
Malcolm Cribbs
Examiner (ID: 14925, Phone: (571)270-1566 , Office: P/2497 )
| Most Active Art Unit | 2497 |
| Art Unit(s) | 2432, 2115, 2497 |
| Total Applications | 954 |
| Issued Applications | 836 |
| Pending Applications | 42 |
| Abandoned Applications | 92 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 5351909
[patent_doc_number] => 20090007270
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-01-01
[patent_title] => 'SYSTEM AND METHOD FOR SIMULATING COMPUTER NETWORK ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 12/147282
[patent_app_country] => US
[patent_app_date] => 2008-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7337
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0007/20090007270.pdf
[firstpage_image] =>[orig_patent_app_number] => 12147282
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/147282 | System and method for simulating computer network attacks | Jun 25, 2008 | Issued |
Array
(
[id] => 6521703
[patent_doc_number] => 20100014677
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-01-21
[patent_title] => 'GROUP SUBORDINATE TERMINAL, GROUP MANAGING TERMINAL, SERVER, KEY UPDATING SYSTEM, AND KEY UPDATING METHOD THEREFOR'
[patent_app_type] => utility
[patent_app_number] => 12/147126
[patent_app_country] => US
[patent_app_date] => 2008-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 17216
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0014/20100014677.pdf
[firstpage_image] =>[orig_patent_app_number] => 12147126
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/147126 | Group subordinate terminal, group managing terminal, server, key updating system, and key updating method therefor | Jun 25, 2008 | Issued |
Array
(
[id] => 5468145
[patent_doc_number] => 20090328220
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-31
[patent_title] => 'MALWARE DETECTION METHODS AND SYSTEMS FOR MULTIPLE USERS SHARING COMMON ACCESS SWITCH'
[patent_app_type] => utility
[patent_app_number] => 12/145768
[patent_app_country] => US
[patent_app_date] => 2008-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5785
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0328/20090328220.pdf
[firstpage_image] =>[orig_patent_app_number] => 12145768
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/145768 | Malware detection methods and systems for multiple users sharing common access switch | Jun 24, 2008 | Issued |
Array
(
[id] => 5467954
[patent_doc_number] => 20090328129
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-31
[patent_title] => 'Customizing Policies for Process Privilege Inheritance'
[patent_app_type] => utility
[patent_app_number] => 12/145745
[patent_app_country] => US
[patent_app_date] => 2008-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5508
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0328/20090328129.pdf
[firstpage_image] =>[orig_patent_app_number] => 12145745
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/145745 | Customizing policies for process privilege inheritance | Jun 24, 2008 | Issued |
Array
(
[id] => 5454826
[patent_doc_number] => 20090070863
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-03-12
[patent_title] => 'ACCESS SERVER AND CONNECTION RESTRICTION METHOD'
[patent_app_type] => utility
[patent_app_number] => 12/145778
[patent_app_country] => US
[patent_app_date] => 2008-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 12147
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0070/20090070863.pdf
[firstpage_image] =>[orig_patent_app_number] => 12145778
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/145778 | Access server and connection restriction method | Jun 24, 2008 | Issued |
Array
(
[id] => 5400081
[patent_doc_number] => 20090320144
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-24
[patent_title] => 'Method and system for transferring protected content'
[patent_app_type] => utility
[patent_app_number] => 12/215102
[patent_app_country] => US
[patent_app_date] => 2008-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3847
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0320/20090320144.pdf
[firstpage_image] =>[orig_patent_app_number] => 12215102
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/215102 | Method and system for transferring protected content | Jun 23, 2008 | Abandoned |
Array
(
[id] => 6588471
[patent_doc_number] => 20100235857
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-16
[patent_title] => 'DISTRIBUTED SYNCHRONIZED VIDEO VIEWING AND EDITING'
[patent_app_type] => utility
[patent_app_number] => 12/282743
[patent_app_country] => US
[patent_app_date] => 2008-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3994
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20100235857.pdf
[firstpage_image] =>[orig_patent_app_number] => 12282743
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/282743 | Distributed synchronized video viewing and editing | Jun 10, 2008 | Issued |
Array
(
[id] => 5344521
[patent_doc_number] => 20090183171
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-07-16
[patent_title] => 'Secure and Extensible Policy-Driven Application Platform'
[patent_app_type] => utility
[patent_app_number] => 12/118321
[patent_app_country] => US
[patent_app_date] => 2008-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 7871
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0183/20090183171.pdf
[firstpage_image] =>[orig_patent_app_number] => 12118321
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/118321 | Secure and extensible policy-driven application platform | May 8, 2008 | Issued |
Array
(
[id] => 6368613
[patent_doc_number] => 20100088506
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-08
[patent_title] => 'METHOD AND SYSTEM FOR PROVIDING A REL TOKEN'
[patent_app_type] => utility
[patent_app_number] => 12/594331
[patent_app_country] => US
[patent_app_date] => 2008-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3493
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0088/20100088506.pdf
[firstpage_image] =>[orig_patent_app_number] => 12594331
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/594331 | Method and system for providing a REL token | Apr 1, 2008 | Issued |
Array
(
[id] => 9444500
[patent_doc_number] => 08713636
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-04-29
[patent_title] => 'Computer network running a distributed application'
[patent_app_type] => utility
[patent_app_number] => 12/594059
[patent_app_country] => US
[patent_app_date] => 2008-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6962
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12594059
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/594059 | Computer network running a distributed application | Mar 27, 2008 | Issued |
Array
(
[id] => 6253164
[patent_doc_number] => 20100138674
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-03
[patent_title] => ' COMPUTER NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/594045
[patent_app_country] => US
[patent_app_date] => 2008-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5614
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0138/20100138674.pdf
[firstpage_image] =>[orig_patent_app_number] => 12594045
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/594045 | Distributed computing network using multiple local virtual machines | Mar 27, 2008 | Issued |
Array
(
[id] => 6227664
[patent_doc_number] => 20100058074
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-03-04
[patent_title] => 'RIGHT INFORMATION ENCRYPTION MODULE, NONVOLATILE MEMORY DEVICE, RIGHT INFORMATION RECORDING SYSTEM, RIGHT INFORMATION DECRYPTION MODULE, RIGHT INFORMATION READING SYSTEM, AND RIGHT INFORMATION RECORDING/READING SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 12/594965
[patent_app_country] => US
[patent_app_date] => 2008-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 34
[patent_no_of_words] => 10935
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0058/20100058074.pdf
[firstpage_image] =>[orig_patent_app_number] => 12594965
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/594965 | RIGHT INFORMATION ENCRYPTION MODULE, NONVOLATILE MEMORY DEVICE, RIGHT INFORMATION RECORDING SYSTEM, RIGHT INFORMATION DECRYPTION MODULE, RIGHT INFORMATION READING SYSTEM, AND RIGHT INFORMATION RECORDING/READING SYSTEM | Mar 9, 2008 | Abandoned |
Array
(
[id] => 8693188
[patent_doc_number] => 08392724
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-03-05
[patent_title] => 'Information terminal, security device, data protection method, and data protection program'
[patent_app_type] => utility
[patent_app_number] => 12/376195
[patent_app_country] => US
[patent_app_date] => 2007-12-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 30
[patent_no_of_words] => 21250
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 366
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12376195
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/376195 | Information terminal, security device, data protection method, and data protection program | Dec 25, 2007 | Issued |
Array
(
[id] => 5467534
[patent_doc_number] => 20090327734
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-31
[patent_title] => 'MATCHING A WATERMARK TO A HOST SAMPLING RATE'
[patent_app_type] => utility
[patent_app_number] => 12/518140
[patent_app_country] => US
[patent_app_date] => 2007-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5479
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0327/20090327734.pdf
[firstpage_image] =>[orig_patent_app_number] => 12518140
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/518140 | MATCHING A WATERMARK TO A HOST SAMPLING RATE | Dec 6, 2007 | Abandoned |
Array
(
[id] => 8366622
[patent_doc_number] => 08255699
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-08-28
[patent_title] => 'Portable data storage medium for biometric user identification'
[patent_app_type] => utility
[patent_app_number] => 12/518264
[patent_app_country] => US
[patent_app_date] => 2007-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 10
[patent_no_of_words] => 6100
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 308
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12518264
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/518264 | Portable data storage medium for biometric user identification | Dec 5, 2007 | Issued |
Array
(
[id] => 4830690
[patent_doc_number] => 20080127114
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-05-29
[patent_title] => 'Framework for stealth dynamic coarse and fine-grained malware analysis'
[patent_app_type] => utility
[patent_app_number] => 11/998347
[patent_app_country] => US
[patent_app_date] => 2007-11-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 9592
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 14
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0127/20080127114.pdf
[firstpage_image] =>[orig_patent_app_number] => 11998347
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/998347 | Framework for stealth dynamic coarse and fine-grained malware analysis | Nov 27, 2007 | Abandoned |
Array
(
[id] => 9871542
[patent_doc_number] => 08959334
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-17
[patent_title] => 'Secure network architecture'
[patent_app_type] => utility
[patent_app_number] => 12/515458
[patent_app_country] => US
[patent_app_date] => 2007-11-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10230
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12515458
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/515458 | Secure network architecture | Nov 19, 2007 | Issued |
Array
(
[id] => 7510455
[patent_doc_number] => 08037312
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-10-11
[patent_title] => 'Method and apparatus for digital signature authentication, and computer product'
[patent_app_type] => utility
[patent_app_number] => 11/984314
[patent_app_country] => US
[patent_app_date] => 2007-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 29
[patent_no_of_words] => 13169
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/037/08037312.pdf
[firstpage_image] =>[orig_patent_app_number] => 11984314
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/984314 | Method and apparatus for digital signature authentication, and computer product | Nov 14, 2007 | Issued |
Array
(
[id] => 7694227
[patent_doc_number] => 20080120517
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-05-22
[patent_title] => 'Method to control the execution of a program by a microcontroller'
[patent_app_type] => utility
[patent_app_number] => 11/984274
[patent_app_country] => US
[patent_app_date] => 2007-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3900
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0120/20080120517.pdf
[firstpage_image] =>[orig_patent_app_number] => 11984274
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/984274 | Method to control the execution of a program by a microcontroller | Nov 14, 2007 | Issued |
Array
(
[id] => 5317870
[patent_doc_number] => 20090282468
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-11-12
[patent_title] => 'Systems and methods of network operation and information processing, including use of persistent/anonymous identifiers throughout all stages of information processing and delivery'
[patent_app_type] => utility
[patent_app_number] => 11/985860
[patent_app_country] => US
[patent_app_date] => 2007-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7977
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0282/20090282468.pdf
[firstpage_image] =>[orig_patent_app_number] => 11985860
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/985860 | Systems and methods of network operation and information processing, including use of persistent/anonymous identifiers throughout all stages of information processing and delivery | Nov 14, 2007 | Abandoned |