Christina Ann Johnson
Supervisory Patent Examiner (ID: 5266, Phone: (571)272-1176 , Office: P/1742 )
Most Active Art Unit | 1725 |
Art Unit(s) | 1742, 1791, 1725, 1732, 1754 |
Total Applications | 736 |
Issued Applications | 453 |
Pending Applications | 43 |
Abandoned Applications | 240 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 5722714
[patent_doc_number] => 20060075491
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-04-06
[patent_title] => 'Network overload detection and mitigation system and method'
[patent_app_type] => utility
[patent_app_number] => 10/956721
[patent_app_country] => US
[patent_app_date] => 2004-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12304
[patent_no_of_claims] => 129
[patent_no_of_ind_claims] => 42
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0075/20060075491.pdf
[firstpage_image] =>[orig_patent_app_number] => 10956721
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/956721 | Network overload detection and mitigation system and method | Sep 30, 2004 | Issued |
Array
(
[id] => 350788
[patent_doc_number] => 07496758
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-02-24
[patent_title] => 'Method and apparatus for protecting an exponentiation calculation by means of the chinese remainder theorem (CRT)'
[patent_app_type] => utility
[patent_app_number] => 10/825625
[patent_app_country] => US
[patent_app_date] => 2004-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5310
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/496/07496758.pdf
[firstpage_image] =>[orig_patent_app_number] => 10825625
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/825625 | Method and apparatus for protecting an exponentiation calculation by means of the chinese remainder theorem (CRT) | Apr 14, 2004 | Issued |
Array
(
[id] => 7359327
[patent_doc_number] => 20040250169
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-12-09
[patent_title] => 'IDS log analysis support apparatus, IDS log analysis support method and IDS log analysis support program'
[patent_app_type] => new
[patent_app_number] => 10/824823
[patent_app_country] => US
[patent_app_date] => 2004-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9842
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 53
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0250/20040250169.pdf
[firstpage_image] =>[orig_patent_app_number] => 10824823
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/824823 | IDS log analysis support apparatus, IDS log analysis support method and IDS log analysis support program | Apr 13, 2004 | Abandoned |
Array
(
[id] => 347293
[patent_doc_number] => 07500264
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2009-03-03
[patent_title] => 'Use of packet hashes to prevent TCP retransmit overwrite attacks'
[patent_app_type] => utility
[patent_app_number] => 10/820327
[patent_app_country] => US
[patent_app_date] => 2004-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3708
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/500/07500264.pdf
[firstpage_image] =>[orig_patent_app_number] => 10820327
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/820327 | Use of packet hashes to prevent TCP retransmit overwrite attacks | Apr 7, 2004 | Issued |
Array
(
[id] => 6973906
[patent_doc_number] => 20050039038
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-02-17
[patent_title] => 'Method to secure service provider sensitive data'
[patent_app_type] => utility
[patent_app_number] => 10/809628
[patent_app_country] => US
[patent_app_date] => 2004-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3363
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0039/20050039038.pdf
[firstpage_image] =>[orig_patent_app_number] => 10809628
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/809628 | Method to secure service provider sensitive data | Mar 24, 2004 | Abandoned |
Array
(
[id] => 7112789
[patent_doc_number] => 20050210245
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-09-22
[patent_title] => 'Class of service method and system for use within a computing utility'
[patent_app_type] => utility
[patent_app_number] => 10/805026
[patent_app_country] => US
[patent_app_date] => 2004-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8575
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0210/20050210245.pdf
[firstpage_image] =>[orig_patent_app_number] => 10805026
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/805026 | Class of service method and system for use within a computing utility | Mar 18, 2004 | Abandoned |
Array
(
[id] => 7127635
[patent_doc_number] => 20050059379
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-03-17
[patent_title] => 'Method of initializing and using a security association for middleware based on physical proximity'
[patent_app_type] => utility
[patent_app_number] => 10/784215
[patent_app_country] => US
[patent_app_date] => 2004-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6884
[patent_no_of_claims] => 84
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0059/20050059379.pdf
[firstpage_image] =>[orig_patent_app_number] => 10784215
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/784215 | Method of initializing and using a security association for middleware based on physical proximity | Feb 23, 2004 | Issued |
Array
(
[id] => 7140373
[patent_doc_number] => 20050182801
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-08-18
[patent_title] => 'Synchronization reconciling in data storage library systems'
[patent_app_type] => utility
[patent_app_number] => 10/779218
[patent_app_country] => US
[patent_app_date] => 2004-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3840
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0182/20050182801.pdf
[firstpage_image] =>[orig_patent_app_number] => 10779218
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/779218 | Synchronization reconciling in data storage library systems | Feb 12, 2004 | Abandoned |
Array
(
[id] => 7174412
[patent_doc_number] => 20040078570
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-04-22
[patent_title] => 'Method of protecting a cryptosystem from a multiple transmission attack'
[patent_app_type] => new
[patent_app_number] => 10/297010
[patent_app_country] => US
[patent_app_date] => 2003-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 19698
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 26
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0078/20040078570.pdf
[firstpage_image] =>[orig_patent_app_number] => 10297010
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/297010 | Method of protecting a cryptosystem from a multiple transmission attack | Nov 17, 2003 | Abandoned |
Array
(
[id] => 7174454
[patent_doc_number] => 20040078576
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-04-22
[patent_title] => 'Pseudo-random number generator'
[patent_app_type] => new
[patent_app_number] => 10/297009
[patent_app_country] => US
[patent_app_date] => 2003-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 19674
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 23
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0078/20040078576.pdf
[firstpage_image] =>[orig_patent_app_number] => 10297009
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/297009 | Pseudo-random number generator | Nov 16, 2003 | Abandoned |
Array
(
[id] => 885747
[patent_doc_number] => 07356712
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-04-08
[patent_title] => 'Method of dynamically assigning network access priorities'
[patent_app_type] => utility
[patent_app_number] => 10/685425
[patent_app_country] => US
[patent_app_date] => 2003-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1763
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/356/07356712.pdf
[firstpage_image] =>[orig_patent_app_number] => 10685425
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/685425 | Method of dynamically assigning network access priorities | Oct 15, 2003 | Issued |
Array
(
[id] => 7280018
[patent_doc_number] => 20040062395
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-04-01
[patent_title] => 'Receiver for digital broadcast programs in accordance with receiver profile, and billing method therefor'
[patent_app_type] => new
[patent_app_number] => 10/661529
[patent_app_country] => US
[patent_app_date] => 2003-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3935
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 50
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0062/20040062395.pdf
[firstpage_image] =>[orig_patent_app_number] => 10661529
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/661529 | Receiver for digital broadcast programs in accordance with receiver profile, and billing method therefor | Sep 14, 2003 | Abandoned |
Array
(
[id] => 248854
[patent_doc_number] => 07587615
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-09-08
[patent_title] => 'Utilizing hardware transactional approach to execute code after initially utilizing software locking by employing pseudo-transactions'
[patent_app_type] => utility
[patent_app_number] => 10/661017
[patent_app_country] => US
[patent_app_date] => 2003-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 6231
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/587/07587615.pdf
[firstpage_image] =>[orig_patent_app_number] => 10661017
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/661017 | Utilizing hardware transactional approach to execute code after initially utilizing software locking by employing pseudo-transactions | Sep 11, 2003 | Issued |
Array
(
[id] => 7367688
[patent_doc_number] => 20040015693
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-01-22
[patent_title] => 'Communication apparatus communication system and communication method'
[patent_app_type] => new
[patent_app_number] => 10/398910
[patent_app_country] => US
[patent_app_date] => 2003-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8936
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0015/20040015693.pdf
[firstpage_image] =>[orig_patent_app_number] => 10398910
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/398910 | Communication apparatus communication system and communication method | Aug 11, 2003 | Abandoned |
Array
(
[id] => 877661
[patent_doc_number] => 07363515
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-04-22
[patent_title] => 'Control systems and methods using a partially-observable markov decision process (PO-MDP)'
[patent_app_type] => utility
[patent_app_number] => 10/638818
[patent_app_country] => US
[patent_app_date] => 2003-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 14
[patent_no_of_words] => 13107
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/363/07363515.pdf
[firstpage_image] =>[orig_patent_app_number] => 10638818
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/638818 | Control systems and methods using a partially-observable markov decision process (PO-MDP) | Aug 10, 2003 | Issued |
Array
(
[id] => 903234
[patent_doc_number] => 07340053
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-03-04
[patent_title] => 'Cipher strength estimating device'
[patent_app_type] => utility
[patent_app_number] => 10/622722
[patent_app_country] => US
[patent_app_date] => 2003-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5940
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 447
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/340/07340053.pdf
[firstpage_image] =>[orig_patent_app_number] => 10622722
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/622722 | Cipher strength estimating device | Jul 17, 2003 | Issued |
Array
(
[id] => 7449560
[patent_doc_number] => 20040268142
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-12-30
[patent_title] => 'Method of implementing secure access'
[patent_app_type] => new
[patent_app_number] => 10/608818
[patent_app_country] => US
[patent_app_date] => 2003-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 36
[patent_figures_cnt] => 36
[patent_no_of_words] => 12141
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0268/20040268142.pdf
[firstpage_image] =>[orig_patent_app_number] => 10608818
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/608818 | Method of implementing secure access | Jun 29, 2003 | Issued |
Array
(
[id] => 7449550
[patent_doc_number] => 20040268141
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-12-30
[patent_title] => 'Methods and apparatus to provide secure firmware storage and service access'
[patent_app_type] => new
[patent_app_number] => 10/608326
[patent_app_country] => US
[patent_app_date] => 2003-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5287
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 61
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0268/20040268141.pdf
[firstpage_image] =>[orig_patent_app_number] => 10608326
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/608326 | Methods and apparatus to provide secure firmware storage and service access | Jun 26, 2003 | Issued |
Array
(
[id] => 7021710
[patent_doc_number] => 20050223241
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-06
[patent_title] => 'Semiconductor intergrated circuit device, data storage verification device, and data storage verification method'
[patent_app_type] => utility
[patent_app_number] => 10/517258
[patent_app_country] => US
[patent_app_date] => 2003-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 14970
[patent_no_of_claims] => 50
[patent_no_of_ind_claims] => 22
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0223/20050223241.pdf
[firstpage_image] =>[orig_patent_app_number] => 10517258
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/517258 | Semiconductor intergrated circuit device, data storage verification device, and data storage verification method | Jun 12, 2003 | Abandoned |
Array
(
[id] => 882284
[patent_doc_number] => 07360092
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2008-04-15
[patent_title] => 'Marking and identifying web-based authentication forms'
[patent_app_type] => utility
[patent_app_number] => 10/424305
[patent_app_country] => US
[patent_app_date] => 2003-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 5978
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/360/07360092.pdf
[firstpage_image] =>[orig_patent_app_number] => 10424305
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/424305 | Marking and identifying web-based authentication forms | Apr 27, 2003 | Issued |