
Christopher Mark Atkinson
Examiner (ID: 977)
| Most Active Art Unit | 3743 |
| Art Unit(s) | 3743, 3407, 3753, 3406 |
| Total Applications | 817 |
| Issued Applications | 555 |
| Pending Applications | 72 |
| Abandoned Applications | 190 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9200776
[patent_doc_number] => 20130340092
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-19
[patent_title] => 'SOFTWARE LICENCE CONTROL'
[patent_app_type] => utility
[patent_app_number] => 14/001542
[patent_app_country] => US
[patent_app_date] => 2011-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5859
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14001542
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/001542 | Software license control | Mar 20, 2011 | Issued |
Array
(
[id] => 9999318
[patent_doc_number] => 09043936
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-05-26
[patent_title] => 'Communications device'
[patent_app_type] => utility
[patent_app_number] => 13/576509
[patent_app_country] => US
[patent_app_date] => 2011-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 5292
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13576509
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/576509 | Communications device | Mar 15, 2011 | Issued |
Array
(
[id] => 13227223
[patent_doc_number] => 10127387
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-13
[patent_title] => Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme
[patent_app_type] => utility
[patent_app_number] => 14/004979
[patent_app_country] => US
[patent_app_date] => 2011-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 4158
[patent_no_of_claims] => 48
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14004979
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/004979 | Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme | Mar 14, 2011 | Abandoned |
Array
(
[id] => 10059339
[patent_doc_number] => 09098700
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-04
[patent_title] => 'Systems and methods for detecting attacks against a digital circuit'
[patent_app_type] => utility
[patent_app_number] => 13/580121
[patent_app_country] => US
[patent_app_date] => 2011-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 16
[patent_no_of_words] => 10682
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 521
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13580121
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/580121 | Systems and methods for detecting attacks against a digital circuit | Feb 27, 2011 | Issued |
Array
(
[id] => 9457262
[patent_doc_number] => 08718280
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-05-06
[patent_title] => 'Securing keys of a cipher using properties of the cipher process'
[patent_app_type] => utility
[patent_app_number] => 12/972145
[patent_app_country] => US
[patent_app_date] => 2010-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6532
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12972145
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/972145 | Securing keys of a cipher using properties of the cipher process | Dec 16, 2010 | Issued |
Array
(
[id] => 9302379
[patent_doc_number] => 08650624
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-11
[patent_title] => 'Obscuring visual login'
[patent_app_type] => utility
[patent_app_number] => 12/969797
[patent_app_country] => US
[patent_app_date] => 2010-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 9632
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12969797
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/969797 | Obscuring visual login | Dec 15, 2010 | Issued |
Array
(
[id] => 8255317
[patent_doc_number] => 20120159640
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-21
[patent_title] => 'Acquiring Access To A Token Controlled System Resource'
[patent_app_type] => utility
[patent_app_number] => 12/969634
[patent_app_country] => US
[patent_app_date] => 2010-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6520
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0159/20120159640.pdf
[firstpage_image] =>[orig_patent_app_number] => 12969634
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/969634 | Acquiring access to a token controlled system resource | Dec 15, 2010 | Issued |
Array
(
[id] => 9527842
[patent_doc_number] => 08752133
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-06-10
[patent_title] => 'Security control system and method for personal communication terminals'
[patent_app_type] => utility
[patent_app_number] => 12/970895
[patent_app_country] => US
[patent_app_date] => 2010-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4463
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12970895
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/970895 | Security control system and method for personal communication terminals | Dec 15, 2010 | Issued |
Array
(
[id] => 9302390
[patent_doc_number] => 08650635
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-11
[patent_title] => 'Pressure sensitive multi-layer passwords'
[patent_app_type] => utility
[patent_app_number] => 12/969646
[patent_app_country] => US
[patent_app_date] => 2010-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 9497
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 206
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12969646
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/969646 | Pressure sensitive multi-layer passwords | Dec 15, 2010 | Issued |
Array
(
[id] => 10126146
[patent_doc_number] => 09160522
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-13
[patent_title] => 'System and method for verifying the identity of an individual by employing biometric data features associated with the individual'
[patent_app_type] => utility
[patent_app_number] => 13/516082
[patent_app_country] => US
[patent_app_date] => 2010-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4555
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 286
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13516082
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/516082 | System and method for verifying the identity of an individual by employing biometric data features associated with the individual | Dec 14, 2010 | Issued |
Array
(
[id] => 6088853
[patent_doc_number] => 20110145905
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-16
[patent_title] => 'APPARATUS AND METHOD FOR MANAGING WEB BASED SERVICE ACCOUNT'
[patent_app_type] => utility
[patent_app_number] => 12/969108
[patent_app_country] => US
[patent_app_date] => 2010-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3096
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0145/20110145905.pdf
[firstpage_image] =>[orig_patent_app_number] => 12969108
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/969108 | Apparatus and method for managing web based service account | Dec 14, 2010 | Issued |
Array
(
[id] => 8970603
[patent_doc_number] => 08509426
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-08-13
[patent_title] => 'XZ-elliptic curve cryptography system and method'
[patent_app_type] => utility
[patent_app_number] => 12/958273
[patent_app_country] => US
[patent_app_date] => 2010-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 12625
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12958273
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/958273 | XZ-elliptic curve cryptography system and method | Nov 30, 2010 | Issued |
Array
(
[id] => 8467142
[patent_doc_number] => 20120272311
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-25
[patent_title] => 'METHOD FOR AUTHENTICATING A USER ON A COMPUTING UNIT'
[patent_app_type] => utility
[patent_app_number] => 13/508134
[patent_app_country] => US
[patent_app_date] => 2010-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7510
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13508134
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/508134 | METHOD FOR AUTHENTICATING A USER ON A COMPUTING UNIT | Oct 28, 2010 | Abandoned |
Array
(
[id] => 11247462
[patent_doc_number] => 09473518
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-18
[patent_title] => 'Securing network communications with logical partitions'
[patent_app_type] => utility
[patent_app_number] => 12/910140
[patent_app_country] => US
[patent_app_date] => 2010-10-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3848
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12910140
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/910140 | Securing network communications with logical partitions | Oct 21, 2010 | Issued |
Array
(
[id] => 6040909
[patent_doc_number] => 20110093958
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-04-21
[patent_title] => 'Secure Data Storage Apparatus and Method'
[patent_app_type] => utility
[patent_app_number] => 12/909725
[patent_app_country] => US
[patent_app_date] => 2010-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 3578
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0093/20110093958.pdf
[firstpage_image] =>[orig_patent_app_number] => 12909725
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/909725 | Secure Data Storage Apparatus and Method | Oct 20, 2010 | Abandoned |
Array
(
[id] => 5957325
[patent_doc_number] => 20110035801
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-02-10
[patent_title] => 'METHOD, NETWORK DEVICE, AND NETWORK SYSTEM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACK'
[patent_app_type] => utility
[patent_app_number] => 12/908679
[patent_app_country] => US
[patent_app_date] => 2010-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3354
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0035/20110035801.pdf
[firstpage_image] =>[orig_patent_app_number] => 12908679
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/908679 | METHOD, NETWORK DEVICE, AND NETWORK SYSTEM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACK | Oct 19, 2010 | Abandoned |
Array
(
[id] => 8144015
[patent_doc_number] => 20120096553
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-19
[patent_title] => 'Social Engineering Protection Appliance'
[patent_app_type] => utility
[patent_app_number] => 12/907721
[patent_app_country] => US
[patent_app_date] => 2010-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6428
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0096/20120096553.pdf
[firstpage_image] =>[orig_patent_app_number] => 12907721
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/907721 | Social engineering protection appliance | Oct 18, 2010 | Issued |
Array
(
[id] => 8143983
[patent_doc_number] => 20120096538
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-19
[patent_title] => 'DYNAMIC MOBILE STREAMING APPLICATION SUPPRESSION'
[patent_app_type] => utility
[patent_app_number] => 12/905849
[patent_app_country] => US
[patent_app_date] => 2010-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6955
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0096/20120096538.pdf
[firstpage_image] =>[orig_patent_app_number] => 12905849
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/905849 | Dynamic mobile streaming application suppression | Oct 14, 2010 | Issued |
Array
(
[id] => 6211693
[patent_doc_number] => 20110135097
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-09
[patent_title] => 'Updating Encryption Keys in a Radio Communication System'
[patent_app_type] => utility
[patent_app_number] => 12/904268
[patent_app_country] => US
[patent_app_date] => 2010-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 3357
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0135/20110135097.pdf
[firstpage_image] =>[orig_patent_app_number] => 12904268
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/904268 | Updating Encryption Keys in a Radio Communication System | Oct 13, 2010 | Abandoned |
Array
(
[id] => 9578863
[patent_doc_number] => 08769299
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-07-01
[patent_title] => 'License utilization management system license wrapper'
[patent_app_type] => utility
[patent_app_number] => 12/903580
[patent_app_country] => US
[patent_app_date] => 2010-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7292
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12903580
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/903580 | License utilization management system license wrapper | Oct 12, 2010 | Issued |