 13/046589
[patent_app_country] => US
[patent_app_date] => 2011-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 42
[patent_figures_cnt] => 42
[patent_no_of_words] => 15024
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13046589
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/046589 | Methods, apparatus and systems for remote file storage using local client status files | Mar 10, 2011 | Issued |
Array
(
[id] => 8379855
[patent_doc_number] => 20120223481
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-09-06
[patent_title] => 'COLLECTIBLE CARD WITH CORRELATED VIRTUAL COLLECTION AND AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 13/043751
[patent_app_country] => US
[patent_app_date] => 2011-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3006
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13043751
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/043751 | COLLECTIBLE CARD WITH CORRELATED VIRTUAL COLLECTION AND AUTHENTICATION | Mar 8, 2011 | Abandoned |
Array
(
[id] => 11467672
[patent_doc_number] => 09584322
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-28
[patent_title] => 'System and method for hypervisor-based remediation and provisioning of a computer'
[patent_app_type] => utility
[patent_app_number] => 13/042846
[patent_app_country] => US
[patent_app_date] => 2011-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6053
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13042846
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/042846 | System and method for hypervisor-based remediation and provisioning of a computer | Mar 7, 2011 | Issued |
Array
(
[id] => 8849596
[patent_doc_number] => 08458796
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-06-04
[patent_title] => 'Methods and systems for full pattern matching in hardware'
[patent_app_type] => utility
[patent_app_number] => 13/043287
[patent_app_country] => US
[patent_app_date] => 2011-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 29
[patent_figures_cnt] => 30
[patent_no_of_words] => 22026
[patent_no_of_claims] => 60
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 267
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13043287
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/043287 | Methods and systems for full pattern matching in hardware | Mar 7, 2011 | Issued |
Array
(
[id] => 6021011
[patent_doc_number] => 20110225651
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-15
[patent_title] => 'Trojan-Resistant Bus Architecture and Methods'
[patent_app_type] => utility
[patent_app_number] => 13/042233
[patent_app_country] => US
[patent_app_date] => 2011-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5929
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0225/20110225651.pdf
[firstpage_image] =>[orig_patent_app_number] => 13042233
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/042233 | Trojan-resistant bus architecture and methods | Mar 6, 2011 | Issued |
Array
(
[id] => 8799503
[patent_doc_number] => 08438390
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-05-07
[patent_title] => 'Method and system for using neighbor discovery unspecified solicitation to obtain link local address'
[patent_app_type] => utility
[patent_app_number] => 12/975439
[patent_app_country] => US
[patent_app_date] => 2010-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 5251
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12975439
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/975439 | Method and system for using neighbor discovery unspecified solicitation to obtain link local address | Dec 21, 2010 | Issued |
Array
(
[id] => 8255318
[patent_doc_number] => 20120159641
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-21
[patent_title] => 'Power Meter Arrangement'
[patent_app_type] => utility
[patent_app_number] => 12/974572
[patent_app_country] => US
[patent_app_date] => 2010-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4610
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0159/20120159641.pdf
[firstpage_image] =>[orig_patent_app_number] => 12974572
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/974572 | Power meter arrangement | Dec 20, 2010 | Issued |
Array
(
[id] => 8255245
[patent_doc_number] => 20120159565
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-21
[patent_title] => 'Techniques for Performing Data Loss Prevention'
[patent_app_type] => utility
[patent_app_number] => 12/971082
[patent_app_country] => US
[patent_app_date] => 2010-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5672
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0159/20120159565.pdf
[firstpage_image] =>[orig_patent_app_number] => 12971082
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/971082 | Techniques for performing data loss prevention | Dec 16, 2010 | Issued |
Array
(
[id] => 8873209
[patent_doc_number] => 08468598
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-06-18
[patent_title] => 'Password protection techniques using false passwords'
[patent_app_type] => utility
[patent_app_number] => 12/857066
[patent_app_country] => US
[patent_app_date] => 2010-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 11292
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12857066
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/857066 | Password protection techniques using false passwords | Aug 15, 2010 | Issued |
Array
(
[id] => 10189081
[patent_doc_number] => 09218501
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-22
[patent_title] => 'Secure access management against volatile identity stores'
[patent_app_type] => utility
[patent_app_number] => 12/852383
[patent_app_country] => US
[patent_app_date] => 2010-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7908
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12852383
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/852383 | Secure access management against volatile identity stores | Aug 5, 2010 | Issued |
Array
(
[id] => 7759853
[patent_doc_number] => 20120030475
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-02
[patent_title] => 'MACHINE-MACHINE AUTHENTICATION METHOD AND HUMAN-MACHINE AUTHENTICATION METHOD FOR CLOUD COMPUTING'
[patent_app_type] => utility
[patent_app_number] => 12/848747
[patent_app_country] => US
[patent_app_date] => 2010-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1944
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0030/20120030475.pdf
[firstpage_image] =>[orig_patent_app_number] => 12848747
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/848747 | MACHINE-MACHINE AUTHENTICATION METHOD AND HUMAN-MACHINE AUTHENTICATION METHOD FOR CLOUD COMPUTING | Aug 1, 2010 | Abandoned |
Array
(
[id] => 7759844
[patent_doc_number] => 20120030470
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-02
[patent_title] => 'WIRELESS PROGRAMMING OF VEHICLE MODULES'
[patent_app_type] => utility
[patent_app_number] => 12/846093
[patent_app_country] => US
[patent_app_date] => 2010-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5548
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0030/20120030470.pdf
[firstpage_image] =>[orig_patent_app_number] => 12846093
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/846093 | WIRELESS PROGRAMMING OF VEHICLE MODULES | Jul 28, 2010 | Abandoned |
Array
(
[id] => 6154595
[patent_doc_number] => 20110023088
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-27
[patent_title] => 'FLOW-BASED DYNAMIC ACCESS CONTROL SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 12/842194
[patent_app_country] => US
[patent_app_date] => 2010-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2949
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0023/20110023088.pdf
[firstpage_image] =>[orig_patent_app_number] => 12842194
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/842194 | FLOW-BASED DYNAMIC ACCESS CONTROL SYSTEM AND METHOD | Jul 22, 2010 | Abandoned |
Array
(
[id] => 7747402
[patent_doc_number] => 20120023583
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-01-26
[patent_title] => 'SYSTEM AND METHOD FOR PROACTIVE DETECTION OF MALWARE DEVICE DRIVERS VIA KERNEL FORENSIC BEHAVIORAL MONITORING AND A BACK-END REPUTATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 12/840032
[patent_app_country] => US
[patent_app_date] => 2010-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8767
[patent_no_of_claims] => 42
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0023/20120023583.pdf
[firstpage_image] =>[orig_patent_app_number] => 12840032
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/840032 | System and method for proactive detection of malware device drivers via kernel forensic behavioral monitoring and a back-end reputation system | Jul 19, 2010 | Issued |
Array
(
[id] => 8395617
[patent_doc_number] => 20120233462
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-09-13
[patent_title] => 'METHOD AND SYSTEM FOR AUTOMATICALLY LOGGING IN A CLIENT'
[patent_app_type] => utility
[patent_app_number] => 13/259203
[patent_app_country] => US
[patent_app_date] => 2010-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4394
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13259203
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/259203 | Method and system for automatically logging in a client | Jun 27, 2010 | Issued |