Search

Malcolm Cribbs

Examiner (ID: 14925, Phone: (571)270-1566 , Office: P/2497 )

Most Active Art Unit
2497
Art Unit(s)
2432, 2115, 2497
Total Applications
954
Issued Applications
836
Pending Applications
42
Abandoned Applications
92

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 5351909 [patent_doc_number] => 20090007270 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-01 [patent_title] => 'SYSTEM AND METHOD FOR SIMULATING COMPUTER NETWORK ATTACKS' [patent_app_type] => utility [patent_app_number] => 12/147282 [patent_app_country] => US [patent_app_date] => 2008-06-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7337 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0007/20090007270.pdf [firstpage_image] =>[orig_patent_app_number] => 12147282 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/147282
System and method for simulating computer network attacks Jun 25, 2008 Issued
Array ( [id] => 6521703 [patent_doc_number] => 20100014677 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-01-21 [patent_title] => 'GROUP SUBORDINATE TERMINAL, GROUP MANAGING TERMINAL, SERVER, KEY UPDATING SYSTEM, AND KEY UPDATING METHOD THEREFOR' [patent_app_type] => utility [patent_app_number] => 12/147126 [patent_app_country] => US [patent_app_date] => 2008-06-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 17216 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0014/20100014677.pdf [firstpage_image] =>[orig_patent_app_number] => 12147126 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/147126
Group subordinate terminal, group managing terminal, server, key updating system, and key updating method therefor Jun 25, 2008 Issued
Array ( [id] => 5468145 [patent_doc_number] => 20090328220 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-12-31 [patent_title] => 'MALWARE DETECTION METHODS AND SYSTEMS FOR MULTIPLE USERS SHARING COMMON ACCESS SWITCH' [patent_app_type] => utility [patent_app_number] => 12/145768 [patent_app_country] => US [patent_app_date] => 2008-06-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5785 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0328/20090328220.pdf [firstpage_image] =>[orig_patent_app_number] => 12145768 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/145768
Malware detection methods and systems for multiple users sharing common access switch Jun 24, 2008 Issued
Array ( [id] => 5467954 [patent_doc_number] => 20090328129 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-12-31 [patent_title] => 'Customizing Policies for Process Privilege Inheritance' [patent_app_type] => utility [patent_app_number] => 12/145745 [patent_app_country] => US [patent_app_date] => 2008-06-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5508 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0328/20090328129.pdf [firstpage_image] =>[orig_patent_app_number] => 12145745 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/145745
Customizing policies for process privilege inheritance Jun 24, 2008 Issued
Array ( [id] => 5454826 [patent_doc_number] => 20090070863 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-03-12 [patent_title] => 'ACCESS SERVER AND CONNECTION RESTRICTION METHOD' [patent_app_type] => utility [patent_app_number] => 12/145778 [patent_app_country] => US [patent_app_date] => 2008-06-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 25 [patent_figures_cnt] => 25 [patent_no_of_words] => 12147 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0070/20090070863.pdf [firstpage_image] =>[orig_patent_app_number] => 12145778 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/145778
Access server and connection restriction method Jun 24, 2008 Issued
Array ( [id] => 5400081 [patent_doc_number] => 20090320144 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-12-24 [patent_title] => 'Method and system for transferring protected content' [patent_app_type] => utility [patent_app_number] => 12/215102 [patent_app_country] => US [patent_app_date] => 2008-06-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3847 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0320/20090320144.pdf [firstpage_image] =>[orig_patent_app_number] => 12215102 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/215102
Method and system for transferring protected content Jun 23, 2008 Abandoned
Array ( [id] => 6588471 [patent_doc_number] => 20100235857 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-09-16 [patent_title] => 'DISTRIBUTED SYNCHRONIZED VIDEO VIEWING AND EDITING' [patent_app_type] => utility [patent_app_number] => 12/282743 [patent_app_country] => US [patent_app_date] => 2008-06-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3994 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0235/20100235857.pdf [firstpage_image] =>[orig_patent_app_number] => 12282743 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/282743
Distributed synchronized video viewing and editing Jun 10, 2008 Issued
Array ( [id] => 5344521 [patent_doc_number] => 20090183171 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-07-16 [patent_title] => 'Secure and Extensible Policy-Driven Application Platform' [patent_app_type] => utility [patent_app_number] => 12/118321 [patent_app_country] => US [patent_app_date] => 2008-05-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 7871 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0183/20090183171.pdf [firstpage_image] =>[orig_patent_app_number] => 12118321 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/118321
Secure and extensible policy-driven application platform May 8, 2008 Issued
Array ( [id] => 6368613 [patent_doc_number] => 20100088506 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-04-08 [patent_title] => 'METHOD AND SYSTEM FOR PROVIDING A REL TOKEN' [patent_app_type] => utility [patent_app_number] => 12/594331 [patent_app_country] => US [patent_app_date] => 2008-04-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3493 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0088/20100088506.pdf [firstpage_image] =>[orig_patent_app_number] => 12594331 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/594331
Method and system for providing a REL token Apr 1, 2008 Issued
Array ( [id] => 9444500 [patent_doc_number] => 08713636 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-04-29 [patent_title] => 'Computer network running a distributed application' [patent_app_type] => utility [patent_app_number] => 12/594059 [patent_app_country] => US [patent_app_date] => 2008-03-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6962 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 200 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12594059 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/594059
Computer network running a distributed application Mar 27, 2008 Issued
Array ( [id] => 6253164 [patent_doc_number] => 20100138674 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-06-03 [patent_title] => ' COMPUTER NETWORK' [patent_app_type] => utility [patent_app_number] => 12/594045 [patent_app_country] => US [patent_app_date] => 2008-03-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 5614 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0138/20100138674.pdf [firstpage_image] =>[orig_patent_app_number] => 12594045 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/594045
Distributed computing network using multiple local virtual machines Mar 27, 2008 Issued
Array ( [id] => 6227664 [patent_doc_number] => 20100058074 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-03-04 [patent_title] => 'RIGHT INFORMATION ENCRYPTION MODULE, NONVOLATILE MEMORY DEVICE, RIGHT INFORMATION RECORDING SYSTEM, RIGHT INFORMATION DECRYPTION MODULE, RIGHT INFORMATION READING SYSTEM, AND RIGHT INFORMATION RECORDING/READING SYSTEM' [patent_app_type] => utility [patent_app_number] => 12/594965 [patent_app_country] => US [patent_app_date] => 2008-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 34 [patent_figures_cnt] => 34 [patent_no_of_words] => 10935 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0058/20100058074.pdf [firstpage_image] =>[orig_patent_app_number] => 12594965 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/594965
RIGHT INFORMATION ENCRYPTION MODULE, NONVOLATILE MEMORY DEVICE, RIGHT INFORMATION RECORDING SYSTEM, RIGHT INFORMATION DECRYPTION MODULE, RIGHT INFORMATION READING SYSTEM, AND RIGHT INFORMATION RECORDING/READING SYSTEM Mar 9, 2008 Abandoned
Array ( [id] => 8693188 [patent_doc_number] => 08392724 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-03-05 [patent_title] => 'Information terminal, security device, data protection method, and data protection program' [patent_app_type] => utility [patent_app_number] => 12/376195 [patent_app_country] => US [patent_app_date] => 2007-12-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 24 [patent_figures_cnt] => 30 [patent_no_of_words] => 21250 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 366 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12376195 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/376195
Information terminal, security device, data protection method, and data protection program Dec 25, 2007 Issued
Array ( [id] => 5467534 [patent_doc_number] => 20090327734 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-12-31 [patent_title] => 'MATCHING A WATERMARK TO A HOST SAMPLING RATE' [patent_app_type] => utility [patent_app_number] => 12/518140 [patent_app_country] => US [patent_app_date] => 2007-12-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5479 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0327/20090327734.pdf [firstpage_image] =>[orig_patent_app_number] => 12518140 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/518140
MATCHING A WATERMARK TO A HOST SAMPLING RATE Dec 6, 2007 Abandoned
Array ( [id] => 8366622 [patent_doc_number] => 08255699 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-08-28 [patent_title] => 'Portable data storage medium for biometric user identification' [patent_app_type] => utility [patent_app_number] => 12/518264 [patent_app_country] => US [patent_app_date] => 2007-12-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 10 [patent_no_of_words] => 6100 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 308 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12518264 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/518264
Portable data storage medium for biometric user identification Dec 5, 2007 Issued
Array ( [id] => 4830690 [patent_doc_number] => 20080127114 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-05-29 [patent_title] => 'Framework for stealth dynamic coarse and fine-grained malware analysis' [patent_app_type] => utility [patent_app_number] => 11/998347 [patent_app_country] => US [patent_app_date] => 2007-11-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 9592 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 14 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0127/20080127114.pdf [firstpage_image] =>[orig_patent_app_number] => 11998347 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/998347
Framework for stealth dynamic coarse and fine-grained malware analysis Nov 27, 2007 Abandoned
Array ( [id] => 9871542 [patent_doc_number] => 08959334 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-02-17 [patent_title] => 'Secure network architecture' [patent_app_type] => utility [patent_app_number] => 12/515458 [patent_app_country] => US [patent_app_date] => 2007-11-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 10230 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 209 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12515458 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/515458
Secure network architecture Nov 19, 2007 Issued
Array ( [id] => 7510455 [patent_doc_number] => 08037312 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-10-11 [patent_title] => 'Method and apparatus for digital signature authentication, and computer product' [patent_app_type] => utility [patent_app_number] => 11/984314 [patent_app_country] => US [patent_app_date] => 2007-11-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 27 [patent_figures_cnt] => 29 [patent_no_of_words] => 13169 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 166 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/037/08037312.pdf [firstpage_image] =>[orig_patent_app_number] => 11984314 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/984314
Method and apparatus for digital signature authentication, and computer product Nov 14, 2007 Issued
Array ( [id] => 7694227 [patent_doc_number] => 20080120517 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-05-22 [patent_title] => 'Method to control the execution of a program by a microcontroller' [patent_app_type] => utility [patent_app_number] => 11/984274 [patent_app_country] => US [patent_app_date] => 2007-11-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3900 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0120/20080120517.pdf [firstpage_image] =>[orig_patent_app_number] => 11984274 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/984274
Method to control the execution of a program by a microcontroller Nov 14, 2007 Issued
Array ( [id] => 5317870 [patent_doc_number] => 20090282468 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-11-12 [patent_title] => 'Systems and methods of network operation and information processing, including use of persistent/anonymous identifiers throughout all stages of information processing and delivery' [patent_app_type] => utility [patent_app_number] => 11/985860 [patent_app_country] => US [patent_app_date] => 2007-11-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7977 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0282/20090282468.pdf [firstpage_image] =>[orig_patent_app_number] => 11985860 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/985860
Systems and methods of network operation and information processing, including use of persistent/anonymous identifiers throughout all stages of information processing and delivery Nov 14, 2007 Abandoned
Menu