
Charles A. Fox
Supervisory Patent Examiner (ID: 4147, Phone: (571)272-6923 , Office: P/3638 )
| Most Active Art Unit | 3652 |
| Art Unit(s) | 3652, 3655, 3618, 3638, 3658, 4147, 4154 |
| Total Applications | 844 |
| Issued Applications | 444 |
| Pending Applications | 37 |
| Abandoned Applications | 363 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10106027
[patent_doc_number] => 09141808
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-22
[patent_title] => 'Data loss prevention'
[patent_app_type] => utility
[patent_app_number] => 12/916193
[patent_app_country] => US
[patent_app_date] => 2010-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 6855
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12916193
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/916193 | Data loss prevention | Oct 28, 2010 | Issued |
Array
(
[id] => 9752514
[patent_doc_number] => 08844004
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-23
[patent_title] => 'Automatic user credentials for remote support'
[patent_app_type] => utility
[patent_app_number] => 12/916181
[patent_app_country] => US
[patent_app_date] => 2010-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6447
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12916181
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/916181 | Automatic user credentials for remote support | Oct 28, 2010 | Issued |
Array
(
[id] => 11831006
[patent_doc_number] => 09727751
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-08
[patent_title] => 'Method and apparatus for applying privacy policies to structured data'
[patent_app_type] => utility
[patent_app_number] => 12/916009
[patent_app_country] => US
[patent_app_date] => 2010-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 20
[patent_no_of_words] => 16503
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12916009
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/916009 | Method and apparatus for applying privacy policies to structured data | Oct 28, 2010 | Issued |
Array
(
[id] => 9405014
[patent_doc_number] => 08695079
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-04-08
[patent_title] => 'Allocating shared resources'
[patent_app_type] => utility
[patent_app_number] => 12/893169
[patent_app_country] => US
[patent_app_date] => 2010-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4866
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12893169
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/893169 | Allocating shared resources | Sep 28, 2010 | Issued |
Array
(
[id] => 9302394
[patent_doc_number] => 08650639
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-11
[patent_title] => 'System and method for hindering a cold boot attack'
[patent_app_type] => utility
[patent_app_number] => 12/893522
[patent_app_country] => US
[patent_app_date] => 2010-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2838
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12893522
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/893522 | System and method for hindering a cold boot attack | Sep 28, 2010 | Issued |
Array
(
[id] => 8059695
[patent_doc_number] => 20120079577
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-03-29
[patent_title] => 'VIDEO BROADCASTING TO MOBILE COMMUNICATION DEVICES'
[patent_app_type] => utility
[patent_app_number] => 12/893700
[patent_app_country] => US
[patent_app_date] => 2010-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7358
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0079/20120079577.pdf
[firstpage_image] =>[orig_patent_app_number] => 12893700
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/893700 | Video broadcasting to mobile communication devices | Sep 28, 2010 | Issued |
Array
(
[id] => 9230024
[patent_doc_number] => 08635707
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-01-21
[patent_title] => 'Managing object access'
[patent_app_type] => utility
[patent_app_number] => 12/893347
[patent_app_country] => US
[patent_app_date] => 2010-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 12627
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 295
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12893347
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/893347 | Managing object access | Sep 28, 2010 | Issued |
Array
(
[id] => 8945970
[patent_doc_number] => 08499157
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-07-30
[patent_title] => 'Device-based password management'
[patent_app_type] => utility
[patent_app_number] => 12/893684
[patent_app_country] => US
[patent_app_date] => 2010-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 3463
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 278
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12893684
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/893684 | Device-based password management | Sep 28, 2010 | Issued |
Array
(
[id] => 8810561
[patent_doc_number] => 08448228
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-05-21
[patent_title] => 'Separating authorization identity from policy enforcement identity'
[patent_app_type] => utility
[patent_app_number] => 12/893763
[patent_app_country] => US
[patent_app_date] => 2010-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 2
[patent_no_of_words] => 4553
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 360
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12893763
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/893763 | Separating authorization identity from policy enforcement identity | Sep 28, 2010 | Issued |
Array
(
[id] => 6126338
[patent_doc_number] => 20110078784
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-31
[patent_title] => 'VPN SYSTEM AND METHOD OF CONTROLLING OPERATION OF SAME'
[patent_app_type] => utility
[patent_app_number] => 12/893780
[patent_app_country] => US
[patent_app_date] => 2010-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4977
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0078/20110078784.pdf
[firstpage_image] =>[orig_patent_app_number] => 12893780
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/893780 | VPN SYSTEM AND METHOD OF CONTROLLING OPERATION OF SAME | Sep 28, 2010 | Abandoned |
Array
(
[id] => 8230265
[patent_doc_number] => 20120144474
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-07
[patent_title] => 'METHOD OF PROTECTING ACCESS TO DATA ON A NETWORK'
[patent_app_type] => utility
[patent_app_number] => 13/389528
[patent_app_country] => US
[patent_app_date] => 2010-08-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3774
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13389528
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/389528 | Method of protecting access to data on a network | Aug 17, 2010 | Issued |
Array
(
[id] => 9486857
[patent_doc_number] => 08732821
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-05-20
[patent_title] => 'Method and apparatus for preventing accidential disclosure of confidential information via visual representation objects'
[patent_app_type] => utility
[patent_app_number] => 12/724061
[patent_app_country] => US
[patent_app_date] => 2010-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6151
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12724061
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/724061 | Method and apparatus for preventing accidential disclosure of confidential information via visual representation objects | Mar 14, 2010 | Issued |
Array
(
[id] => 6589122
[patent_doc_number] => 20100235905
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-16
[patent_title] => 'REALIZATION OF ACCESS CONTROL CONDITIONS AS BOOLEAN EXPRESSIONS IN CREDENTIAL AUTHENTICATIONS'
[patent_app_type] => utility
[patent_app_number] => 12/724071
[patent_app_country] => US
[patent_app_date] => 2010-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7033
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20100235905.pdf
[firstpage_image] =>[orig_patent_app_number] => 12724071
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/724071 | Realization of access control conditions as boolean expressions in credential authentications | Mar 14, 2010 | Issued |
Array
(
[id] => 6589220
[patent_doc_number] => 20100235915
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-16
[patent_title] => 'USING HOST SYMPTOMS, HOST ROLES, AND/OR HOST REPUTATION FOR DETECTION OF HOST INFECTION'
[patent_app_type] => utility
[patent_app_number] => 12/723272
[patent_app_country] => US
[patent_app_date] => 2010-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 15698
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20100235915.pdf
[firstpage_image] =>[orig_patent_app_number] => 12723272
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/723272 | USING HOST SYMPTOMS, HOST ROLES, AND/OR HOST REPUTATION FOR DETECTION OF HOST INFECTION | Mar 11, 2010 | Abandoned |
Array
(
[id] => 6189841
[patent_doc_number] => 20110126286
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-26
[patent_title] => 'SILENT-MODE SIGNATURE TESTING IN ANTI-MALWARE PROCESSING'
[patent_app_type] => utility
[patent_app_number] => 12/721308
[patent_app_country] => US
[patent_app_date] => 2010-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 4095
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0126/20110126286.pdf
[firstpage_image] =>[orig_patent_app_number] => 12721308
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/721308 | Silent-mode signature testing in anti-malware processing | Mar 9, 2010 | Issued |
Array
(
[id] => 10126840
[patent_doc_number] => 09161217
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-13
[patent_title] => 'Method and system for authenticating in a communication system'
[patent_app_type] => utility
[patent_app_number] => 12/720972
[patent_app_country] => US
[patent_app_date] => 2010-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5530
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12720972
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/720972 | Method and system for authenticating in a communication system | Mar 9, 2010 | Issued |
Array
(
[id] => 10099158
[patent_doc_number] => 09135471
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-15
[patent_title] => 'System and method for encryption and decryption of data'
[patent_app_type] => utility
[patent_app_number] => 12/721355
[patent_app_country] => US
[patent_app_date] => 2010-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 2
[patent_no_of_words] => 6182
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12721355
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/721355 | System and method for encryption and decryption of data | Mar 9, 2010 | Issued |
Array
(
[id] => 9820910
[patent_doc_number] => 08930713
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-06
[patent_title] => 'System and method for general purpose encryption of data'
[patent_app_type] => utility
[patent_app_number] => 12/721334
[patent_app_country] => US
[patent_app_date] => 2010-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 2
[patent_no_of_words] => 6179
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12721334
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/721334 | System and method for general purpose encryption of data | Mar 9, 2010 | Issued |
Array
(
[id] => 9532788
[patent_doc_number] => 08756674
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-06-17
[patent_title] => 'System and methods for online authentication'
[patent_app_type] => utility
[patent_app_number] => 13/202387
[patent_app_country] => US
[patent_app_date] => 2010-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 21404
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13202387
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/202387 | System and methods for online authentication | Feb 18, 2010 | Issued |
Array
(
[id] => 6465911
[patent_doc_number] => 20100281540
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-11-04
[patent_title] => 'DETECTION OF CODE EXECUTION EXPLOITS'
[patent_app_type] => utility
[patent_app_number] => 12/627786
[patent_app_country] => US
[patent_app_date] => 2009-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9398
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0281/20100281540.pdf
[firstpage_image] =>[orig_patent_app_number] => 12627786
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/627786 | Detection of code execution exploits | Nov 29, 2009 | Issued |