Search

Carlton Johnson

Examiner (ID: 11729, Phone: (571)270-1032 , Office: P/2436 )

Most Active Art Unit
2436
Art Unit(s)
2136, 2436
Total Applications
396
Issued Applications
204
Pending Applications
49
Abandoned Applications
157

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 16449382 [patent_doc_number] => 10841317 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-11-17 [patent_title] => Processing content sharing system data from a plurality of remotely connected computing devices in physical or virtualized space [patent_app_type] => utility [patent_app_number] => 14/674999 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 29479 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 263 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674999 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/674999
Processing content sharing system data from a plurality of remotely connected computing devices in physical or virtualized space Mar 30, 2015 Issued
Array ( [id] => 11883081 [patent_doc_number] => 09754257 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-09-05 [patent_title] => 'Authentication system and method' [patent_app_type] => utility [patent_app_number] => 14/659136 [patent_app_country] => US [patent_app_date] => 2015-03-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4841 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 263 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14659136 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/659136
Authentication system and method Mar 15, 2015 Issued
Array ( [id] => 11280721 [patent_doc_number] => 09497208 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-11-15 [patent_title] => 'Distributed network protection' [patent_app_type] => utility [patent_app_number] => 14/607189 [patent_app_country] => US [patent_app_date] => 2015-01-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 10 [patent_no_of_words] => 8025 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 275 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14607189 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/607189
Distributed network protection Jan 27, 2015 Issued
Array ( [id] => 12938893 [patent_doc_number] => 09832227 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-11-28 [patent_title] => System and method for network level protection against malicious software [patent_app_type] => utility [patent_app_number] => 14/599811 [patent_app_country] => US [patent_app_date] => 2015-01-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 12 [patent_no_of_words] => 13176 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 214 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14599811 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/599811
System and method for network level protection against malicious software Jan 18, 2015 Issued
Array ( [id] => 10717075 [patent_doc_number] => 20160063222 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-03 [patent_title] => 'LICENSE MANAGEMENT METHODS' [patent_app_type] => utility [patent_app_number] => 14/582672 [patent_app_country] => US [patent_app_date] => 2014-12-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5722 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14582672 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/582672
License management methods Dec 23, 2014 Issued
Array ( [id] => 15705635 [patent_doc_number] => 10609012 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-03-31 [patent_title] => Method of operating a security token, computer program product and security token [patent_app_type] => utility [patent_app_number] => 14/527680 [patent_app_country] => US [patent_app_date] => 2014-10-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 3343 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 162 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14527680 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/527680
Method of operating a security token, computer program product and security token Oct 28, 2014 Issued
Array ( [id] => 10752421 [patent_doc_number] => 20160098573 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-04-07 [patent_title] => 'Securing a Distributed File System' [patent_app_type] => utility [patent_app_number] => 14/506359 [patent_app_country] => US [patent_app_date] => 2014-10-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6993 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14506359 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/506359
Securing a Distributed File System Oct 2, 2014 Abandoned
Array ( [id] => 10746514 [patent_doc_number] => 20160092665 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-31 [patent_title] => 'Liveness Detection for User Authentication' [patent_app_type] => utility [patent_app_number] => 14/499138 [patent_app_country] => US [patent_app_date] => 2014-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 4751 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14499138 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/499138
Liveness Detection for User Authentication Sep 26, 2014 Abandoned
Array ( [id] => 10724760 [patent_doc_number] => 20160070908 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-10 [patent_title] => 'NEXT GENERATION OF SECURITY OPERATIONS SERVICE' [patent_app_type] => utility [patent_app_number] => 14/482011 [patent_app_country] => US [patent_app_date] => 2014-09-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7555 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14482011 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/482011
NEXT GENERATION OF SECURITY OPERATIONS SERVICE Sep 9, 2014 Abandoned
Array ( [id] => 10717128 [patent_doc_number] => 20160063274 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-03 [patent_title] => 'Data Processing Device with Light Indicator Unit' [patent_app_type] => utility [patent_app_number] => 14/472973 [patent_app_country] => US [patent_app_date] => 2014-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 11758 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14472973 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/472973
Data Processing Device with Light Indicator Unit Aug 28, 2014 Abandoned
Array ( [id] => 10709196 [patent_doc_number] => 20160055343 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-25 [patent_title] => 'HIERARCHICAL PRIVACY SETTINGS FOR COMMENTS AND MARKUPS IN A SHARED DOCUMENT' [patent_app_type] => utility [patent_app_number] => 14/464982 [patent_app_country] => US [patent_app_date] => 2014-08-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 9834 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14464982 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/464982
HIERARCHICAL PRIVACY SETTINGS FOR COMMENTS AND MARKUPS IN A SHARED DOCUMENT Aug 20, 2014 Abandoned
Array ( [id] => 11179982 [patent_doc_number] => 09411976 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-08-09 [patent_title] => 'Communication system and method' [patent_app_type] => utility [patent_app_number] => 14/260432 [patent_app_country] => US [patent_app_date] => 2014-04-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 28 [patent_figures_cnt] => 28 [patent_no_of_words] => 26854 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 222 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14260432 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/260432
Communication system and method Apr 23, 2014 Issued
Array ( [id] => 10393116 [patent_doc_number] => 20150278123 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-01 [patent_title] => 'LOW-OVERHEAD DETECTION OF UNAUTHORIZED MEMORY MODIFICATION USING TRANSACTIONAL MEMORY' [patent_app_type] => utility [patent_app_number] => 14/228842 [patent_app_country] => US [patent_app_date] => 2014-03-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 11794 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14228842 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/228842
LOW-OVERHEAD DETECTION OF UNAUTHORIZED MEMORY MODIFICATION USING TRANSACTIONAL MEMORY Mar 27, 2014
Array ( [id] => 15473471 [patent_doc_number] => 10552614 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-02-04 [patent_title] => Authentication system and method [patent_app_type] => utility [patent_app_number] => 15/112626 [patent_app_country] => US [patent_app_date] => 2014-01-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 3571 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 137 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15112626 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/112626
Authentication system and method Jan 30, 2014 Issued
Array ( [id] => 12461196 [patent_doc_number] => 09986276 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-05-29 [patent_title] => Authentication system and method of operating the same [patent_app_type] => utility [patent_app_number] => 14/164822 [patent_app_country] => US [patent_app_date] => 2014-01-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4822 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 200 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14164822 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/164822
Authentication system and method of operating the same Jan 26, 2014 Issued
Array ( [id] => 9479766 [patent_doc_number] => 20140137229 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-05-15 [patent_title] => 'PROVIDING NOTIFICATION OF SPAM AVATARS' [patent_app_type] => utility [patent_app_number] => 14/161841 [patent_app_country] => US [patent_app_date] => 2014-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4087 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14161841 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/161841
Providing notification of spam avatars Jan 22, 2014 Issued
Array ( [id] => 11413198 [patent_doc_number] => 09560524 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-01-31 [patent_title] => 'Wireless network application access by a wireless communication device via an untrusted access node' [patent_app_type] => utility [patent_app_number] => 14/095686 [patent_app_country] => US [patent_app_date] => 2013-12-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5009 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 200 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14095686 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/095686
Wireless network application access by a wireless communication device via an untrusted access node Dec 2, 2013 Issued
Array ( [id] => 11226817 [patent_doc_number] => 09454540 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-09-27 [patent_title] => 'Systems and methods for sharing files among multiple terminals' [patent_app_type] => utility [patent_app_number] => 14/085684 [patent_app_country] => US [patent_app_date] => 2013-11-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 9 [patent_no_of_words] => 4942 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 260 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14085684 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/085684
Systems and methods for sharing files among multiple terminals Nov 19, 2013 Issued
Array ( [id] => 9774794 [patent_doc_number] => 20140298457 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-10-02 [patent_title] => 'METHOD AND APPARATUS FOR COLLECTING HARMFUL INFORMATION USING BIG DATA ANALYSIS' [patent_app_type] => utility [patent_app_number] => 14/084461 [patent_app_country] => US [patent_app_date] => 2013-11-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4762 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14084461 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/084461
METHOD AND APPARATUS FOR COLLECTING HARMFUL INFORMATION USING BIG DATA ANALYSIS Nov 18, 2013 Abandoned
Array ( [id] => 9571644 [patent_doc_number] => 20140189357 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-03 [patent_title] => 'ENCRYPTION AND AUTHENTICATION BASED NETWORK MANAGEMENT METHOD AND APPARATUS' [patent_app_type] => utility [patent_app_number] => 14/084572 [patent_app_country] => US [patent_app_date] => 2013-11-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3965 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14084572 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/084572
ENCRYPTION AND AUTHENTICATION BASED NETWORK MANAGEMENT METHOD AND APPARATUS Nov 18, 2013 Abandoned
Menu