
Christopher Mark Atkinson
Examiner (ID: 977)
| Most Active Art Unit | 3743 |
| Art Unit(s) | 3743, 3407, 3753, 3406 |
| Total Applications | 817 |
| Issued Applications | 555 |
| Pending Applications | 72 |
| Abandoned Applications | 190 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 7726314
[patent_doc_number] => 08099594
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-01-17
[patent_title] => 'Certificate processing'
[patent_app_type] => utility
[patent_app_number] => 12/903070
[patent_app_country] => US
[patent_app_date] => 2010-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5325
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/099/08099594.pdf
[firstpage_image] =>[orig_patent_app_number] => 12903070
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/903070 | Certificate processing | Oct 11, 2010 | Issued |
Array
(
[id] => 10060825
[patent_doc_number] => 09100193
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-04
[patent_title] => 'Method for protecting sensor data from manipulation and sensor to that end'
[patent_app_type] => utility
[patent_app_number] => 13/498954
[patent_app_country] => US
[patent_app_date] => 2010-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 11408
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13498954
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/498954 | Method for protecting sensor data from manipulation and sensor to that end | Sep 7, 2010 | Issued |
Array
(
[id] => 9586227
[patent_doc_number] => 08776239
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-08
[patent_title] => 'In-development vulnerability response management'
[patent_app_type] => utility
[patent_app_number] => 12/787933
[patent_app_country] => US
[patent_app_date] => 2010-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 5348
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12787933
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/787933 | In-development vulnerability response management | May 25, 2010 | Issued |
Array
(
[id] => 9116505
[patent_doc_number] => 08572698
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-10-29
[patent_title] => 'Connecting a legacy wireless device to a WPS-enabled access point'
[patent_app_type] => utility
[patent_app_number] => 12/784169
[patent_app_country] => US
[patent_app_date] => 2010-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6592
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12784169
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/784169 | Connecting a legacy wireless device to a WPS-enabled access point | May 19, 2010 | Issued |
Array
(
[id] => 9358898
[patent_doc_number] => 08677454
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-18
[patent_title] => 'Utilization of virtual machines by a community cloud'
[patent_app_type] => utility
[patent_app_number] => 12/782462
[patent_app_country] => US
[patent_app_date] => 2010-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3906
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 249
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12782462
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/782462 | Utilization of virtual machines by a community cloud | May 17, 2010 | Issued |
Array
(
[id] => 7588592
[patent_doc_number] => 20110283103
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-17
[patent_title] => 'ONE TIME PASSWORDS WITH IPSEC AND IKE VERSION 1 AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 12/779457
[patent_app_country] => US
[patent_app_date] => 2010-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7382
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0283/20110283103.pdf
[firstpage_image] =>[orig_patent_app_number] => 12779457
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/779457 | One time passwords with IPsec and IKE version 1 authentication | May 12, 2010 | Issued |
Array
(
[id] => 10860738
[patent_doc_number] => 08886956
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-11-11
[patent_title] => 'Data storage apparatus having cryption and method thereof'
[patent_app_type] => utility
[patent_app_number] => 12/728325
[patent_app_country] => US
[patent_app_date] => 2010-03-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 6990
[patent_no_of_claims] => 48
[patent_no_of_ind_claims] => 14
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12728325
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/728325 | Data storage apparatus having cryption and method thereof | Mar 21, 2010 | Issued |
Array
(
[id] => 8518216
[patent_doc_number] => 20120317624
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-12-13
[patent_title] => 'METHOD FOR MANAGING ACCESS TO PROTECTED RESOURCES AND DELEGATING AUTHORITY IN A COMPUTER NETWORK'
[patent_app_type] => utility
[patent_app_number] => 13/579643
[patent_app_country] => US
[patent_app_date] => 2010-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 12026
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13579643
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/579643 | Method for managing access to protected resources and delegating authority in a computer network | Feb 23, 2010 | Issued |
Array
(
[id] => 7569536
[patent_doc_number] => 20110289599
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-24
[patent_title] => 'SERVICE PROVISION'
[patent_app_type] => utility
[patent_app_number] => 13/147312
[patent_app_country] => US
[patent_app_date] => 2010-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9531
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0289/20110289599.pdf
[firstpage_image] =>[orig_patent_app_number] => 13147312
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/147312 | Service provision | Jan 31, 2010 | Issued |
Array
(
[id] => 8176630
[patent_doc_number] => 20120110331
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-03
[patent_title] => 'METHOD FOR ACTIVATING A NETWORK NODE'
[patent_app_type] => utility
[patent_app_number] => 13/145259
[patent_app_country] => US
[patent_app_date] => 2009-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8787
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0110/20120110331.pdf
[firstpage_image] =>[orig_patent_app_number] => 13145259
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/145259 | Method for activating a network node | Dec 1, 2009 | Issued |
Array
(
[id] => 8045975
[patent_doc_number] => 20120072718
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-03-22
[patent_title] => 'System And Methods For Online Authentication'
[patent_app_type] => utility
[patent_app_number] => 13/127672
[patent_app_country] => US
[patent_app_date] => 2009-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 25426
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0072/20120072718.pdf
[firstpage_image] =>[orig_patent_app_number] => 13127672
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/127672 | System and methods for online authentication | Nov 3, 2009 | Issued |
Array
(
[id] => 8645943
[patent_doc_number] => 08370943
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-02-05
[patent_title] => 'Load balancing of scan requests to all antivirus servers in a cluster'
[patent_app_type] => utility
[patent_app_number] => 12/607834
[patent_app_country] => US
[patent_app_date] => 2009-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6901
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12607834
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/607834 | Load balancing of scan requests to all antivirus servers in a cluster | Oct 27, 2009 | Issued |
Array
(
[id] => 9288169
[patent_doc_number] => 08644514
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-04
[patent_title] => 'Security model for a relay network system'
[patent_app_type] => utility
[patent_app_number] => 12/607604
[patent_app_country] => US
[patent_app_date] => 2009-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8064
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12607604
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/607604 | Security model for a relay network system | Oct 27, 2009 | Issued |
Array
(
[id] => 9444196
[patent_doc_number] => 08713330
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-04-29
[patent_title] => 'Data scrambling in memory devices'
[patent_app_type] => utility
[patent_app_number] => 12/607078
[patent_app_country] => US
[patent_app_date] => 2009-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 8
[patent_no_of_words] => 9586
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12607078
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/607078 | Data scrambling in memory devices | Oct 27, 2009 | Issued |
Array
(
[id] => 6464049
[patent_doc_number] => 20100146276
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-10
[patent_title] => 'METHOD OF RECOVERING AND MANAGING SECURITY-RELATED INFORMATION FOR DOWNLOADABLE CONDITIONAL ACCESS SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 12/607218
[patent_app_country] => US
[patent_app_date] => 2009-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4796
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0146/20100146276.pdf
[firstpage_image] =>[orig_patent_app_number] => 12607218
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/607218 | METHOD OF RECOVERING AND MANAGING SECURITY-RELATED INFORMATION FOR DOWNLOADABLE CONDITIONAL ACCESS SYSTEM | Oct 27, 2009 | Abandoned |
Array
(
[id] => 9416841
[patent_doc_number] => 08700893
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-04-15
[patent_title] => 'Key certification in one round trip'
[patent_app_type] => utility
[patent_app_number] => 12/607937
[patent_app_country] => US
[patent_app_date] => 2009-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 8992
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12607937
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/607937 | Key certification in one round trip | Oct 27, 2009 | Issued |
Array
(
[id] => 9611983
[patent_doc_number] => 08789173
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-22
[patent_title] => 'Protecting against distributed network flood attacks'
[patent_app_type] => utility
[patent_app_number] => 12/607107
[patent_app_country] => US
[patent_app_date] => 2009-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 14715
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 260
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12607107
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/607107 | Protecting against distributed network flood attacks | Oct 27, 2009 | Issued |
Array
(
[id] => 6448876
[patent_doc_number] => 20100153711
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-17
[patent_title] => 'DOWNLOADABLE CONDITIONAL ACCESS SYSTEM EFFICIENTLY DETECTING DUPLICATED DCAS HOST'
[patent_app_type] => utility
[patent_app_number] => 12/607235
[patent_app_country] => US
[patent_app_date] => 2009-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4131
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0153/20100153711.pdf
[firstpage_image] =>[orig_patent_app_number] => 12607235
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/607235 | DOWNLOADABLE CONDITIONAL ACCESS SYSTEM EFFICIENTLY DETECTING DUPLICATED DCAS HOST | Oct 27, 2009 | Abandoned |
Array
(
[id] => 8645920
[patent_doc_number] => 08370920
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-02-05
[patent_title] => 'System and method for providing unified transport and security protocols'
[patent_app_type] => utility
[patent_app_number] => 12/607707
[patent_app_country] => US
[patent_app_date] => 2009-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 17143
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12607707
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/607707 | System and method for providing unified transport and security protocols | Oct 27, 2009 | Issued |
Array
(
[id] => 7679329
[patent_doc_number] => 20100107258
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-29
[patent_title] => 'METHOD AND APPARATUS FOR MANAGING CONTENTS IN MOBILE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 12/607232
[patent_app_country] => US
[patent_app_date] => 2009-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8917
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0107/20100107258.pdf
[firstpage_image] =>[orig_patent_app_number] => 12607232
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/607232 | Method and apparatus for managing contents in mobile device | Oct 27, 2009 | Issued |