Search

Charles A. Fox

Supervisory Patent Examiner (ID: 4147, Phone: (571)272-6923 , Office: P/3638 )

Most Active Art Unit
3652
Art Unit(s)
3652, 3655, 3618, 3638, 3658, 4147, 4154
Total Applications
844
Issued Applications
444
Pending Applications
37
Abandoned Applications
363

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 5363219 [patent_doc_number] => 20090038013 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-02-05 [patent_title] => 'WIRELESS COMMUNICATION SECURITY WHEN USING KNOWN LINK KEYS' [patent_app_type] => utility [patent_app_number] => 11/831324 [patent_app_country] => US [patent_app_date] => 2007-07-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 6283 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0038/20090038013.pdf [firstpage_image] =>[orig_patent_app_number] => 11831324 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/831324
WIRELESS COMMUNICATION SECURITY WHEN USING KNOWN LINK KEYS Jul 30, 2007 Abandoned
Array ( [id] => 8308937 [patent_doc_number] => 08230490 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-07-24 [patent_title] => 'System and method for authentication of users in a secure computer system' [patent_app_type] => utility [patent_app_number] => 11/830968 [patent_app_country] => US [patent_app_date] => 2007-07-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 5921 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 360 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11830968 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/830968
System and method for authentication of users in a secure computer system Jul 30, 2007 Issued
Array ( [id] => 9315212 [patent_doc_number] => 08656449 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-02-18 [patent_title] => 'Applying policy attributes to events' [patent_app_type] => utility [patent_app_number] => 11/830466 [patent_app_country] => US [patent_app_date] => 2007-07-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 4854 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 226 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11830466 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/830466
Applying policy attributes to events Jul 29, 2007 Issued
Array ( [id] => 5351882 [patent_doc_number] => 20090007243 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-01 [patent_title] => 'METHOD FOR RENDERING PASSWORD THEFT INEFFECTIVE' [patent_app_type] => utility [patent_app_number] => 11/769361 [patent_app_country] => US [patent_app_date] => 2007-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3463 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0007/20090007243.pdf [firstpage_image] =>[orig_patent_app_number] => 11769361 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/769361
METHOD FOR RENDERING PASSWORD THEFT INEFFECTIVE Jun 26, 2007 Abandoned
Array ( [id] => 8946144 [patent_doc_number] => 08499331 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-07-30 [patent_title] => 'Policy based network compliance' [patent_app_type] => utility [patent_app_number] => 11/769407 [patent_app_country] => US [patent_app_date] => 2007-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 6114 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 350 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11769407 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/769407
Policy based network compliance Jun 26, 2007 Issued
Array ( [id] => 5369928 [patent_doc_number] => 20090307487 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-12-10 [patent_title] => 'APPARATUS AND METHOD FOR PERFORMING TRUSTED COMPUTING INTEGRITY MEASUREMENT REPORTING' [patent_app_type] => utility [patent_app_number] => 12/297966 [patent_app_country] => US [patent_app_date] => 2007-04-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6840 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0307/20090307487.pdf [firstpage_image] =>[orig_patent_app_number] => 12297966 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/297966
Apparatus and method for performing trusted computing integrity measurement reporting Apr 22, 2007 Issued
Array ( [id] => 4826689 [patent_doc_number] => 20080229420 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-09-18 [patent_title] => 'Predictive Assessment of Network Risks' [patent_app_type] => utility [patent_app_number] => 11/694659 [patent_app_country] => US [patent_app_date] => 2007-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 7489 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0229/20080229420.pdf [firstpage_image] =>[orig_patent_app_number] => 11694659 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/694659
Predictive assessment of network risks Mar 29, 2007 Issued
Array ( [id] => 5090132 [patent_doc_number] => 20070229771 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-10-04 [patent_title] => 'PROJECTOR SYSTEM' [patent_app_type] => utility [patent_app_number] => 11/694363 [patent_app_country] => US [patent_app_date] => 2007-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 13577 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0229/20070229771.pdf [firstpage_image] =>[orig_patent_app_number] => 11694363 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/694363
Projector system Mar 29, 2007 Issued
Array ( [id] => 4847633 [patent_doc_number] => 20080184041 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-07-31 [patent_title] => 'Graph-Based Tamper Resistance Modeling For Software Protection' [patent_app_type] => utility [patent_app_number] => 11/694695 [patent_app_country] => US [patent_app_date] => 2007-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 7741 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0184/20080184041.pdf [firstpage_image] =>[orig_patent_app_number] => 11694695 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/694695
Graph-Based Tamper Resistance Modeling For Software Protection Mar 29, 2007 Abandoned
Array ( [id] => 4723421 [patent_doc_number] => 20080244721 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-10-02 [patent_title] => 'Techniques for Sharing Data' [patent_app_type] => utility [patent_app_number] => 11/694327 [patent_app_country] => US [patent_app_date] => 2007-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 11602 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0244/20080244721.pdf [firstpage_image] =>[orig_patent_app_number] => 11694327 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/694327
Techniques for sharing data Mar 29, 2007 Issued
11/694156 SYSTEMS AND METHODS FOR VETTING AND AUTHENTICATING THE IDENTITY OF AN AVATAR Mar 29, 2007 Abandoned
Array ( [id] => 10113013 [patent_doc_number] => 09148437 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-09-29 [patent_title] => 'Detecting adverse network conditions for a third-party network site' [patent_app_type] => utility [patent_app_number] => 11/694814 [patent_app_country] => US [patent_app_date] => 2007-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9057 [patent_no_of_claims] => 40 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 309 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11694814 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/694814
Detecting adverse network conditions for a third-party network site Mar 29, 2007 Issued
Array ( [id] => 10107725 [patent_doc_number] => 09143516 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-09-22 [patent_title] => 'Protecting a network site during adverse network conditions' [patent_app_type] => utility [patent_app_number] => 11/694858 [patent_app_country] => US [patent_app_date] => 2007-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 8968 [patent_no_of_claims] => 47 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 243 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11694858 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/694858
Protecting a network site during adverse network conditions Mar 29, 2007 Issued
Array ( [id] => 4684273 [patent_doc_number] => 20080250499 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-10-09 [patent_title] => 'Method and Apparatus for Reducing Buffer Overflow Exploits by Computer Viruses' [patent_app_type] => utility [patent_app_number] => 11/694672 [patent_app_country] => US [patent_app_date] => 2007-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2726 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0250/20080250499.pdf [firstpage_image] =>[orig_patent_app_number] => 11694672 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/694672
Method and Apparatus for Reducing Buffer Overflow Exploits by Computer Viruses Mar 29, 2007 Abandoned
Array ( [id] => 8936019 [patent_doc_number] => 08495741 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-07-23 [patent_title] => 'Remediating malware infections through obfuscation' [patent_app_type] => utility [patent_app_number] => 11/694711 [patent_app_country] => US [patent_app_date] => 2007-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3539 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 181 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11694711 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/694711
Remediating malware infections through obfuscation Mar 29, 2007 Issued
Array ( [id] => 9666180 [patent_doc_number] => 08813191 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-08-19 [patent_title] => 'Method and apparatus for controlling the number of devices installed in an authorized domain' [patent_app_type] => utility [patent_app_number] => 12/223882 [patent_app_country] => US [patent_app_date] => 2007-02-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 5958 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 227 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12223882 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/223882
Method and apparatus for controlling the number of devices installed in an authorized domain Feb 14, 2007 Issued
Array ( [id] => 4766506 [patent_doc_number] => 20080177718 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-07-24 [patent_title] => 'User Interface with Fields for Entries to be Applied to Heterogeneous Processes' [patent_app_type] => utility [patent_app_number] => 11/625824 [patent_app_country] => US [patent_app_date] => 2007-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 4419 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0177/20080177718.pdf [firstpage_image] =>[orig_patent_app_number] => 11625824 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/625824
User Interface with Fields for Entries to be Applied to Heterogeneous Processes Jan 22, 2007 Abandoned
Array ( [id] => 4744824 [patent_doc_number] => 20080089426 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-04-17 [patent_title] => 'METHOD FOR MAPPING MEMORY ADDRESSES, MEMORY ACCESSING APPARATUS AND METHOD THEREOF' [patent_app_type] => utility [patent_app_number] => 11/625827 [patent_app_country] => US [patent_app_date] => 2007-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 27 [patent_figures_cnt] => 27 [patent_no_of_words] => 6944 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0089/20080089426.pdf [firstpage_image] =>[orig_patent_app_number] => 11625827 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/625827
Method for mapping memory addresses, memory accessing apparatus and method thereof Jan 22, 2007 Issued
Array ( [id] => 9577409 [patent_doc_number] => 08767839 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-07-01 [patent_title] => 'Error filter to differentiate between reverse link and forward link video data errors' [patent_app_type] => utility [patent_app_number] => 11/625787 [patent_app_country] => US [patent_app_date] => 2007-01-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 8667 [patent_no_of_claims] => 31 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 156 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11625787 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/625787
Error filter to differentiate between reverse link and forward link video data errors Jan 21, 2007 Issued
Array ( [id] => 5176608 [patent_doc_number] => 20070177667 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-08-02 [patent_title] => 'METHOD AND APPARATUS FOR ERROR RESILIENCE ALGORITHMS IN WIRELESS VIDEO COMMUNICATION' [patent_app_type] => utility [patent_app_number] => 11/624614 [patent_app_country] => US [patent_app_date] => 2007-01-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 11323 [patent_no_of_claims] => 45 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0177/20070177667.pdf [firstpage_image] =>[orig_patent_app_number] => 11624614 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/624614
Method and apparatus for error resilience algorithms in wireless video communication Jan 17, 2007 Issued
Menu