Brooke Marie Matney
Examiner (ID: 440)
Most Active Art Unit | 3763 |
Art Unit(s) | 4138, 3763 |
Total Applications | 196 |
Issued Applications | 132 |
Pending Applications | 0 |
Abandoned Applications | 52 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 10152801
[patent_doc_number] => 09185109
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-10
[patent_title] => 'Simple protocol for tangible security'
[patent_app_type] => utility
[patent_app_number] => 12/250308
[patent_app_country] => US
[patent_app_date] => 2008-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7966
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12250308
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/250308 | Simple protocol for tangible security | Oct 12, 2008 | Issued |
Array
(
[id] => 6474421
[patent_doc_number] => 20100091994
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-15
[patent_title] => 'Encryption Validation Systems and Related Methods and Computer Program Products for Verifying the Validity of an Encryption Keystore'
[patent_app_type] => utility
[patent_app_number] => 12/250170
[patent_app_country] => US
[patent_app_date] => 2008-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7843
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0091/20100091994.pdf
[firstpage_image] =>[orig_patent_app_number] => 12250170
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/250170 | Encryption Validation Systems and Related Methods and Computer Program Products for Verifying the Validity of an Encryption Keystore | Oct 12, 2008 | Abandoned |
Array
(
[id] => 6386191
[patent_doc_number] => 20100077458
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-03-25
[patent_title] => 'Apparatus, System, and Method for Responsibility-Based Data Management'
[patent_app_type] => utility
[patent_app_number] => 12/237752
[patent_app_country] => US
[patent_app_date] => 2008-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 17441
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0077/20100077458.pdf
[firstpage_image] =>[orig_patent_app_number] => 12237752
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/237752 | Apparatus, System, and Method for Responsibility-Based Data Management | Sep 24, 2008 | Abandoned |
Array
(
[id] => 8529644
[patent_doc_number] => 08306226
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-11-06
[patent_title] => 'Transmitting apparatus, receiving apparatus, and content transmitting method'
[patent_app_type] => utility
[patent_app_number] => 12/199925
[patent_app_country] => US
[patent_app_date] => 2008-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 18
[patent_no_of_words] => 9758
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12199925
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/199925 | Transmitting apparatus, receiving apparatus, and content transmitting method | Aug 27, 2008 | Issued |
Array
(
[id] => 6219379
[patent_doc_number] => 20100054474
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-03-04
[patent_title] => 'SHARING A SECRET USING HYPERPLANES OVER GF(2m)'
[patent_app_type] => utility
[patent_app_number] => 12/200896
[patent_app_country] => US
[patent_app_date] => 2008-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7008
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0054/20100054474.pdf
[firstpage_image] =>[orig_patent_app_number] => 12200896
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/200896 | Sharing a secret using hyperplanes over GF(2m) | Aug 27, 2008 | Issued |
Array
(
[id] => 6219362
[patent_doc_number] => 20100054457
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-03-04
[patent_title] => 'SHARING A SECRET USING HYPERPLANES OVER GF(q)'
[patent_app_type] => utility
[patent_app_number] => 12/200897
[patent_app_country] => US
[patent_app_date] => 2008-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7788
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0054/20100054457.pdf
[firstpage_image] =>[orig_patent_app_number] => 12200897
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/200897 | Sharing a secret using hyperplanes over GF(q) | Aug 27, 2008 | Issued |
Array
(
[id] => 6219385
[patent_doc_number] => 20100054480
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-03-04
[patent_title] => 'SHARING A SECRET USING POLYNOMIALS OVER POLYNOMIALS'
[patent_app_type] => utility
[patent_app_number] => 12/200895
[patent_app_country] => US
[patent_app_date] => 2008-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6926
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0054/20100054480.pdf
[firstpage_image] =>[orig_patent_app_number] => 12200895
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/200895 | Sharing a secret using polynomials over polynomials | Aug 27, 2008 | Issued |
Array
(
[id] => 8579638
[patent_doc_number] => 08345861
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-01-01
[patent_title] => 'Sharing a secret using polynomial division over GF(Q)'
[patent_app_type] => utility
[patent_app_number] => 12/197082
[patent_app_country] => US
[patent_app_date] => 2008-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 6901
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12197082
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/197082 | Sharing a secret using polynomial division over GF(Q) | Aug 21, 2008 | Issued |
Array
(
[id] => 8220692
[patent_doc_number] => 08196211
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-06-05
[patent_title] => 'Authorized authorization set in RBAC model'
[patent_app_type] => utility
[patent_app_number] => 12/191644
[patent_app_country] => US
[patent_app_date] => 2008-08-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2806
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/196/08196211.pdf
[firstpage_image] =>[orig_patent_app_number] => 12191644
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/191644 | Authorized authorization set in RBAC model | Aug 13, 2008 | Issued |
Array
(
[id] => 8573634
[patent_doc_number] => 08340288
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-12-25
[patent_title] => 'Cryptographic key generation'
[patent_app_type] => utility
[patent_app_number] => 12/996214
[patent_app_country] => US
[patent_app_date] => 2008-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 10
[patent_no_of_words] => 6330
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12996214
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/996214 | Cryptographic key generation | Jul 20, 2008 | Issued |
Array
(
[id] => 5468043
[patent_doc_number] => 20090328179
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-31
[patent_title] => 'IDENTIFICATION OF A SMART CARD ON A PLUG AND PLAY SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 12/163153
[patent_app_country] => US
[patent_app_date] => 2008-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3663
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0328/20090328179.pdf
[firstpage_image] =>[orig_patent_app_number] => 12163153
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/163153 | Identification of a smart card on a plug and play system | Jun 26, 2008 | Issued |
Array
(
[id] => 5491681
[patent_doc_number] => 20090292752
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-11-26
[patent_title] => 'Mechanism for generating pseudorandom number sequences'
[patent_app_type] => utility
[patent_app_number] => 12/154465
[patent_app_country] => US
[patent_app_date] => 2008-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4626
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0292/20090292752.pdf
[firstpage_image] =>[orig_patent_app_number] => 12154465
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/154465 | Mechanism for generating pseudorandom number sequences | May 22, 2008 | Issued |
Array
(
[id] => 5463727
[patent_doc_number] => 20090323927
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-31
[patent_title] => 'Mechanism for chained output feedback encryption'
[patent_app_type] => utility
[patent_app_number] => 12/154612
[patent_app_country] => US
[patent_app_date] => 2008-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3577
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0323/20090323927.pdf
[firstpage_image] =>[orig_patent_app_number] => 12154612
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/154612 | Mechanism for chained output feedback encryption | May 22, 2008 | Issued |
Array
(
[id] => 4777751
[patent_doc_number] => 20080285749
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-11-20
[patent_title] => 'Method and apparatus for generating security key in a mobile communication system'
[patent_app_type] => utility
[patent_app_number] => 12/152354
[patent_app_country] => US
[patent_app_date] => 2008-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 7916
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0285/20080285749.pdf
[firstpage_image] =>[orig_patent_app_number] => 12152354
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/152354 | Method and apparatus for generating security key in a mobile communication system | May 13, 2008 | Issued |
Array
(
[id] => 9652581
[patent_doc_number] => 08806618
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-08-12
[patent_title] => 'Security by construction for distributed applications'
[patent_app_type] => utility
[patent_app_number] => 12/059930
[patent_app_country] => US
[patent_app_date] => 2008-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 8514
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12059930
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/059930 | Security by construction for distributed applications | Mar 30, 2008 | Issued |
Array
(
[id] => 5476528
[patent_doc_number] => 20090249487
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-10-01
[patent_title] => 'METHOD AND ARRANGEMENT RELATING TO A COMMUNICATION DEVICE'
[patent_app_type] => utility
[patent_app_number] => 12/058251
[patent_app_country] => US
[patent_app_date] => 2008-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3908
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0249/20090249487.pdf
[firstpage_image] =>[orig_patent_app_number] => 12058251
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/058251 | Method and arrangement relating to a communication device | Mar 27, 2008 | Issued |
Array
(
[id] => 7778015
[patent_doc_number] => 08121295
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-02-21
[patent_title] => 'Method, apparatus, and system for controlling playout of media'
[patent_app_type] => utility
[patent_app_number] => 12/058211
[patent_app_country] => US
[patent_app_date] => 2008-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 9154
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 243
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/121/08121295.pdf
[firstpage_image] =>[orig_patent_app_number] => 12058211
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/058211 | Method, apparatus, and system for controlling playout of media | Mar 27, 2008 | Issued |
Array
(
[id] => 9714740
[patent_doc_number] => 08839345
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-16
[patent_title] => 'Method for discovering a security policy'
[patent_app_type] => utility
[patent_app_number] => 12/049629
[patent_app_country] => US
[patent_app_date] => 2008-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 6235
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12049629
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/049629 | Method for discovering a security policy | Mar 16, 2008 | Issued |
Array
(
[id] => 5535573
[patent_doc_number] => 20090235361
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-09-17
[patent_title] => 'SEGMENT BASED DIGITAL CONTENT PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 12/049129
[patent_app_country] => US
[patent_app_date] => 2008-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5541
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20090235361.pdf
[firstpage_image] =>[orig_patent_app_number] => 12049129
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/049129 | Segment based digital content protection | Mar 13, 2008 | Issued |
Array
(
[id] => 5532684
[patent_doc_number] => 20090232472
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-09-17
[patent_title] => 'METHODS AND APPARATUS FOR PROVIDING USAGE TIMERS FOR A PRESENTATION DEVICE'
[patent_app_type] => utility
[patent_app_number] => 12/046079
[patent_app_country] => US
[patent_app_date] => 2008-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5619
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0232/20090232472.pdf
[firstpage_image] =>[orig_patent_app_number] => 12046079
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/046079 | METHODS AND APPARATUS FOR PROVIDING USAGE TIMERS FOR A PRESENTATION DEVICE | Mar 10, 2008 | Abandoned |