Search

William J. Goodchild

Examiner (ID: 18577, Phone: (571)270-1589 , Office: P/2433 )

Most Active Art Unit
2433
Art Unit(s)
2433, 2445, 2145
Total Applications
860
Issued Applications
675
Pending Applications
64
Abandoned Applications
134

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 12803530 [patent_doc_number] => 20180159680 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-06-07 [patent_title] => METHOD AND ENCRYPTION NODE FOR ENCRYPTING MESSAGE [patent_app_type] => utility [patent_app_number] => 15/578597 [patent_app_country] => US [patent_app_date] => 2015-06-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6405 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -19 [patent_words_short_claim] => 239 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15578597 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/578597
Method and encryption node for encrypting message Jun 1, 2015 Issued
Array ( [id] => 10376684 [patent_doc_number] => 20150261691 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'DATA STORAGE DRIVE WITH TARGET OF OPPORTUNITY RECOGNITION' [patent_app_type] => utility [patent_app_number] => 14/726521 [patent_app_country] => US [patent_app_date] => 2015-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 15598 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14726521 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/726521
Data storage drive with target of opportunity recognition May 29, 2015 Issued
Array ( [id] => 14250795 [patent_doc_number] => 10275600 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-04-30 [patent_title] => Assessment and analysis of software security flaws [patent_app_type] => utility [patent_app_number] => 14/721585 [patent_app_country] => US [patent_app_date] => 2015-05-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 10231 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14721585 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/721585
Assessment and analysis of software security flaws May 25, 2015 Issued
Array ( [id] => 10465179 [patent_doc_number] => 20150350194 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-03 [patent_title] => 'SYSTEMS, METHODS, AND SOFTWARE TO PROVIDE ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENTS' [patent_app_type] => utility [patent_app_number] => 14/721237 [patent_app_country] => US [patent_app_date] => 2015-05-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 8739 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14721237 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/721237
Systems, methods, and software to provide access control in cloud computing environments May 25, 2015 Issued
Array ( [id] => 11726114 [patent_doc_number] => 09698988 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-07-04 [patent_title] => 'Management control method, apparatus, and system for virtual machine' [patent_app_type] => utility [patent_app_number] => 14/720245 [patent_app_country] => US [patent_app_date] => 2015-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 7 [patent_no_of_words] => 11820 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 246 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14720245 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/720245
Management control method, apparatus, and system for virtual machine May 21, 2015 Issued
Array ( [id] => 10441559 [patent_doc_number] => 20150326571 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-11-12 [patent_title] => 'SYSTEM AND METHOD FOR SPEAKER RECOGNITION ON MOBILE DEVICES' [patent_app_type] => utility [patent_app_number] => 14/720712 [patent_app_country] => US [patent_app_date] => 2015-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 23 [patent_figures_cnt] => 23 [patent_no_of_words] => 24693 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14720712 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/720712
System and method for speaker recognition on mobile devices May 21, 2015 Issued
Array ( [id] => 11919491 [patent_doc_number] => 09787690 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-10-10 [patent_title] => 'Security and permission architecture' [patent_app_type] => utility [patent_app_number] => 14/714786 [patent_app_country] => US [patent_app_date] => 2015-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 25 [patent_figures_cnt] => 25 [patent_no_of_words] => 13059 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 106 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14714786 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/714786
Security and permission architecture May 17, 2015 Issued
Array ( [id] => 12236844 [patent_doc_number] => 20180069706 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-08 [patent_title] => 'Generating Cryptographic Checksums' [patent_app_type] => utility [patent_app_number] => 15/558844 [patent_app_country] => US [patent_app_date] => 2015-05-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 12513 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15558844 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/558844
Generating cryptographic checksums May 3, 2015 Issued
Array ( [id] => 10571307 [patent_doc_number] => 09294498 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-03-22 [patent_title] => 'Online portal for improving cybersecurity risk scores' [patent_app_type] => utility [patent_app_number] => 14/702664 [patent_app_country] => US [patent_app_date] => 2015-05-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 14920 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 146 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702664 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/702664
Online portal for improving cybersecurity risk scores Apr 30, 2015 Issued
Array ( [id] => 12013741 [patent_doc_number] => 09807074 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-10-31 [patent_title] => 'User credentials' [patent_app_type] => utility [patent_app_number] => 14/702315 [patent_app_country] => US [patent_app_date] => 2015-05-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 41 [patent_figures_cnt] => 45 [patent_no_of_words] => 33602 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 210 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702315 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/702315
User credentials Apr 30, 2015 Issued
Array ( [id] => 10345091 [patent_doc_number] => 20150230096 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-08-13 [patent_title] => 'SCHEMES FOR CONNECTING TO WIRELESS NETWORK' [patent_app_type] => utility [patent_app_number] => 14/693400 [patent_app_country] => US [patent_app_date] => 2015-04-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5703 [patent_no_of_claims] => 31 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14693400 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/693400
Schemes for connecting to wireless network Apr 21, 2015 Issued
Array ( [id] => 12251130 [patent_doc_number] => 09923925 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-03-20 [patent_title] => 'Cyber security sharing and identification system' [patent_app_type] => utility [patent_app_number] => 14/684231 [patent_app_country] => US [patent_app_date] => 2015-04-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 12138 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 177 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14684231 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/684231
Cyber security sharing and identification system Apr 9, 2015 Issued
Array ( [id] => 15923955 [patent_doc_number] => 10659232 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-05-19 [patent_title] => Message authentication apparatus and method based on public-key cryptosystems [patent_app_type] => utility [patent_app_number] => 15/302947 [patent_app_country] => US [patent_app_date] => 2015-04-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 6265 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15302947 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/302947
Message authentication apparatus and method based on public-key cryptosystems Apr 8, 2015 Issued
Array ( [id] => 11682095 [patent_doc_number] => 09680641 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-06-13 [patent_title] => 'Quantum key distribution using card, base station and trusted authority' [patent_app_type] => utility [patent_app_number] => 14/679626 [patent_app_country] => US [patent_app_date] => 2015-04-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 13 [patent_no_of_words] => 13584 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 113 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14679626 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/679626
Quantum key distribution using card, base station and trusted authority Apr 5, 2015 Issued
Array ( [id] => 11875657 [patent_doc_number] => 09747431 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-08-29 [patent_title] => 'Multiple user accounts for managing stored information in an implantable medical device system' [patent_app_type] => utility [patent_app_number] => 14/665824 [patent_app_country] => US [patent_app_date] => 2015-03-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10134 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 378 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14665824 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/665824
Multiple user accounts for managing stored information in an implantable medical device system Mar 22, 2015 Issued
Array ( [id] => 12146910 [patent_doc_number] => 09881164 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-01-30 [patent_title] => 'Securing data' [patent_app_type] => utility [patent_app_number] => 14/657063 [patent_app_country] => US [patent_app_date] => 2015-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6397 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 75 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14657063 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/657063
Securing data Mar 12, 2015 Issued
Array ( [id] => 10403699 [patent_doc_number] => 20150288709 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-08 [patent_title] => 'Using Trust Profiles for Network Breach Detection' [patent_app_type] => utility [patent_app_number] => 14/642901 [patent_app_country] => US [patent_app_date] => 2015-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8805 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14642901 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/642901
Using trust profiles for network breach detection Mar 9, 2015 Issued
Array ( [id] => 10061020 [patent_doc_number] => 09100390 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-08-04 [patent_title] => 'Method and system for enrolling and authenticating computing devices for data usage accounting' [patent_app_type] => utility [patent_app_number] => 14/641795 [patent_app_country] => US [patent_app_date] => 2015-03-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 18148 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 127 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14641795 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/641795
Method and system for enrolling and authenticating computing devices for data usage accounting Mar 8, 2015 Issued
Array ( [id] => 11316413 [patent_doc_number] => 20160352522 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-01 [patent_title] => 'User Terminal For Detecting Forgery Of Application Program Based On Signature Information And Method Of Detecting Forgery Of Application Program Using The Same' [patent_app_type] => utility [patent_app_number] => 15/109222 [patent_app_country] => US [patent_app_date] => 2015-03-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6545 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15109222 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/109222
User Terminal For Detecting Forgery Of Application Program Based On Signature Information And Method Of Detecting Forgery Of Application Program Using The Same Mar 5, 2015 Abandoned
Array ( [id] => 11832806 [patent_doc_number] => 09729562 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-08-08 [patent_title] => 'Cross-layer correlation in secure cognitive network' [patent_app_type] => utility [patent_app_number] => 14/635064 [patent_app_country] => US [patent_app_date] => 2015-03-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 18 [patent_no_of_words] => 15597 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 217 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14635064 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/635064
Cross-layer correlation in secure cognitive network Mar 1, 2015 Issued
Menu