
Bridget A. Cochran
Examiner (ID: 19669, Phone: (303)297-4233 , Office: P/3641 )
| Most Active Art Unit | 3641 |
| Art Unit(s) | 3641 |
| Total Applications | 247 |
| Issued Applications | 176 |
| Pending Applications | 0 |
| Abandoned Applications | 72 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 5118772
[patent_doc_number] => 20070140486
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-06-21
[patent_title] => 'Triple churning'
[patent_app_type] => utility
[patent_app_number] => 11/380942
[patent_app_country] => US
[patent_app_date] => 2006-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 2633
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0140/20070140486.pdf
[firstpage_image] =>[orig_patent_app_number] => 11380942
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/380942 | Triple churning | Apr 30, 2006 | Issued |
Array
(
[id] => 5847708
[patent_doc_number] => 20060123481
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-06-08
[patent_title] => 'Method and apparatus for network immunization'
[patent_app_type] => utility
[patent_app_number] => 11/295920
[patent_app_country] => US
[patent_app_date] => 2005-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4755
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0123/20060123481.pdf
[firstpage_image] =>[orig_patent_app_number] => 11295920
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/295920 | Method and apparatus for network immunization | Dec 6, 2005 | Abandoned |
Array
(
[id] => 137422
[patent_doc_number] => 07698741
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-04-13
[patent_title] => 'Controlling the isolation of an object'
[patent_app_type] => utility
[patent_app_number] => 11/294835
[patent_app_country] => US
[patent_app_date] => 2005-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 8039
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/698/07698741.pdf
[firstpage_image] =>[orig_patent_app_number] => 11294835
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/294835 | Controlling the isolation of an object | Dec 5, 2005 | Issued |
Array
(
[id] => 58614
[patent_doc_number] => 07774832
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-08-10
[patent_title] => 'Systems and methods for implementing protocol enforcement rules'
[patent_app_type] => utility
[patent_app_number] => 11/294739
[patent_app_country] => US
[patent_app_date] => 2005-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 13708
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/774/07774832.pdf
[firstpage_image] =>[orig_patent_app_number] => 11294739
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/294739 | Systems and methods for implementing protocol enforcement rules | Dec 5, 2005 | Issued |
Array
(
[id] => 5238458
[patent_doc_number] => 20070130615
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-06-07
[patent_title] => 'Secure seed media'
[patent_app_type] => utility
[patent_app_number] => 11/294977
[patent_app_country] => US
[patent_app_date] => 2005-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5918
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0130/20070130615.pdf
[firstpage_image] =>[orig_patent_app_number] => 11294977
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/294977 | Securing data set images | Dec 5, 2005 | Issued |
Array
(
[id] => 254475
[patent_doc_number] => 07581118
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-08-25
[patent_title] => 'Disk sanitization using encryption'
[patent_app_type] => utility
[patent_app_number] => 11/295214
[patent_app_country] => US
[patent_app_date] => 2005-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3925
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 67
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/581/07581118.pdf
[firstpage_image] =>[orig_patent_app_number] => 11295214
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/295214 | Disk sanitization using encryption | Dec 4, 2005 | Issued |
Array
(
[id] => 5238320
[patent_doc_number] => 20070130477
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-06-07
[patent_title] => 'Secure tape'
[patent_app_type] => utility
[patent_app_number] => 11/295256
[patent_app_country] => US
[patent_app_date] => 2005-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7483
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0130/20070130477.pdf
[firstpage_image] =>[orig_patent_app_number] => 11295256
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/295256 | Secure tape | Dec 4, 2005 | Abandoned |
Array
(
[id] => 5758639
[patent_doc_number] => 20060209584
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-09-21
[patent_title] => 'Securely field configurable device'
[patent_app_type] => utility
[patent_app_number] => 11/272995
[patent_app_country] => US
[patent_app_date] => 2005-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6432
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0209/20060209584.pdf
[firstpage_image] =>[orig_patent_app_number] => 11272995
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/272995 | Securely field configurable device | Nov 13, 2005 | Issued |
Array
(
[id] => 4973086
[patent_doc_number] => 20070113089
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-05-17
[patent_title] => 'System and method for secure exchange of trust information'
[patent_app_type] => utility
[patent_app_number] => 11/272904
[patent_app_country] => US
[patent_app_date] => 2005-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3614
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0113/20070113089.pdf
[firstpage_image] =>[orig_patent_app_number] => 11272904
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/272904 | System and method for secure exchange of trust information | Nov 13, 2005 | Issued |
Array
(
[id] => 5706857
[patent_doc_number] => 20060195905
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-08-31
[patent_title] => 'Systems and methods for performing risk analysis'
[patent_app_type] => utility
[patent_app_number] => 11/252830
[patent_app_country] => US
[patent_app_date] => 2005-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8316
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0195/20060195905.pdf
[firstpage_image] =>[orig_patent_app_number] => 11252830
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/252830 | Systems and methods for performing risk analysis | Oct 18, 2005 | Issued |
Array
(
[id] => 106907
[patent_doc_number] => 07730314
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-06-01
[patent_title] => 'Method and apparatus for electronic commerce using digital ticket to provide anonymity'
[patent_app_type] => utility
[patent_app_number] => 11/252716
[patent_app_country] => US
[patent_app_date] => 2005-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7287
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/730/07730314.pdf
[firstpage_image] =>[orig_patent_app_number] => 11252716
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/252716 | Method and apparatus for electronic commerce using digital ticket to provide anonymity | Oct 18, 2005 | Issued |
Array
(
[id] => 7595591
[patent_doc_number] => 07620991
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-11-17
[patent_title] => 'Optimized network cache for virus scanning by examining the magic bytes of a file'
[patent_app_type] => utility
[patent_app_number] => 11/253405
[patent_app_country] => US
[patent_app_date] => 2005-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5663
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/620/07620991.pdf
[firstpage_image] =>[orig_patent_app_number] => 11253405
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/253405 | Optimized network cache for virus scanning by examining the magic bytes of a file | Oct 18, 2005 | Issued |
Array
(
[id] => 5719990
[patent_doc_number] => 20060072763
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-04-06
[patent_title] => 'Apparatus and method for storing data'
[patent_app_type] => utility
[patent_app_number] => 11/244007
[patent_app_country] => US
[patent_app_date] => 2005-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 5689
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0072/20060072763.pdf
[firstpage_image] =>[orig_patent_app_number] => 11244007
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/244007 | Apparatus and method for storing data | Oct 5, 2005 | Abandoned |
Array
(
[id] => 208889
[patent_doc_number] => 07631357
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2009-12-08
[patent_title] => 'Detecting and removing rootkits from within an infected computing system'
[patent_app_type] => utility
[patent_app_number] => 11/243824
[patent_app_country] => US
[patent_app_date] => 2005-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6402
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/631/07631357.pdf
[firstpage_image] =>[orig_patent_app_number] => 11243824
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/243824 | Detecting and removing rootkits from within an infected computing system | Oct 4, 2005 | Issued |
Array
(
[id] => 4614213
[patent_doc_number] => 07996679
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-08-09
[patent_title] => 'System and method for performing a trust-preserving migration of data objects from a source to a target'
[patent_app_type] => utility
[patent_app_number] => 11/243560
[patent_app_country] => US
[patent_app_date] => 2005-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5844
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 243
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/996/07996679.pdf
[firstpage_image] =>[orig_patent_app_number] => 11243560
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/243560 | System and method for performing a trust-preserving migration of data objects from a source to a target | Oct 4, 2005 | Issued |
Array
(
[id] => 5137743
[patent_doc_number] => 20070079372
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-04-05
[patent_title] => 'Method for collecting and reporting privilege elevation pathways in a computing environment'
[patent_app_type] => utility
[patent_app_number] => 11/243922
[patent_app_country] => US
[patent_app_date] => 2005-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5328
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0079/20070079372.pdf
[firstpage_image] =>[orig_patent_app_number] => 11243922
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/243922 | Method for collecting and reporting privilege elevation pathways in a computing environment | Oct 4, 2005 | Abandoned |
Array
(
[id] => 5137271
[patent_doc_number] => 20070078900
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-04-05
[patent_title] => 'Document control'
[patent_app_type] => utility
[patent_app_number] => 11/243811
[patent_app_country] => US
[patent_app_date] => 2005-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4381
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0078/20070078900.pdf
[firstpage_image] =>[orig_patent_app_number] => 11243811
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/243811 | Document control | Oct 3, 2005 | Issued |
Array
(
[id] => 5826144
[patent_doc_number] => 20060062391
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-03-23
[patent_title] => 'Method and apparatus for managing communication security in wireless network'
[patent_app_type] => utility
[patent_app_number] => 11/231978
[patent_app_country] => US
[patent_app_date] => 2005-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 34
[patent_no_of_words] => 23976
[patent_no_of_claims] => 84
[patent_no_of_ind_claims] => 19
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0062/20060062391.pdf
[firstpage_image] =>[orig_patent_app_number] => 11231978
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/231978 | Method and apparatus for managing communication security in wireless network | Sep 21, 2005 | Issued |
Array
(
[id] => 7594341
[patent_doc_number] => 07627124
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-12-01
[patent_title] => 'Wireless communication authentication process and system'
[patent_app_type] => utility
[patent_app_number] => 11/231771
[patent_app_country] => US
[patent_app_date] => 2005-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5364
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/627/07627124.pdf
[firstpage_image] =>[orig_patent_app_number] => 11231771
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/231771 | Wireless communication authentication process and system | Sep 21, 2005 | Issued |
Array
(
[id] => 5108967
[patent_doc_number] => 20070067845
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-03-22
[patent_title] => 'Application of cut-sets to network interdependency security risk assessment'
[patent_app_type] => utility
[patent_app_number] => 11/232004
[patent_app_country] => US
[patent_app_date] => 2005-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7871
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0067/20070067845.pdf
[firstpage_image] =>[orig_patent_app_number] => 11232004
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/232004 | Application of cut-sets to network interdependency security risk assessment | Sep 21, 2005 | Abandoned |