Search

Christopher Mark Atkinson

Examiner (ID: 977)

Most Active Art Unit
3743
Art Unit(s)
3743, 3407, 3753, 3406
Total Applications
817
Issued Applications
555
Pending Applications
72
Abandoned Applications
190

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9200776 [patent_doc_number] => 20130340092 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-12-19 [patent_title] => 'SOFTWARE LICENCE CONTROL' [patent_app_type] => utility [patent_app_number] => 14/001542 [patent_app_country] => US [patent_app_date] => 2011-03-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5859 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14001542 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/001542
Software license control Mar 20, 2011 Issued
Array ( [id] => 9999318 [patent_doc_number] => 09043936 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-05-26 [patent_title] => 'Communications device' [patent_app_type] => utility [patent_app_number] => 13/576509 [patent_app_country] => US [patent_app_date] => 2011-03-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 5292 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 113 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13576509 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/576509
Communications device Mar 15, 2011 Issued
Array ( [id] => 13227223 [patent_doc_number] => 10127387 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-11-13 [patent_title] => Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme [patent_app_type] => utility [patent_app_number] => 14/004979 [patent_app_country] => US [patent_app_date] => 2011-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 6 [patent_no_of_words] => 4158 [patent_no_of_claims] => 48 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 138 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14004979 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/004979
Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme Mar 14, 2011 Abandoned
Array ( [id] => 10059339 [patent_doc_number] => 09098700 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-08-04 [patent_title] => 'Systems and methods for detecting attacks against a digital circuit' [patent_app_type] => utility [patent_app_number] => 13/580121 [patent_app_country] => US [patent_app_date] => 2011-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 16 [patent_no_of_words] => 10682 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 521 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13580121 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/580121
Systems and methods for detecting attacks against a digital circuit Feb 27, 2011 Issued
Array ( [id] => 9457262 [patent_doc_number] => 08718280 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-05-06 [patent_title] => 'Securing keys of a cipher using properties of the cipher process' [patent_app_type] => utility [patent_app_number] => 12/972145 [patent_app_country] => US [patent_app_date] => 2010-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 6532 [patent_no_of_claims] => 36 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 122 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12972145 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/972145
Securing keys of a cipher using properties of the cipher process Dec 16, 2010 Issued
Array ( [id] => 9302379 [patent_doc_number] => 08650624 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-02-11 [patent_title] => 'Obscuring visual login' [patent_app_type] => utility [patent_app_number] => 12/969797 [patent_app_country] => US [patent_app_date] => 2010-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 11 [patent_no_of_words] => 9632 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 194 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12969797 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/969797
Obscuring visual login Dec 15, 2010 Issued
Array ( [id] => 8255317 [patent_doc_number] => 20120159640 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-21 [patent_title] => 'Acquiring Access To A Token Controlled System Resource' [patent_app_type] => utility [patent_app_number] => 12/969634 [patent_app_country] => US [patent_app_date] => 2010-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6520 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0159/20120159640.pdf [firstpage_image] =>[orig_patent_app_number] => 12969634 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/969634
Acquiring access to a token controlled system resource Dec 15, 2010 Issued
Array ( [id] => 9527842 [patent_doc_number] => 08752133 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-06-10 [patent_title] => 'Security control system and method for personal communication terminals' [patent_app_type] => utility [patent_app_number] => 12/970895 [patent_app_country] => US [patent_app_date] => 2010-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4463 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 210 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12970895 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/970895
Security control system and method for personal communication terminals Dec 15, 2010 Issued
Array ( [id] => 9302390 [patent_doc_number] => 08650635 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-02-11 [patent_title] => 'Pressure sensitive multi-layer passwords' [patent_app_type] => utility [patent_app_number] => 12/969646 [patent_app_country] => US [patent_app_date] => 2010-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 13 [patent_no_of_words] => 9497 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 206 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12969646 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/969646
Pressure sensitive multi-layer passwords Dec 15, 2010 Issued
Array ( [id] => 10126146 [patent_doc_number] => 09160522 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-13 [patent_title] => 'System and method for verifying the identity of an individual by employing biometric data features associated with the individual' [patent_app_type] => utility [patent_app_number] => 13/516082 [patent_app_country] => US [patent_app_date] => 2010-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4555 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 286 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13516082 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/516082
System and method for verifying the identity of an individual by employing biometric data features associated with the individual Dec 14, 2010 Issued
Array ( [id] => 6088853 [patent_doc_number] => 20110145905 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-06-16 [patent_title] => 'APPARATUS AND METHOD FOR MANAGING WEB BASED SERVICE ACCOUNT' [patent_app_type] => utility [patent_app_number] => 12/969108 [patent_app_country] => US [patent_app_date] => 2010-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3096 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0145/20110145905.pdf [firstpage_image] =>[orig_patent_app_number] => 12969108 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/969108
Apparatus and method for managing web based service account Dec 14, 2010 Issued
Array ( [id] => 8970603 [patent_doc_number] => 08509426 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-08-13 [patent_title] => 'XZ-elliptic curve cryptography system and method' [patent_app_type] => utility [patent_app_number] => 12/958273 [patent_app_country] => US [patent_app_date] => 2010-12-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 1 [patent_no_of_words] => 12625 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 177 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12958273 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/958273
XZ-elliptic curve cryptography system and method Nov 30, 2010 Issued
Array ( [id] => 8467142 [patent_doc_number] => 20120272311 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-10-25 [patent_title] => 'METHOD FOR AUTHENTICATING A USER ON A COMPUTING UNIT' [patent_app_type] => utility [patent_app_number] => 13/508134 [patent_app_country] => US [patent_app_date] => 2010-10-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7510 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13508134 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/508134
METHOD FOR AUTHENTICATING A USER ON A COMPUTING UNIT Oct 28, 2010 Abandoned
Array ( [id] => 11247462 [patent_doc_number] => 09473518 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-10-18 [patent_title] => 'Securing network communications with logical partitions' [patent_app_type] => utility [patent_app_number] => 12/910140 [patent_app_country] => US [patent_app_date] => 2010-10-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3848 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 94 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12910140 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/910140
Securing network communications with logical partitions Oct 21, 2010 Issued
Array ( [id] => 6040909 [patent_doc_number] => 20110093958 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-04-21 [patent_title] => 'Secure Data Storage Apparatus and Method' [patent_app_type] => utility [patent_app_number] => 12/909725 [patent_app_country] => US [patent_app_date] => 2010-10-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 21 [patent_no_of_words] => 3578 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0093/20110093958.pdf [firstpage_image] =>[orig_patent_app_number] => 12909725 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/909725
Secure Data Storage Apparatus and Method Oct 20, 2010 Abandoned
Array ( [id] => 5957325 [patent_doc_number] => 20110035801 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-02-10 [patent_title] => 'METHOD, NETWORK DEVICE, AND NETWORK SYSTEM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACK' [patent_app_type] => utility [patent_app_number] => 12/908679 [patent_app_country] => US [patent_app_date] => 2010-10-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3354 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0035/20110035801.pdf [firstpage_image] =>[orig_patent_app_number] => 12908679 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/908679
METHOD, NETWORK DEVICE, AND NETWORK SYSTEM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACK Oct 19, 2010 Abandoned
Array ( [id] => 8144015 [patent_doc_number] => 20120096553 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-19 [patent_title] => 'Social Engineering Protection Appliance' [patent_app_type] => utility [patent_app_number] => 12/907721 [patent_app_country] => US [patent_app_date] => 2010-10-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6428 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0096/20120096553.pdf [firstpage_image] =>[orig_patent_app_number] => 12907721 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/907721
Social engineering protection appliance Oct 18, 2010 Issued
Array ( [id] => 8143983 [patent_doc_number] => 20120096538 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-19 [patent_title] => 'DYNAMIC MOBILE STREAMING APPLICATION SUPPRESSION' [patent_app_type] => utility [patent_app_number] => 12/905849 [patent_app_country] => US [patent_app_date] => 2010-10-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6955 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0096/20120096538.pdf [firstpage_image] =>[orig_patent_app_number] => 12905849 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/905849
Dynamic mobile streaming application suppression Oct 14, 2010 Issued
Array ( [id] => 6211693 [patent_doc_number] => 20110135097 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-06-09 [patent_title] => 'Updating Encryption Keys in a Radio Communication System' [patent_app_type] => utility [patent_app_number] => 12/904268 [patent_app_country] => US [patent_app_date] => 2010-10-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 3357 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0135/20110135097.pdf [firstpage_image] =>[orig_patent_app_number] => 12904268 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/904268
Updating Encryption Keys in a Radio Communication System Oct 13, 2010 Abandoned
Array ( [id] => 9578863 [patent_doc_number] => 08769299 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-07-01 [patent_title] => 'License utilization management system license wrapper' [patent_app_type] => utility [patent_app_number] => 12/903580 [patent_app_country] => US [patent_app_date] => 2010-10-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7292 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12903580 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/903580
License utilization management system license wrapper Oct 12, 2010 Issued
Menu