
William J. Goodchild
Examiner (ID: 18577, Phone: (571)270-1589 , Office: P/2433 )
| Most Active Art Unit | 2433 |
| Art Unit(s) | 2433, 2445, 2145 |
| Total Applications | 860 |
| Issued Applications | 675 |
| Pending Applications | 64 |
| Abandoned Applications | 134 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12803530
[patent_doc_number] => 20180159680
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-07
[patent_title] => METHOD AND ENCRYPTION NODE FOR ENCRYPTING MESSAGE
[patent_app_type] => utility
[patent_app_number] => 15/578597
[patent_app_country] => US
[patent_app_date] => 2015-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6405
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15578597
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/578597 | Method and encryption node for encrypting message | Jun 1, 2015 | Issued |
Array
(
[id] => 10376684
[patent_doc_number] => 20150261691
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'DATA STORAGE DRIVE WITH TARGET OF OPPORTUNITY RECOGNITION'
[patent_app_type] => utility
[patent_app_number] => 14/726521
[patent_app_country] => US
[patent_app_date] => 2015-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15598
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14726521
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/726521 | Data storage drive with target of opportunity recognition | May 29, 2015 | Issued |
Array
(
[id] => 14250795
[patent_doc_number] => 10275600
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-30
[patent_title] => Assessment and analysis of software security flaws
[patent_app_type] => utility
[patent_app_number] => 14/721585
[patent_app_country] => US
[patent_app_date] => 2015-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 10231
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14721585
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/721585 | Assessment and analysis of software security flaws | May 25, 2015 | Issued |
Array
(
[id] => 10465179
[patent_doc_number] => 20150350194
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'SYSTEMS, METHODS, AND SOFTWARE TO PROVIDE ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENTS'
[patent_app_type] => utility
[patent_app_number] => 14/721237
[patent_app_country] => US
[patent_app_date] => 2015-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8739
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14721237
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/721237 | Systems, methods, and software to provide access control in cloud computing environments | May 25, 2015 | Issued |
Array
(
[id] => 11726114
[patent_doc_number] => 09698988
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-04
[patent_title] => 'Management control method, apparatus, and system for virtual machine'
[patent_app_type] => utility
[patent_app_number] => 14/720245
[patent_app_country] => US
[patent_app_date] => 2015-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 11820
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14720245
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/720245 | Management control method, apparatus, and system for virtual machine | May 21, 2015 | Issued |
Array
(
[id] => 10441559
[patent_doc_number] => 20150326571
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'SYSTEM AND METHOD FOR SPEAKER RECOGNITION ON MOBILE DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/720712
[patent_app_country] => US
[patent_app_date] => 2015-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 24693
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14720712
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/720712 | System and method for speaker recognition on mobile devices | May 21, 2015 | Issued |
Array
(
[id] => 11919491
[patent_doc_number] => 09787690
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-10
[patent_title] => 'Security and permission architecture'
[patent_app_type] => utility
[patent_app_number] => 14/714786
[patent_app_country] => US
[patent_app_date] => 2015-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 13059
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14714786
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/714786 | Security and permission architecture | May 17, 2015 | Issued |
Array
(
[id] => 12236844
[patent_doc_number] => 20180069706
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-08
[patent_title] => 'Generating Cryptographic Checksums'
[patent_app_type] => utility
[patent_app_number] => 15/558844
[patent_app_country] => US
[patent_app_date] => 2015-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 12513
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15558844
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/558844 | Generating cryptographic checksums | May 3, 2015 | Issued |
Array
(
[id] => 10571307
[patent_doc_number] => 09294498
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-22
[patent_title] => 'Online portal for improving cybersecurity risk scores'
[patent_app_type] => utility
[patent_app_number] => 14/702664
[patent_app_country] => US
[patent_app_date] => 2015-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 14920
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702664
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/702664 | Online portal for improving cybersecurity risk scores | Apr 30, 2015 | Issued |
Array
(
[id] => 12013741
[patent_doc_number] => 09807074
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-10-31
[patent_title] => 'User credentials'
[patent_app_type] => utility
[patent_app_number] => 14/702315
[patent_app_country] => US
[patent_app_date] => 2015-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 41
[patent_figures_cnt] => 45
[patent_no_of_words] => 33602
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702315
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/702315 | User credentials | Apr 30, 2015 | Issued |
Array
(
[id] => 10345091
[patent_doc_number] => 20150230096
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-13
[patent_title] => 'SCHEMES FOR CONNECTING TO WIRELESS NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/693400
[patent_app_country] => US
[patent_app_date] => 2015-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5703
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14693400
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/693400 | Schemes for connecting to wireless network | Apr 21, 2015 | Issued |
Array
(
[id] => 12251130
[patent_doc_number] => 09923925
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-20
[patent_title] => 'Cyber security sharing and identification system'
[patent_app_type] => utility
[patent_app_number] => 14/684231
[patent_app_country] => US
[patent_app_date] => 2015-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 12138
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14684231
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/684231 | Cyber security sharing and identification system | Apr 9, 2015 | Issued |
Array
(
[id] => 15923955
[patent_doc_number] => 10659232
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-19
[patent_title] => Message authentication apparatus and method based on public-key cryptosystems
[patent_app_type] => utility
[patent_app_number] => 15/302947
[patent_app_country] => US
[patent_app_date] => 2015-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 6265
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15302947
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/302947 | Message authentication apparatus and method based on public-key cryptosystems | Apr 8, 2015 | Issued |
Array
(
[id] => 11682095
[patent_doc_number] => 09680641
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-13
[patent_title] => 'Quantum key distribution using card, base station and trusted authority'
[patent_app_type] => utility
[patent_app_number] => 14/679626
[patent_app_country] => US
[patent_app_date] => 2015-04-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 13584
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14679626
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/679626 | Quantum key distribution using card, base station and trusted authority | Apr 5, 2015 | Issued |
Array
(
[id] => 11875657
[patent_doc_number] => 09747431
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-29
[patent_title] => 'Multiple user accounts for managing stored information in an implantable medical device system'
[patent_app_type] => utility
[patent_app_number] => 14/665824
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10134
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 378
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14665824
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/665824 | Multiple user accounts for managing stored information in an implantable medical device system | Mar 22, 2015 | Issued |
Array
(
[id] => 12146910
[patent_doc_number] => 09881164
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-01-30
[patent_title] => 'Securing data'
[patent_app_type] => utility
[patent_app_number] => 14/657063
[patent_app_country] => US
[patent_app_date] => 2015-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6397
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 75
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14657063
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/657063 | Securing data | Mar 12, 2015 | Issued |
Array
(
[id] => 10403699
[patent_doc_number] => 20150288709
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'Using Trust Profiles for Network Breach Detection'
[patent_app_type] => utility
[patent_app_number] => 14/642901
[patent_app_country] => US
[patent_app_date] => 2015-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8805
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14642901
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/642901 | Using trust profiles for network breach detection | Mar 9, 2015 | Issued |
Array
(
[id] => 10061020
[patent_doc_number] => 09100390
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-08-04
[patent_title] => 'Method and system for enrolling and authenticating computing devices for data usage accounting'
[patent_app_type] => utility
[patent_app_number] => 14/641795
[patent_app_country] => US
[patent_app_date] => 2015-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 18148
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14641795
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/641795 | Method and system for enrolling and authenticating computing devices for data usage accounting | Mar 8, 2015 | Issued |
Array
(
[id] => 11316413
[patent_doc_number] => 20160352522
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-01
[patent_title] => 'User Terminal For Detecting Forgery Of Application Program Based On Signature Information And Method Of Detecting Forgery Of Application Program Using The Same'
[patent_app_type] => utility
[patent_app_number] => 15/109222
[patent_app_country] => US
[patent_app_date] => 2015-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6545
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15109222
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/109222 | User Terminal For Detecting Forgery Of Application Program Based On Signature Information And Method Of Detecting Forgery Of Application Program Using The Same | Mar 5, 2015 | Abandoned |
Array
(
[id] => 11832806
[patent_doc_number] => 09729562
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-08
[patent_title] => 'Cross-layer correlation in secure cognitive network'
[patent_app_type] => utility
[patent_app_number] => 14/635064
[patent_app_country] => US
[patent_app_date] => 2015-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 18
[patent_no_of_words] => 15597
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14635064
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/635064 | Cross-layer correlation in secure cognitive network | Mar 1, 2015 | Issued |