
Malcolm Cribbs
Examiner (ID: 457, Phone: (571)270-1566 , Office: P/2497 )
| Most Active Art Unit | 2497 |
| Art Unit(s) | 2497, 2432, 2115 |
| Total Applications | 951 |
| Issued Applications | 835 |
| Pending Applications | 41 |
| Abandoned Applications | 92 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10632373
[patent_doc_number] => 09350534
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-05-24
[patent_title] => 'Method and apparatus for pipelined byte substitution in encryption and decryption'
[patent_app_type] => utility
[patent_app_number] => 14/299735
[patent_app_country] => US
[patent_app_date] => 2014-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 38
[patent_no_of_words] => 15551
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14299735
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/299735 | Method and apparatus for pipelined byte substitution in encryption and decryption | Jun 8, 2014 | Issued |
Array
(
[id] => 10589851
[patent_doc_number] => 09311469
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-12
[patent_title] => 'Authorization server system, control method thereof, and non-transitory computer-readable medium'
[patent_app_type] => utility
[patent_app_number] => 14/299595
[patent_app_country] => US
[patent_app_date] => 2014-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 23
[patent_no_of_words] => 11405
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 285
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14299595
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/299595 | Authorization server system, control method thereof, and non-transitory computer-readable medium | Jun 8, 2014 | Issued |
Array
(
[id] => 11247253
[patent_doc_number] => 09473307
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-18
[patent_title] => 'Method and apparatus of data authentication'
[patent_app_type] => utility
[patent_app_number] => 14/299805
[patent_app_country] => US
[patent_app_date] => 2014-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9399
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14299805
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/299805 | Method and apparatus of data authentication | Jun 8, 2014 | Issued |
Array
(
[id] => 11931882
[patent_doc_number] => 09798882
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-24
[patent_title] => 'Real-time model of states of monitored devices'
[patent_app_type] => utility
[patent_app_number] => 14/297974
[patent_app_country] => US
[patent_app_date] => 2014-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7710
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14297974
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/297974 | Real-time model of states of monitored devices | Jun 5, 2014 | Issued |
Array
(
[id] => 10630865
[patent_doc_number] => 09349016
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-05-24
[patent_title] => 'System and method for user-context-based data loss prevention'
[patent_app_type] => utility
[patent_app_number] => 14/298095
[patent_app_country] => US
[patent_app_date] => 2014-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 21
[patent_no_of_words] => 32435
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14298095
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/298095 | System and method for user-context-based data loss prevention | Jun 5, 2014 | Issued |
Array
(
[id] => 10630856
[patent_doc_number] => 09349008
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-05-24
[patent_title] => 'Safe printing'
[patent_app_type] => utility
[patent_app_number] => 14/268577
[patent_app_country] => US
[patent_app_date] => 2014-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 7771
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14268577
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/268577 | Safe printing | May 1, 2014 | Issued |
Array
(
[id] => 10803553
[patent_doc_number] => 20160149710
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'PROVIDING DIGITAL CERTIFICATES'
[patent_app_type] => utility
[patent_app_number] => 14/784901
[patent_app_country] => US
[patent_app_date] => 2014-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11019
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14784901
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/784901 | Providing digital certificates | Apr 24, 2014 | Issued |
Array
(
[id] => 11688257
[patent_doc_number] => 09686313
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-20
[patent_title] => 'Clickjacking protection'
[patent_app_type] => utility
[patent_app_number] => 14/255862
[patent_app_country] => US
[patent_app_date] => 2014-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5282
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14255862
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/255862 | Clickjacking protection | Apr 16, 2014 | Issued |
Array
(
[id] => 10538585
[patent_doc_number] => 09264224
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-16
[patent_title] => 'Systems and methods for secure data sharing'
[patent_app_type] => utility
[patent_app_number] => 14/247971
[patent_app_country] => US
[patent_app_date] => 2014-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 73
[patent_figures_cnt] => 78
[patent_no_of_words] => 70015
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14247971
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/247971 | Systems and methods for secure data sharing | Apr 7, 2014 | Issued |
Array
(
[id] => 9723458
[patent_doc_number] => 20140259159
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-11
[patent_title] => 'Securing File Trust with File Format Conversions'
[patent_app_type] => utility
[patent_app_number] => 14/194747
[patent_app_country] => US
[patent_app_date] => 2014-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6088
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14194747
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/194747 | Securing file trust with file format conversions | Mar 1, 2014 | Issued |
Array
(
[id] => 10591564
[patent_doc_number] => 09313191
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-04-12
[patent_title] => 'Virtual requests'
[patent_app_type] => utility
[patent_app_number] => 14/181078
[patent_app_country] => US
[patent_app_date] => 2014-02-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8497
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14181078
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/181078 | Virtual requests | Feb 13, 2014 | Issued |
Array
(
[id] => 9599125
[patent_doc_number] => 20140195806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-10
[patent_title] => 'SECURE COMMUNICATION METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/176196
[patent_app_country] => US
[patent_app_date] => 2014-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5854
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14176196
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/176196 | Secure Communication Method | Feb 9, 2014 | Issued |
Array
(
[id] => 10328236
[patent_doc_number] => 20150213241
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-30
[patent_title] => 'COMPUTER-IMPLEMENTED METHOD FOR MANAGING AT LEAST ONE DATA ELEMENT IN CONTROL UNIT DEVELOPMENT'
[patent_app_type] => utility
[patent_app_number] => 14/167200
[patent_app_country] => US
[patent_app_date] => 2014-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3978
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14167200
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/167200 | Computer-implemented method for managing at least one data element in control unit development | Jan 28, 2014 | Issued |
Array
(
[id] => 11786888
[patent_doc_number] => 09396325
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-19
[patent_title] => 'Provisioning an app on a device and implementing a keystore'
[patent_app_type] => utility
[patent_app_number] => 14/167418
[patent_app_country] => US
[patent_app_date] => 2014-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 21
[patent_no_of_words] => 20886
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14167418
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/167418 | Provisioning an app on a device and implementing a keystore | Jan 28, 2014 | Issued |
Array
(
[id] => 9637502
[patent_doc_number] => 20140215611
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-31
[patent_title] => 'APPARATUS AND METHOD FOR DETECTING ATTACK OF NETWORK SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/167087
[patent_app_country] => US
[patent_app_date] => 2014-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6895
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14167087
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/167087 | APPARATUS AND METHOD FOR DETECTING ATTACK OF NETWORK SYSTEM | Jan 28, 2014 | Abandoned |
Array
(
[id] => 9465406
[patent_doc_number] => 20140129833
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-08
[patent_title] => 'MANAGEMENT OF SECURE DATA IN CLOUD-BASED NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/154372
[patent_app_country] => US
[patent_app_date] => 2014-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5552
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14154372
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/154372 | Management of secure data in cloud-based network | Jan 13, 2014 | Issued |
Array
(
[id] => 10028062
[patent_doc_number] => 09069964
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-30
[patent_title] => 'Identification of malicious activities through non-logged-in host usage'
[patent_app_type] => utility
[patent_app_number] => 14/153138
[patent_app_country] => US
[patent_app_date] => 2014-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5599
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14153138
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/153138 | Identification of malicious activities through non-logged-in host usage | Jan 12, 2014 | Issued |
Array
(
[id] => 9599458
[patent_doc_number] => 20140196139
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-10
[patent_title] => 'PRIVACY PROTECTED INTERNET NETWORKS, SUBNETWORKS AND SUB-SUBNETWORKS'
[patent_app_type] => utility
[patent_app_number] => 14/148810
[patent_app_country] => US
[patent_app_date] => 2014-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3266
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14148810
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/148810 | PRIVACY PROTECTED INTERNET NETWORKS, SUBNETWORKS AND SUB-SUBNETWORKS | Jan 6, 2014 | Abandoned |
Array
(
[id] => 10571304
[patent_doc_number] => 09294495
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-22
[patent_title] => 'System and method for evaluating and enhancing the security level of a network system'
[patent_app_type] => utility
[patent_app_number] => 14/148685
[patent_app_country] => US
[patent_app_date] => 2014-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 17
[patent_no_of_words] => 11670
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14148685
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/148685 | System and method for evaluating and enhancing the security level of a network system | Jan 5, 2014 | Issued |
Array
(
[id] => 10310251
[patent_doc_number] => 20150195253
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-09
[patent_title] => 'RETRIEVING BOTH SENSITIVE AND NON-SENSITIVE CONTENT IN A SECURE MANNER'
[patent_app_type] => utility
[patent_app_number] => 14/148433
[patent_app_country] => US
[patent_app_date] => 2014-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5203
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14148433
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/148433 | Retrieving both sensitive and non-sensitive content in a secure manner | Jan 5, 2014 | Issued |