
Carlton Johnson
Examiner (ID: 11729, Phone: (571)270-1032 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2136, 2436 |
| Total Applications | 396 |
| Issued Applications | 204 |
| Pending Applications | 49 |
| Abandoned Applications | 157 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16449382
[patent_doc_number] => 10841317
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-17
[patent_title] => Processing content sharing system data from a plurality of remotely connected computing devices in physical or virtualized space
[patent_app_type] => utility
[patent_app_number] => 14/674999
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 29479
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 263
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674999
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674999 | Processing content sharing system data from a plurality of remotely connected computing devices in physical or virtualized space | Mar 30, 2015 | Issued |
Array
(
[id] => 11883081
[patent_doc_number] => 09754257
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-09-05
[patent_title] => 'Authentication system and method'
[patent_app_type] => utility
[patent_app_number] => 14/659136
[patent_app_country] => US
[patent_app_date] => 2015-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4841
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 263
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14659136
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/659136 | Authentication system and method | Mar 15, 2015 | Issued |
Array
(
[id] => 11280721
[patent_doc_number] => 09497208
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-15
[patent_title] => 'Distributed network protection'
[patent_app_type] => utility
[patent_app_number] => 14/607189
[patent_app_country] => US
[patent_app_date] => 2015-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 8025
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 275
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14607189
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/607189 | Distributed network protection | Jan 27, 2015 | Issued |
Array
(
[id] => 12938893
[patent_doc_number] => 09832227
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-28
[patent_title] => System and method for network level protection against malicious software
[patent_app_type] => utility
[patent_app_number] => 14/599811
[patent_app_country] => US
[patent_app_date] => 2015-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 12
[patent_no_of_words] => 13176
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14599811
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/599811 | System and method for network level protection against malicious software | Jan 18, 2015 | Issued |
Array
(
[id] => 10717075
[patent_doc_number] => 20160063222
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'LICENSE MANAGEMENT METHODS'
[patent_app_type] => utility
[patent_app_number] => 14/582672
[patent_app_country] => US
[patent_app_date] => 2014-12-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5722
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14582672
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/582672 | License management methods | Dec 23, 2014 | Issued |
Array
(
[id] => 15705635
[patent_doc_number] => 10609012
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-31
[patent_title] => Method of operating a security token, computer program product and security token
[patent_app_type] => utility
[patent_app_number] => 14/527680
[patent_app_country] => US
[patent_app_date] => 2014-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 3343
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14527680
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/527680 | Method of operating a security token, computer program product and security token | Oct 28, 2014 | Issued |
Array
(
[id] => 10752421
[patent_doc_number] => 20160098573
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-07
[patent_title] => 'Securing a Distributed File System'
[patent_app_type] => utility
[patent_app_number] => 14/506359
[patent_app_country] => US
[patent_app_date] => 2014-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6993
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14506359
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/506359 | Securing a Distributed File System | Oct 2, 2014 | Abandoned |
Array
(
[id] => 10746514
[patent_doc_number] => 20160092665
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-31
[patent_title] => 'Liveness Detection for User Authentication'
[patent_app_type] => utility
[patent_app_number] => 14/499138
[patent_app_country] => US
[patent_app_date] => 2014-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4751
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14499138
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/499138 | Liveness Detection for User Authentication | Sep 26, 2014 | Abandoned |
Array
(
[id] => 10724760
[patent_doc_number] => 20160070908
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'NEXT GENERATION OF SECURITY OPERATIONS SERVICE'
[patent_app_type] => utility
[patent_app_number] => 14/482011
[patent_app_country] => US
[patent_app_date] => 2014-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7555
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14482011
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/482011 | NEXT GENERATION OF SECURITY OPERATIONS SERVICE | Sep 9, 2014 | Abandoned |
Array
(
[id] => 10717128
[patent_doc_number] => 20160063274
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'Data Processing Device with Light Indicator Unit'
[patent_app_type] => utility
[patent_app_number] => 14/472973
[patent_app_country] => US
[patent_app_date] => 2014-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11758
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14472973
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/472973 | Data Processing Device with Light Indicator Unit | Aug 28, 2014 | Abandoned |
Array
(
[id] => 10709196
[patent_doc_number] => 20160055343
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-25
[patent_title] => 'HIERARCHICAL PRIVACY SETTINGS FOR COMMENTS AND MARKUPS IN A SHARED DOCUMENT'
[patent_app_type] => utility
[patent_app_number] => 14/464982
[patent_app_country] => US
[patent_app_date] => 2014-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 9834
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14464982
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/464982 | HIERARCHICAL PRIVACY SETTINGS FOR COMMENTS AND MARKUPS IN A SHARED DOCUMENT | Aug 20, 2014 | Abandoned |
Array
(
[id] => 11179982
[patent_doc_number] => 09411976
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-09
[patent_title] => 'Communication system and method'
[patent_app_type] => utility
[patent_app_number] => 14/260432
[patent_app_country] => US
[patent_app_date] => 2014-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 26854
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14260432
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/260432 | Communication system and method | Apr 23, 2014 | Issued |
Array
(
[id] => 10393116
[patent_doc_number] => 20150278123
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-01
[patent_title] => 'LOW-OVERHEAD DETECTION OF UNAUTHORIZED MEMORY MODIFICATION USING TRANSACTIONAL MEMORY'
[patent_app_type] => utility
[patent_app_number] => 14/228842
[patent_app_country] => US
[patent_app_date] => 2014-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11794
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14228842
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/228842 | LOW-OVERHEAD DETECTION OF UNAUTHORIZED MEMORY MODIFICATION USING TRANSACTIONAL MEMORY | Mar 27, 2014 | |
Array
(
[id] => 15473471
[patent_doc_number] => 10552614
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-04
[patent_title] => Authentication system and method
[patent_app_type] => utility
[patent_app_number] => 15/112626
[patent_app_country] => US
[patent_app_date] => 2014-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 3571
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15112626
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/112626 | Authentication system and method | Jan 30, 2014 | Issued |
Array
(
[id] => 12461196
[patent_doc_number] => 09986276
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-29
[patent_title] => Authentication system and method of operating the same
[patent_app_type] => utility
[patent_app_number] => 14/164822
[patent_app_country] => US
[patent_app_date] => 2014-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4822
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14164822
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/164822 | Authentication system and method of operating the same | Jan 26, 2014 | Issued |
Array
(
[id] => 9479766
[patent_doc_number] => 20140137229
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-15
[patent_title] => 'PROVIDING NOTIFICATION OF SPAM AVATARS'
[patent_app_type] => utility
[patent_app_number] => 14/161841
[patent_app_country] => US
[patent_app_date] => 2014-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4087
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14161841
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/161841 | Providing notification of spam avatars | Jan 22, 2014 | Issued |
Array
(
[id] => 11413198
[patent_doc_number] => 09560524
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-01-31
[patent_title] => 'Wireless network application access by a wireless communication device via an untrusted access node'
[patent_app_type] => utility
[patent_app_number] => 14/095686
[patent_app_country] => US
[patent_app_date] => 2013-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5009
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14095686
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/095686 | Wireless network application access by a wireless communication device via an untrusted access node | Dec 2, 2013 | Issued |
Array
(
[id] => 11226817
[patent_doc_number] => 09454540
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-27
[patent_title] => 'Systems and methods for sharing files among multiple terminals'
[patent_app_type] => utility
[patent_app_number] => 14/085684
[patent_app_country] => US
[patent_app_date] => 2013-11-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 4942
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 260
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14085684
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/085684 | Systems and methods for sharing files among multiple terminals | Nov 19, 2013 | Issued |
Array
(
[id] => 9774794
[patent_doc_number] => 20140298457
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-02
[patent_title] => 'METHOD AND APPARATUS FOR COLLECTING HARMFUL INFORMATION USING BIG DATA ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 14/084461
[patent_app_country] => US
[patent_app_date] => 2013-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4762
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14084461
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/084461 | METHOD AND APPARATUS FOR COLLECTING HARMFUL INFORMATION USING BIG DATA ANALYSIS | Nov 18, 2013 | Abandoned |
Array
(
[id] => 9571644
[patent_doc_number] => 20140189357
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-03
[patent_title] => 'ENCRYPTION AND AUTHENTICATION BASED NETWORK MANAGEMENT METHOD AND APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 14/084572
[patent_app_country] => US
[patent_app_date] => 2013-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3965
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14084572
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/084572 | ENCRYPTION AND AUTHENTICATION BASED NETWORK MANAGEMENT METHOD AND APPARATUS | Nov 18, 2013 | Abandoned |