
Charles A. Fox
Supervisory Patent Examiner (ID: 4147, Phone: (571)272-6923 , Office: P/3638 )
| Most Active Art Unit | 3652 |
| Art Unit(s) | 3652, 3655, 3618, 3638, 3658, 4147, 4154 |
| Total Applications | 844 |
| Issued Applications | 444 |
| Pending Applications | 37 |
| Abandoned Applications | 363 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16683617
[patent_doc_number] => 10943097
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-09
[patent_title] => Scalable configurable universal full spectrum cyber process that utilizes measure points from sensor observation-derived representations or analytically rich sparse data sets for making cyber determinations regarding or utilizing sensor observations or sensor observations subjects
[patent_app_type] => utility
[patent_app_number] => 15/981785
[patent_app_country] => US
[patent_app_date] => 2018-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 47460
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 915
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15981785
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/981785 | Scalable configurable universal full spectrum cyber process that utilizes measure points from sensor observation-derived representations or analytically rich sparse data sets for making cyber determinations regarding or utilizing sensor observations or sensor observations subjects | May 15, 2018 | Issued |
Array
(
[id] => 14096063
[patent_doc_number] => 10243956
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-26
[patent_title] => Internetwork authentication
[patent_app_type] => utility
[patent_app_number] => 15/962816
[patent_app_country] => US
[patent_app_date] => 2018-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11397
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15962816
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/962816 | Internetwork authentication | Apr 24, 2018 | Issued |
Array
(
[id] => 14674211
[patent_doc_number] => 10375036
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-06
[patent_title] => Content management system
[patent_app_type] => utility
[patent_app_number] => 15/941394
[patent_app_country] => US
[patent_app_date] => 2018-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9239
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15941394
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/941394 | Content management system | Mar 29, 2018 | Issued |
Array
(
[id] => 14560509
[patent_doc_number] => 10348732
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-09
[patent_title] => Anti-takeover systems and methods for network attached peripherals
[patent_app_type] => utility
[patent_app_number] => 15/933887
[patent_app_country] => US
[patent_app_date] => 2018-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 12363
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15933887
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/933887 | Anti-takeover systems and methods for network attached peripherals | Mar 22, 2018 | Issued |
Array
(
[id] => 12899965
[patent_doc_number] => 20180191830
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-05
[patent_title] => CONTROL OF HOME DIALYSIS MACHINES USING A NETWORK CONNECTED SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/910276
[patent_app_country] => US
[patent_app_date] => 2018-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4642
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15910276
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/910276 | Control of home dialysis machines using a network connected system | Mar 1, 2018 | Issued |
Array
(
[id] => 16706670
[patent_doc_number] => 10956605
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-03-23
[patent_title] => Method and apparatus for protecting sensitive data
[patent_app_type] => utility
[patent_app_number] => 15/882388
[patent_app_country] => US
[patent_app_date] => 2018-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 9202
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15882388
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/882388 | Method and apparatus for protecting sensitive data | Jan 28, 2018 | Issued |
Array
(
[id] => 16416829
[patent_doc_number] => 10824725
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-03
[patent_title] => Automatic detection of software that performs unauthorized privilege escalation
[patent_app_type] => utility
[patent_app_number] => 15/877418
[patent_app_country] => US
[patent_app_date] => 2018-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4753
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15877418
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/877418 | Automatic detection of software that performs unauthorized privilege escalation | Jan 22, 2018 | Issued |
Array
(
[id] => 16281701
[patent_doc_number] => 10764755
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-01
[patent_title] => Systems and methods for providing wireless access security by interrogation
[patent_app_type] => utility
[patent_app_number] => 15/877274
[patent_app_country] => US
[patent_app_date] => 2018-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5473
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 329
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15877274
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/877274 | Systems and methods for providing wireless access security by interrogation | Jan 21, 2018 | Issued |
Array
(
[id] => 14448793
[patent_doc_number] => 20190182270
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-06-13
[patent_title] => SYSTEM AND METHOD FOR INQUIRING IOC INFORMATION BY P2P PROTOCOL
[patent_app_type] => utility
[patent_app_number] => 15/842330
[patent_app_country] => US
[patent_app_date] => 2017-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3227
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15842330
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/842330 | System and method for inquiring IOC information by P2P protocol | Dec 13, 2017 | Issued |
Array
(
[id] => 13351545
[patent_doc_number] => 20180227312
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-09
[patent_title] => Visitor Authorization Management Method and Apparatus, Terminal, Server, and Storage Medium
[patent_app_type] => utility
[patent_app_number] => 15/828332
[patent_app_country] => US
[patent_app_date] => 2017-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7341
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15828332
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/828332 | Visitor authorization management method and apparatus, terminal, server, and storage medium | Nov 29, 2017 | Issued |
Array
(
[id] => 13952715
[patent_doc_number] => 10212147
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-02-19
[patent_title] => Extending shrouding capability of hosting system
[patent_app_type] => utility
[patent_app_number] => 15/825223
[patent_app_country] => US
[patent_app_date] => 2017-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15589
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15825223
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/825223 | Extending shrouding capability of hosting system | Nov 28, 2017 | Issued |
Array
(
[id] => 12501483
[patent_doc_number] => 09998459
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-12
[patent_title] => End-to end protection for shrouded virtual servers
[patent_app_type] => utility
[patent_app_number] => 15/816220
[patent_app_country] => US
[patent_app_date] => 2017-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15593
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15816220
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/816220 | End-to end protection for shrouded virtual servers | Nov 16, 2017 | Issued |
Array
(
[id] => 16480477
[patent_doc_number] => 10855440
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-01
[patent_title] => Generating new encryption keys during a secure communication session
[patent_app_type] => utility
[patent_app_number] => 15/806471
[patent_app_country] => US
[patent_app_date] => 2017-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 11419
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15806471
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/806471 | Generating new encryption keys during a secure communication session | Nov 7, 2017 | Issued |
Array
(
[id] => 14709395
[patent_doc_number] => 10382470
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-13
[patent_title] => Interacting with a remote server over a network to determine whether to allow data exchange with a resource at the remote server
[patent_app_type] => utility
[patent_app_number] => 15/792754
[patent_app_country] => US
[patent_app_date] => 2017-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4931
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15792754
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/792754 | Interacting with a remote server over a network to determine whether to allow data exchange with a resource at the remote server | Oct 24, 2017 | Issued |
Array
(
[id] => 13190061
[patent_doc_number] => 10110573
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-23
[patent_title] => Packet-processing with CPPI DMA streaming interface ingress and egress ports
[patent_app_type] => utility
[patent_app_number] => 15/728035
[patent_app_country] => US
[patent_app_date] => 2017-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 23
[patent_no_of_words] => 32221
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15728035
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/728035 | Packet-processing with CPPI DMA streaming interface ingress and egress ports | Oct 8, 2017 | Issued |
Array
(
[id] => 13190153
[patent_doc_number] => 10110619
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-23
[patent_title] => Method and product for providing a predictive security product and evaluating existing security products
[patent_app_type] => utility
[patent_app_number] => 15/707973
[patent_app_country] => US
[patent_app_date] => 2017-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 8035
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15707973
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/707973 | Method and product for providing a predictive security product and evaluating existing security products | Sep 17, 2017 | Issued |
Array
(
[id] => 12123455
[patent_doc_number] => 20180007041
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-04
[patent_title] => 'EVENT DRIVEN SECOND FACTOR CREDENTIAL AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 15/706937
[patent_app_country] => US
[patent_app_date] => 2017-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7078
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15706937
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/706937 | Event driven second factor credential authentication | Sep 17, 2017 | Issued |
Array
(
[id] => 14081577
[patent_doc_number] => 20190089676
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-21
[patent_title] => SECURING DELEGATED CREDENTIALS IN THIRD-PARTY NETWORKS
[patent_app_type] => utility
[patent_app_number] => 15/707528
[patent_app_country] => US
[patent_app_date] => 2017-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5105
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15707528
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/707528 | Securing delegated credentials in third-party networks | Sep 17, 2017 | Issued |
Array
(
[id] => 14528161
[patent_doc_number] => 10341354
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-02
[patent_title] => Distributed high availability agent architecture
[patent_app_type] => utility
[patent_app_number] => 15/705590
[patent_app_country] => US
[patent_app_date] => 2017-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 22542
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15705590
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/705590 | Distributed high availability agent architecture | Sep 14, 2017 | Issued |
Array
(
[id] => 13512547
[patent_doc_number] => 20180307816
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-25
[patent_title] => FINGERPRINT IDENTIFICATION MODULE
[patent_app_type] => utility
[patent_app_number] => 15/705990
[patent_app_country] => US
[patent_app_date] => 2017-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4197
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15705990
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/705990 | FINGERPRINT IDENTIFICATION MODULE | Sep 14, 2017 | Abandoned |