Brooke Marie Matney
Examiner (ID: 440)
Most Active Art Unit | 3763 |
Art Unit(s) | 4138, 3763 |
Total Applications | 196 |
Issued Applications | 132 |
Pending Applications | 0 |
Abandoned Applications | 52 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 6194956
[patent_doc_number] => 20110026710
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-02-03
[patent_title] => 'System and Method for Cryptographically Authenticating Data Items'
[patent_app_type] => utility
[patent_app_number] => 12/895599
[patent_app_country] => US
[patent_app_date] => 2010-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7154
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0026/20110026710.pdf
[firstpage_image] =>[orig_patent_app_number] => 12895599
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/895599 | System and method for cryptographically authenticating data items | Sep 29, 2010 | Issued |
Array
(
[id] => 8787274
[patent_doc_number] => 08434132
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-04-30
[patent_title] => 'Roaming between networks employing different authentication protocols'
[patent_app_type] => utility
[patent_app_number] => 12/873028
[patent_app_country] => US
[patent_app_date] => 2010-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 5606
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12873028
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/873028 | Roaming between networks employing different authentication protocols | Aug 30, 2010 | Issued |
Array
(
[id] => 7793283
[patent_doc_number] => 20120054839
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-03-01
[patent_title] => 'USER-ENTERED CREDENTIALS FOR A MOBILE STATION IN A WIRELESS NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/873015
[patent_app_country] => US
[patent_app_date] => 2010-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6901
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0054/20120054839.pdf
[firstpage_image] =>[orig_patent_app_number] => 12873015
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/873015 | User-entered credentials for a mobile station in a wireless network | Aug 30, 2010 | Issued |
Array
(
[id] => 8530630
[patent_doc_number] => 08307214
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-11-06
[patent_title] => 'Method for restricting access to media data generated by a camera'
[patent_app_type] => utility
[patent_app_number] => 12/821746
[patent_app_country] => US
[patent_app_date] => 2010-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 10015
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12821746
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/821746 | Method for restricting access to media data generated by a camera | Jun 22, 2010 | Issued |
Array
(
[id] => 8741441
[patent_doc_number] => 08413231
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-04-02
[patent_title] => 'Document control'
[patent_app_type] => utility
[patent_app_number] => 12/815305
[patent_app_country] => US
[patent_app_date] => 2010-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4410
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12815305
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/815305 | Document control | Jun 13, 2010 | Issued |
Array
(
[id] => 9157056
[patent_doc_number] => 08589970
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-11-19
[patent_title] => 'Content transmitter and receiver apparatus and content transmitting and receiving method'
[patent_app_type] => utility
[patent_app_number] => 12/779801
[patent_app_country] => US
[patent_app_date] => 2010-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 46
[patent_figures_cnt] => 46
[patent_no_of_words] => 35298
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12779801
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/779801 | Content transmitter and receiver apparatus and content transmitting and receiving method | May 12, 2010 | Issued |
Array
(
[id] => 8759288
[patent_doc_number] => 08419806
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-04-16
[patent_title] => 'Discriminating data protection system'
[patent_app_type] => utility
[patent_app_number] => 12/774603
[patent_app_country] => US
[patent_app_date] => 2010-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 5675
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12774603
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/774603 | Discriminating data protection system | May 4, 2010 | Issued |
Array
(
[id] => 9652541
[patent_doc_number] => 08806578
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-08-12
[patent_title] => 'Data driven role based security'
[patent_app_type] => utility
[patent_app_number] => 12/774108
[patent_app_country] => US
[patent_app_date] => 2010-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7911
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12774108
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/774108 | Data driven role based security | May 4, 2010 | Issued |
Array
(
[id] => 5960788
[patent_doc_number] => 20110185175
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-07-28
[patent_title] => 'Authentication Method and System for Online Gaming'
[patent_app_type] => utility
[patent_app_number] => 12/772447
[patent_app_country] => US
[patent_app_date] => 2010-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3441
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0185/20110185175.pdf
[firstpage_image] =>[orig_patent_app_number] => 12772447
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/772447 | Authentication Method and System for Online Gaming | May 2, 2010 | Abandoned |
Array
(
[id] => 6126334
[patent_doc_number] => 20110078782
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-31
[patent_title] => 'IP COMMUNICATION DEVICE AS FIREWALL BETWEEN NETWORK AND COMPUTER SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 12/771284
[patent_app_country] => US
[patent_app_date] => 2010-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9440
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0078/20110078782.pdf
[firstpage_image] =>[orig_patent_app_number] => 12771284
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/771284 | IP communication device as firewall between network and computer system | Apr 29, 2010 | Issued |
Array
(
[id] => 8183575
[patent_doc_number] => 08181235
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-05-15
[patent_title] => 'Authentication device, server system, and method of authenticating server between a plurality of cells and authentication program thereof'
[patent_app_type] => utility
[patent_app_number] => 12/753210
[patent_app_country] => US
[patent_app_date] => 2010-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 6313
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 243
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/181/08181235.pdf
[firstpage_image] =>[orig_patent_app_number] => 12753210
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/753210 | Authentication device, server system, and method of authenticating server between a plurality of cells and authentication program thereof | Apr 1, 2010 | Issued |
Array
(
[id] => 8400232
[patent_doc_number] => 08270615
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-09-18
[patent_title] => 'Key-updating method, encryption processing method, key-insulated cryptosystem and terminal device'
[patent_app_type] => utility
[patent_app_number] => 12/727875
[patent_app_country] => US
[patent_app_date] => 2010-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 12
[patent_no_of_words] => 13278
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 288
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12727875
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/727875 | Key-updating method, encryption processing method, key-insulated cryptosystem and terminal device | Mar 18, 2010 | Issued |
Array
(
[id] => 9821303
[patent_doc_number] => 08931106
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-06
[patent_title] => 'Systems and methods for managing and protecting electronic content and applications'
[patent_app_type] => utility
[patent_app_number] => 12/728098
[patent_app_country] => US
[patent_app_date] => 2010-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9774
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12728098
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/728098 | Systems and methods for managing and protecting electronic content and applications | Mar 18, 2010 | Issued |
Array
(
[id] => 6487952
[patent_doc_number] => 20100208890
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-08-19
[patent_title] => 'CONTENT DISTRIBUTION APPARATUS, CONTENT USE APPARATUS, CONTENT DISTRIBUTION SYSTEM, CONTENT DISTRIBUTION METHOD AND PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 12/705190
[patent_app_country] => US
[patent_app_date] => 2010-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 11018
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0208/20100208890.pdf
[firstpage_image] =>[orig_patent_app_number] => 12705190
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/705190 | CONTENT DISTRIBUTION APPARATUS, CONTENT USE APPARATUS, CONTENT DISTRIBUTION SYSTEM, CONTENT DISTRIBUTION METHOD AND PROGRAM | Feb 11, 2010 | Abandoned |
Array
(
[id] => 8645902
[patent_doc_number] => 08370902
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-02-05
[patent_title] => 'Rescuing trusted nodes from filtering of untrusted network entities'
[patent_app_type] => utility
[patent_app_number] => 12/697179
[patent_app_country] => US
[patent_app_date] => 2010-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 11910
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12697179
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/697179 | Rescuing trusted nodes from filtering of untrusted network entities | Jan 28, 2010 | Issued |
Array
(
[id] => 9680897
[patent_doc_number] => 08819826
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-08-26
[patent_title] => 'Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation'
[patent_app_type] => utility
[patent_app_number] => 12/694988
[patent_app_country] => US
[patent_app_date] => 2010-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 8513
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12694988
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/694988 | Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation | Jan 26, 2010 | Issued |
Array
(
[id] => 6278511
[patent_doc_number] => 20100119063
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-05-13
[patent_title] => 'Establishing Relative Identity'
[patent_app_type] => utility
[patent_app_number] => 12/688573
[patent_app_country] => US
[patent_app_date] => 2010-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4625
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0119/20100119063.pdf
[firstpage_image] =>[orig_patent_app_number] => 12688573
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/688573 | Establishing relative identity | Jan 14, 2010 | Issued |
Array
(
[id] => 9764583
[patent_doc_number] => 08848921
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-30
[patent_title] => 'Group key management approach based on linear geometry'
[patent_app_type] => utility
[patent_app_number] => 13/055380
[patent_app_country] => US
[patent_app_date] => 2009-12-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 12
[patent_no_of_words] => 10005
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 304
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13055380
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/055380 | Group key management approach based on linear geometry | Dec 23, 2009 | Issued |
Array
(
[id] => 6407191
[patent_doc_number] => 20100166189
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-01
[patent_title] => 'Key Management Apparatus and Key Management Method'
[patent_app_type] => utility
[patent_app_number] => 12/643710
[patent_app_country] => US
[patent_app_date] => 2009-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6766
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0166/20100166189.pdf
[firstpage_image] =>[orig_patent_app_number] => 12643710
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/643710 | Key Management Apparatus and Key Management Method | Dec 20, 2009 | Abandoned |
Array
(
[id] => 6453143
[patent_doc_number] => 20100154044
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-17
[patent_title] => 'MULTI-TRANSPORT MODE DEVICES HAVING IMPROVED DATA THROUGHPUT'
[patent_app_type] => utility
[patent_app_number] => 12/631397
[patent_app_country] => US
[patent_app_date] => 2009-12-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4260
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0154/20100154044.pdf
[firstpage_image] =>[orig_patent_app_number] => 12631397
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/631397 | Multi-transport mode devices having improved data throughput | Dec 3, 2009 | Issued |