
Marcia Lynn Watkins
Examiner (ID: 10049, Phone: (571)270-1456 , Office: P/3774 )
| Most Active Art Unit | 3774 |
| Art Unit(s) | 3774 |
| Total Applications | 636 |
| Issued Applications | 371 |
| Pending Applications | 40 |
| Abandoned Applications | 234 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15168567
[patent_doc_number] => 10489781
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-11-26
[patent_title] => Systems and methods for cryptographic authentication of contactless cards
[patent_app_type] => utility
[patent_app_number] => 16/351365
[patent_app_country] => US
[patent_app_date] => 2019-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 20739
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16351365
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/351365 | Systems and methods for cryptographic authentication of contactless cards | Mar 11, 2019 | Issued |
Array
(
[id] => 15251815
[patent_doc_number] => 10511443
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-12-17
[patent_title] => Systems and methods for cryptographic authentication of contactless cards
[patent_app_type] => utility
[patent_app_number] => 16/351433
[patent_app_country] => US
[patent_app_date] => 2019-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 22173
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16351433
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/351433 | Systems and methods for cryptographic authentication of contactless cards | Mar 11, 2019 | Issued |
Array
(
[id] => 16302197
[patent_doc_number] => 20200287920
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-10
[patent_title] => ENDPOINT NETWORK TRAFFIC ANALYSIS
[patent_app_type] => utility
[patent_app_number] => 16/295122
[patent_app_country] => US
[patent_app_date] => 2019-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10177
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16295122
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/295122 | Endpoint network traffic analysis | Mar 6, 2019 | Issued |
Array
(
[id] => 14811553
[patent_doc_number] => 20190272386
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-05
[patent_title] => Method of Integrating an Organizational Security System
[patent_app_type] => utility
[patent_app_number] => 16/291327
[patent_app_country] => US
[patent_app_date] => 2019-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7359
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 291
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16291327
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/291327 | Method of integrating an organizational security system | Mar 3, 2019 | Issued |
Array
(
[id] => 17667382
[patent_doc_number] => 11361082
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-06-14
[patent_title] => Anomalous activity detection in multi-provider transactional environments
[patent_app_type] => utility
[patent_app_number] => 16/286918
[patent_app_country] => US
[patent_app_date] => 2019-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 20371
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16286918
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/286918 | Anomalous activity detection in multi-provider transactional environments | Feb 26, 2019 | Issued |
Array
(
[id] => 16271253
[patent_doc_number] => 20200272741
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-27
[patent_title] => Advanced Rule Analyzer to Identify Similarities in Security Rules, Deduplicate Rules, and Generate New Rules
[patent_app_type] => utility
[patent_app_number] => 16/287407
[patent_app_country] => US
[patent_app_date] => 2019-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18563
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16287407
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/287407 | Advanced rule analyzer to identify similarities in security rules, deduplicate rules, and generate new rules | Feb 26, 2019 | Issued |
Array
(
[id] => 16708740
[patent_doc_number] => 10958689
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-03-23
[patent_title] => Systems and methods for bot-on-bot security verification
[patent_app_type] => utility
[patent_app_number] => 16/286106
[patent_app_country] => US
[patent_app_date] => 2019-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 23
[patent_no_of_words] => 14279
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16286106
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/286106 | Systems and methods for bot-on-bot security verification | Feb 25, 2019 | Issued |
Array
(
[id] => 17182231
[patent_doc_number] => 11159487
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-26
[patent_title] => Automatic configuration of perimeter firewalls based on security group information of SDN virtual firewalls
[patent_app_type] => utility
[patent_app_number] => 16/286190
[patent_app_country] => US
[patent_app_date] => 2019-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7159
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16286190
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/286190 | Automatic configuration of perimeter firewalls based on security group information of SDN virtual firewalls | Feb 25, 2019 | Issued |
Array
(
[id] => 16370914
[patent_doc_number] => 10802669
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-13
[patent_title] => Emergency information access on portable electronic devices
[patent_app_type] => utility
[patent_app_number] => 16/275565
[patent_app_country] => US
[patent_app_date] => 2019-02-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 10
[patent_no_of_words] => 6685
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16275565
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/275565 | Emergency information access on portable electronic devices | Feb 13, 2019 | Issued |
Array
(
[id] => 16242416
[patent_doc_number] => 20200259650
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-13
[patent_title] => SECURE COMMUNICATION WITH AN AUTHENTICATION PROCESS
[patent_app_type] => utility
[patent_app_number] => 16/271442
[patent_app_country] => US
[patent_app_date] => 2019-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13301
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16271442
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/271442 | Secure communication with an authentication process | Feb 7, 2019 | Issued |
Array
(
[id] => 16943184
[patent_doc_number] => 11055427
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-06
[patent_title] => System and method for a secured cloud file system
[patent_app_type] => utility
[patent_app_number] => 16/269998
[patent_app_country] => US
[patent_app_date] => 2019-02-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6445
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16269998
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/269998 | System and method for a secured cloud file system | Feb 6, 2019 | Issued |
Array
(
[id] => 18136562
[patent_doc_number] => 11562244
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-24
[patent_title] => Robust pruned neural networks via adversarial training
[patent_app_type] => utility
[patent_app_number] => 16/270373
[patent_app_country] => US
[patent_app_date] => 2019-02-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9600
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16270373
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/270373 | Robust pruned neural networks via adversarial training | Feb 6, 2019 | Issued |
Array
(
[id] => 14415997
[patent_doc_number] => 20190173842
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-06-06
[patent_title] => Flexible Network Security System and Method for Permitting Trusted Process
[patent_app_type] => utility
[patent_app_number] => 16/267681
[patent_app_country] => US
[patent_app_date] => 2019-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4153
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16267681
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/267681 | Flexible network security system and method for permitting trusted process | Feb 4, 2019 | Issued |
Array
(
[id] => 16804096
[patent_doc_number] => 10999059
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-04
[patent_title] => Secure blockchain integrated circuit
[patent_app_type] => utility
[patent_app_number] => 16/322099
[patent_app_country] => US
[patent_app_date] => 2019-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 12212
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16322099
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/322099 | Secure blockchain integrated circuit | Jan 28, 2019 | Issued |
Array
(
[id] => 17138607
[patent_doc_number] => 11140183
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-05
[patent_title] => Determining criticality of identified enterprise assets using network session information
[patent_app_type] => utility
[patent_app_number] => 16/260614
[patent_app_country] => US
[patent_app_date] => 2019-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6094
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 286
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16260614
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/260614 | Determining criticality of identified enterprise assets using network session information | Jan 28, 2019 | Issued |
Array
(
[id] => 16307710
[patent_doc_number] => 10776504
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-15
[patent_title] => Dynamic change in plurality of security layers based on project risk
[patent_app_type] => utility
[patent_app_number] => 16/253323
[patent_app_country] => US
[patent_app_date] => 2019-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 11
[patent_no_of_words] => 9303
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 315
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16253323
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/253323 | Dynamic change in plurality of security layers based on project risk | Jan 21, 2019 | Issued |
Array
(
[id] => 17788812
[patent_doc_number] => 11411958
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-09
[patent_title] => Machine learning-based application posture for zero trust networking
[patent_app_type] => utility
[patent_app_number] => 16/251654
[patent_app_country] => US
[patent_app_date] => 2019-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6269
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16251654
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/251654 | Machine learning-based application posture for zero trust networking | Jan 17, 2019 | Issued |
Array
(
[id] => 14678393
[patent_doc_number] => 20190238311
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-01
[patent_title] => BLOCKCHAIN SYSTEM AND DATA PROCESSING METHOD FOR BLOCKCHAIN SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/250956
[patent_app_country] => US
[patent_app_date] => 2019-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19014
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 48
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16250956
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/250956 | Blockchain system and data processing method for blockchain system | Jan 16, 2019 | Issued |
Array
(
[id] => 17047035
[patent_doc_number] => 11100217
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-08-24
[patent_title] => Leveraging a disaster recovery infrastructure to proactively manage cyber security threats to a production environment
[patent_app_type] => utility
[patent_app_number] => 16/250853
[patent_app_country] => US
[patent_app_date] => 2019-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6163
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16250853
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/250853 | Leveraging a disaster recovery infrastructure to proactively manage cyber security threats to a production environment | Jan 16, 2019 | Issued |
Array
(
[id] => 15534373
[patent_doc_number] => 20200059493
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-20
[patent_title] => NETWORK POLICY MIGRATION TO A PUBLIC CLOUD
[patent_app_type] => utility
[patent_app_number] => 16/248824
[patent_app_country] => US
[patent_app_date] => 2019-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5400
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16248824
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/248824 | Network policy migration to a public cloud | Jan 15, 2019 | Issued |