![](/images/general/no_picture/200_user.png)
James R Bidwell
Examiner (ID: 15118, Phone: (571)272-6910 , Office: P/3651 )
Most Active Art Unit | 3651 |
Art Unit(s) | 3101, 3615, 3651, 2899, 3107 |
Total Applications | 4636 |
Issued Applications | 4088 |
Pending Applications | 223 |
Abandoned Applications | 325 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 5195269
[patent_doc_number] => 20070083754
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-04-12
[patent_title] => 'Client Digitial Program Insertion In A Conditional Access Module'
[patent_app_type] => utility
[patent_app_number] => 11/163238
[patent_app_country] => US
[patent_app_date] => 2005-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 2105
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0083/20070083754.pdf
[firstpage_image] =>[orig_patent_app_number] => 11163238
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/163238 | Client digital program insertion in a conditional access module | Oct 10, 2005 | Issued |
Array
(
[id] => 604661
[patent_doc_number] => 07433937
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-10-07
[patent_title] => 'Coupling a filter graph space to a network driver space'
[patent_app_type] => utility
[patent_app_number] => 11/246359
[patent_app_country] => US
[patent_app_date] => 2005-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 7668
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/433/07433937.pdf
[firstpage_image] =>[orig_patent_app_number] => 11246359
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/246359 | Coupling a filter graph space to a network driver space | Oct 6, 2005 | Issued |
Array
(
[id] => 5638718
[patent_doc_number] => 20060069692
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-03-30
[patent_title] => 'Electronic computer system secured from unauthorized access to and manipulation of data'
[patent_app_type] => utility
[patent_app_number] => 11/237035
[patent_app_country] => US
[patent_app_date] => 2005-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 7220
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0069/20060069692.pdf
[firstpage_image] =>[orig_patent_app_number] => 11237035
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/237035 | Electronic computer system secured from unauthorized access to and manipulation of data | Sep 26, 2005 | Issued |
Array
(
[id] => 5706842
[patent_doc_number] => 20060195890
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-08-31
[patent_title] => 'Authentication setting information notifying system'
[patent_app_type] => utility
[patent_app_number] => 11/235234
[patent_app_country] => US
[patent_app_date] => 2005-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 4525
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0195/20060195890.pdf
[firstpage_image] =>[orig_patent_app_number] => 11235234
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/235234 | Authentication setting information notifying system | Sep 26, 2005 | Abandoned |
Array
(
[id] => 5722307
[patent_doc_number] => 20060075083
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-04-06
[patent_title] => 'System for distributing information using a secure peer-to-peer network'
[patent_app_type] => utility
[patent_app_number] => 11/233868
[patent_app_country] => US
[patent_app_date] => 2005-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3699
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0075/20060075083.pdf
[firstpage_image] =>[orig_patent_app_number] => 11233868
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/233868 | System for distributing information using a secure peer-to-peer network | Sep 21, 2005 | Abandoned |
Array
(
[id] => 5722727
[patent_doc_number] => 20060075504
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-04-06
[patent_title] => 'Threat protection network'
[patent_app_type] => utility
[patent_app_number] => 11/234531
[patent_app_country] => US
[patent_app_date] => 2005-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8143
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0075/20060075504.pdf
[firstpage_image] =>[orig_patent_app_number] => 11234531
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/234531 | Threat protection network | Sep 21, 2005 | Issued |
Array
(
[id] => 4948541
[patent_doc_number] => 20080304667
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-12-11
[patent_title] => 'Method and Apparatus For Cellular Automata Based Generation of Pseudorandom Sequences With Controllable Period'
[patent_app_type] => utility
[patent_app_number] => 10/578505
[patent_app_country] => US
[patent_app_date] => 2005-09-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10357
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0304/20080304667.pdf
[firstpage_image] =>[orig_patent_app_number] => 10578505
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/578505 | Method and apparatus for cellular automata based generation of pseudorandom sequences with controllable period | Sep 4, 2005 | Issued |
Array
(
[id] => 5155695
[patent_doc_number] => 20070038578
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-02-15
[patent_title] => 'METHOD AND SYSTEM FOR DIGITAL CONTENT DISTRIBUTION'
[patent_app_type] => utility
[patent_app_number] => 11/161615
[patent_app_country] => US
[patent_app_date] => 2005-08-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 10115
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0038/20070038578.pdf
[firstpage_image] =>[orig_patent_app_number] => 11161615
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/161615 | METHOD AND SYSTEM FOR DIGITAL CONTENT DISTRIBUTION | Aug 9, 2005 | Abandoned |
Array
(
[id] => 7692731
[patent_doc_number] => 20070016955
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-01-18
[patent_title] => 'Practical threat analysis'
[patent_app_type] => utility
[patent_app_number] => 11/194537
[patent_app_country] => US
[patent_app_date] => 2005-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9020
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0016/20070016955.pdf
[firstpage_image] =>[orig_patent_app_number] => 11194537
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/194537 | Practical threat analysis | Aug 1, 2005 | Issued |
Array
(
[id] => 5144105
[patent_doc_number] => 20070006321
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-01-04
[patent_title] => 'Methods and apparatus for implementing context-dependent file security'
[patent_app_type] => utility
[patent_app_number] => 11/173111
[patent_app_country] => US
[patent_app_date] => 2005-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4828
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0006/20070006321.pdf
[firstpage_image] =>[orig_patent_app_number] => 11173111
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/173111 | Methods and apparatus for implementing context-dependent file security | Jun 30, 2005 | Abandoned |
Array
(
[id] => 5771137
[patent_doc_number] => 20060021020
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-01-26
[patent_title] => 'Method for directly connecting an inherently secure computer to a private network element'
[patent_app_type] => utility
[patent_app_number] => 11/155298
[patent_app_country] => US
[patent_app_date] => 2005-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7901
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0021/20060021020.pdf
[firstpage_image] =>[orig_patent_app_number] => 11155298
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/155298 | Method for directly connecting an inherently secure computer to a private network element | Jun 15, 2005 | Abandoned |
Array
(
[id] => 7706749
[patent_doc_number] => 08091142
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-01-03
[patent_title] => 'Supplementary trust model for software licensing/commercial digital distribution policy'
[patent_app_type] => utility
[patent_app_number] => 11/114509
[patent_app_country] => US
[patent_app_date] => 2005-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7935
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/091/08091142.pdf
[firstpage_image] =>[orig_patent_app_number] => 11114509
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/114509 | Supplementary trust model for software licensing/commercial digital distribution policy | Apr 25, 2005 | Issued |
Array
(
[id] => 5861837
[patent_doc_number] => 20060230451
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-10-12
[patent_title] => 'Systems and methods for verifying trust of executable files'
[patent_app_type] => utility
[patent_app_number] => 11/100770
[patent_app_country] => US
[patent_app_date] => 2005-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4922
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0230/20060230451.pdf
[firstpage_image] =>[orig_patent_app_number] => 11100770
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/100770 | Systems and methods for verifying trust of executable files | Apr 6, 2005 | Issued |
Array
(
[id] => 18940
[patent_doc_number] => 07809954
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-10-05
[patent_title] => 'Biometric control of equipment'
[patent_app_type] => utility
[patent_app_number] => 10/546090
[patent_app_country] => US
[patent_app_date] => 2005-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 6399
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 208
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/809/07809954.pdf
[firstpage_image] =>[orig_patent_app_number] => 10546090
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/546090 | Biometric control of equipment | Mar 30, 2005 | Issued |
Array
(
[id] => 6954153
[patent_doc_number] => 20050229248
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-13
[patent_title] => 'Method for transparently managing outbound traffic from an internal user of a private network destined for a public network'
[patent_app_type] => utility
[patent_app_number] => 11/073355
[patent_app_country] => US
[patent_app_date] => 2005-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7901
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0229/20050229248.pdf
[firstpage_image] =>[orig_patent_app_number] => 11073355
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/073355 | Method for transparently managing outbound traffic from an internal user of a private network destined for a public network | Mar 2, 2005 | Issued |
Array
(
[id] => 869332
[patent_doc_number] => 07370359
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-05-06
[patent_title] => 'Method and apparatus for verifying the integrity and security of computer networks and implementing counter measures'
[patent_app_type] => utility
[patent_app_number] => 11/070022
[patent_app_country] => US
[patent_app_date] => 2005-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7599
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/370/07370359.pdf
[firstpage_image] =>[orig_patent_app_number] => 11070022
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/070022 | Method and apparatus for verifying the integrity and security of computer networks and implementing counter measures | Mar 1, 2005 | Issued |
Array
(
[id] => 5159020
[patent_doc_number] => 20070172064
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-07-26
[patent_title] => 'Electronic device, control method thereof, security program and others'
[patent_app_type] => utility
[patent_app_number] => 10/591420
[patent_app_country] => US
[patent_app_date] => 2005-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8217
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0172/20070172064.pdf
[firstpage_image] =>[orig_patent_app_number] => 10591420
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/591420 | Electronic device, control method thereof, security program and others | Mar 1, 2005 | Issued |
Array
(
[id] => 6927735
[patent_doc_number] => 20050240992
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-27
[patent_title] => 'Method for controlling access to a web server operating on an IP-compliant network'
[patent_app_type] => utility
[patent_app_number] => 11/071871
[patent_app_country] => US
[patent_app_date] => 2005-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7899
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0240/20050240992.pdf
[firstpage_image] =>[orig_patent_app_number] => 11071871
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/071871 | Method for controlling access to a web server operating on an IP-compliant network | Mar 1, 2005 | Abandoned |
Array
(
[id] => 6968811
[patent_doc_number] => 20050235346
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-20
[patent_title] => 'Method for transparently forming a connection to an element of a private network over an IP-compliant network'
[patent_app_type] => utility
[patent_app_number] => 11/071869
[patent_app_country] => US
[patent_app_date] => 2005-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7901
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20050235346.pdf
[firstpage_image] =>[orig_patent_app_number] => 11071869
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/071869 | Method for transparently forming a connection to an element of a private network over an IP-compliant network | Mar 1, 2005 | Abandoned |
Array
(
[id] => 5161526
[patent_doc_number] => 20070174570
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-07-26
[patent_title] => 'Information recording medium and information processing apparatus'
[patent_app_type] => utility
[patent_app_number] => 10/587882
[patent_app_country] => US
[patent_app_date] => 2005-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 12105
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0174/20070174570.pdf
[firstpage_image] =>[orig_patent_app_number] => 10587882
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/587882 | Information recording medium and information processing apparatus | Feb 28, 2005 | Abandoned |