
Charles A. Fox
Supervisory Patent Examiner (ID: 4147, Phone: (571)272-6923 , Office: P/3638 )
| Most Active Art Unit | 3652 |
| Art Unit(s) | 3652, 3655, 3618, 3638, 3658, 4147, 4154 |
| Total Applications | 844 |
| Issued Applications | 444 |
| Pending Applications | 37 |
| Abandoned Applications | 363 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 5363219
[patent_doc_number] => 20090038013
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-02-05
[patent_title] => 'WIRELESS COMMUNICATION SECURITY WHEN USING KNOWN LINK KEYS'
[patent_app_type] => utility
[patent_app_number] => 11/831324
[patent_app_country] => US
[patent_app_date] => 2007-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 6283
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0038/20090038013.pdf
[firstpage_image] =>[orig_patent_app_number] => 11831324
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/831324 | WIRELESS COMMUNICATION SECURITY WHEN USING KNOWN LINK KEYS | Jul 30, 2007 | Abandoned |
Array
(
[id] => 8308937
[patent_doc_number] => 08230490
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-07-24
[patent_title] => 'System and method for authentication of users in a secure computer system'
[patent_app_type] => utility
[patent_app_number] => 11/830968
[patent_app_country] => US
[patent_app_date] => 2007-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 5921
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 360
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11830968
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/830968 | System and method for authentication of users in a secure computer system | Jul 30, 2007 | Issued |
Array
(
[id] => 9315212
[patent_doc_number] => 08656449
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-02-18
[patent_title] => 'Applying policy attributes to events'
[patent_app_type] => utility
[patent_app_number] => 11/830466
[patent_app_country] => US
[patent_app_date] => 2007-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 4854
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11830466
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/830466 | Applying policy attributes to events | Jul 29, 2007 | Issued |
Array
(
[id] => 5351882
[patent_doc_number] => 20090007243
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-01-01
[patent_title] => 'METHOD FOR RENDERING PASSWORD THEFT INEFFECTIVE'
[patent_app_type] => utility
[patent_app_number] => 11/769361
[patent_app_country] => US
[patent_app_date] => 2007-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3463
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0007/20090007243.pdf
[firstpage_image] =>[orig_patent_app_number] => 11769361
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/769361 | METHOD FOR RENDERING PASSWORD THEFT INEFFECTIVE | Jun 26, 2007 | Abandoned |
Array
(
[id] => 8946144
[patent_doc_number] => 08499331
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-07-30
[patent_title] => 'Policy based network compliance'
[patent_app_type] => utility
[patent_app_number] => 11/769407
[patent_app_country] => US
[patent_app_date] => 2007-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 6114
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 350
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11769407
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/769407 | Policy based network compliance | Jun 26, 2007 | Issued |
Array
(
[id] => 5369928
[patent_doc_number] => 20090307487
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-10
[patent_title] => 'APPARATUS AND METHOD FOR PERFORMING TRUSTED COMPUTING INTEGRITY MEASUREMENT REPORTING'
[patent_app_type] => utility
[patent_app_number] => 12/297966
[patent_app_country] => US
[patent_app_date] => 2007-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6840
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0307/20090307487.pdf
[firstpage_image] =>[orig_patent_app_number] => 12297966
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/297966 | Apparatus and method for performing trusted computing integrity measurement reporting | Apr 22, 2007 | Issued |
Array
(
[id] => 4826689
[patent_doc_number] => 20080229420
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-09-18
[patent_title] => 'Predictive Assessment of Network Risks'
[patent_app_type] => utility
[patent_app_number] => 11/694659
[patent_app_country] => US
[patent_app_date] => 2007-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7489
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0229/20080229420.pdf
[firstpage_image] =>[orig_patent_app_number] => 11694659
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/694659 | Predictive assessment of network risks | Mar 29, 2007 | Issued |
Array
(
[id] => 5090132
[patent_doc_number] => 20070229771
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-10-04
[patent_title] => 'PROJECTOR SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 11/694363
[patent_app_country] => US
[patent_app_date] => 2007-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 13577
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0229/20070229771.pdf
[firstpage_image] =>[orig_patent_app_number] => 11694363
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/694363 | Projector system | Mar 29, 2007 | Issued |
Array
(
[id] => 4847633
[patent_doc_number] => 20080184041
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-07-31
[patent_title] => 'Graph-Based Tamper Resistance Modeling For Software Protection'
[patent_app_type] => utility
[patent_app_number] => 11/694695
[patent_app_country] => US
[patent_app_date] => 2007-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7741
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0184/20080184041.pdf
[firstpage_image] =>[orig_patent_app_number] => 11694695
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/694695 | Graph-Based Tamper Resistance Modeling For Software Protection | Mar 29, 2007 | Abandoned |
Array
(
[id] => 4723421
[patent_doc_number] => 20080244721
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-10-02
[patent_title] => 'Techniques for Sharing Data'
[patent_app_type] => utility
[patent_app_number] => 11/694327
[patent_app_country] => US
[patent_app_date] => 2007-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11602
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0244/20080244721.pdf
[firstpage_image] =>[orig_patent_app_number] => 11694327
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/694327 | Techniques for sharing data | Mar 29, 2007 | Issued |
| 11/694156 | SYSTEMS AND METHODS FOR VETTING AND AUTHENTICATING THE IDENTITY OF AN AVATAR | Mar 29, 2007 | Abandoned |
Array
(
[id] => 10113013
[patent_doc_number] => 09148437
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-29
[patent_title] => 'Detecting adverse network conditions for a third-party network site'
[patent_app_type] => utility
[patent_app_number] => 11/694814
[patent_app_country] => US
[patent_app_date] => 2007-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9057
[patent_no_of_claims] => 40
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 309
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11694814
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/694814 | Detecting adverse network conditions for a third-party network site | Mar 29, 2007 | Issued |
Array
(
[id] => 10107725
[patent_doc_number] => 09143516
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-22
[patent_title] => 'Protecting a network site during adverse network conditions'
[patent_app_type] => utility
[patent_app_number] => 11/694858
[patent_app_country] => US
[patent_app_date] => 2007-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8968
[patent_no_of_claims] => 47
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 243
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11694858
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/694858 | Protecting a network site during adverse network conditions | Mar 29, 2007 | Issued |
Array
(
[id] => 4684273
[patent_doc_number] => 20080250499
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-10-09
[patent_title] => 'Method and Apparatus for Reducing Buffer Overflow Exploits by Computer Viruses'
[patent_app_type] => utility
[patent_app_number] => 11/694672
[patent_app_country] => US
[patent_app_date] => 2007-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2726
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0250/20080250499.pdf
[firstpage_image] =>[orig_patent_app_number] => 11694672
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/694672 | Method and Apparatus for Reducing Buffer Overflow Exploits by Computer Viruses | Mar 29, 2007 | Abandoned |
Array
(
[id] => 8936019
[patent_doc_number] => 08495741
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-07-23
[patent_title] => 'Remediating malware infections through obfuscation'
[patent_app_type] => utility
[patent_app_number] => 11/694711
[patent_app_country] => US
[patent_app_date] => 2007-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3539
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11694711
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/694711 | Remediating malware infections through obfuscation | Mar 29, 2007 | Issued |
Array
(
[id] => 9666180
[patent_doc_number] => 08813191
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-08-19
[patent_title] => 'Method and apparatus for controlling the number of devices installed in an authorized domain'
[patent_app_type] => utility
[patent_app_number] => 12/223882
[patent_app_country] => US
[patent_app_date] => 2007-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 5958
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 227
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12223882
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/223882 | Method and apparatus for controlling the number of devices installed in an authorized domain | Feb 14, 2007 | Issued |
Array
(
[id] => 4766506
[patent_doc_number] => 20080177718
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-07-24
[patent_title] => 'User Interface with Fields for Entries to be Applied to Heterogeneous Processes'
[patent_app_type] => utility
[patent_app_number] => 11/625824
[patent_app_country] => US
[patent_app_date] => 2007-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 4419
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0177/20080177718.pdf
[firstpage_image] =>[orig_patent_app_number] => 11625824
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/625824 | User Interface with Fields for Entries to be Applied to Heterogeneous Processes | Jan 22, 2007 | Abandoned |
Array
(
[id] => 4744824
[patent_doc_number] => 20080089426
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-04-17
[patent_title] => 'METHOD FOR MAPPING MEMORY ADDRESSES, MEMORY ACCESSING APPARATUS AND METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 11/625827
[patent_app_country] => US
[patent_app_date] => 2007-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 6944
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0089/20080089426.pdf
[firstpage_image] =>[orig_patent_app_number] => 11625827
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/625827 | Method for mapping memory addresses, memory accessing apparatus and method thereof | Jan 22, 2007 | Issued |
Array
(
[id] => 9577409
[patent_doc_number] => 08767839
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-01
[patent_title] => 'Error filter to differentiate between reverse link and forward link video data errors'
[patent_app_type] => utility
[patent_app_number] => 11/625787
[patent_app_country] => US
[patent_app_date] => 2007-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8667
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11625787
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/625787 | Error filter to differentiate between reverse link and forward link video data errors | Jan 21, 2007 | Issued |
Array
(
[id] => 5176608
[patent_doc_number] => 20070177667
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-08-02
[patent_title] => 'METHOD AND APPARATUS FOR ERROR RESILIENCE ALGORITHMS IN WIRELESS VIDEO COMMUNICATION'
[patent_app_type] => utility
[patent_app_number] => 11/624614
[patent_app_country] => US
[patent_app_date] => 2007-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 11323
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0177/20070177667.pdf
[firstpage_image] =>[orig_patent_app_number] => 11624614
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/624614 | Method and apparatus for error resilience algorithms in wireless video communication | Jan 17, 2007 | Issued |