
Marcia Lynn Watkins
Examiner (ID: 10049, Phone: (571)270-1456 , Office: P/3774 )
| Most Active Art Unit | 3774 |
| Art Unit(s) | 3774 |
| Total Applications | 636 |
| Issued Applications | 371 |
| Pending Applications | 40 |
| Abandoned Applications | 234 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15582411
[patent_doc_number] => 10581611
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-03
[patent_title] => Systems and methods for cryptographic authentication of contactless cards
[patent_app_type] => utility
[patent_app_number] => 16/205119
[patent_app_country] => US
[patent_app_date] => 2018-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 17695
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16205119
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/205119 | Systems and methods for cryptographic authentication of contactless cards | Nov 28, 2018 | Issued |
Array
(
[id] => 16821017
[patent_doc_number] => 11005870
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-11
[patent_title] => Framework to develop cyber-physical system behavior-based monitoring
[patent_app_type] => utility
[patent_app_number] => 16/201461
[patent_app_country] => US
[patent_app_date] => 2018-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 10765
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 324
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16201461
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/201461 | Framework to develop cyber-physical system behavior-based monitoring | Nov 26, 2018 | Issued |
Array
(
[id] => 15875565
[patent_doc_number] => 20200145186
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => REDUCING VARIABLE-LENGTH PRE-KEY TO FIX-LENGTH KEY
[patent_app_type] => utility
[patent_app_number] => 16/183532
[patent_app_country] => US
[patent_app_date] => 2018-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7319
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 69
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16183532
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/183532 | Reducing variable-length pre-key to fix-length key | Nov 6, 2018 | Issued |
Array
(
[id] => 17204624
[patent_doc_number] => 20210344719
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-04
[patent_title] => SECURE INVOCATION OF NETWORK SECURITY ENTITIES
[patent_app_type] => utility
[patent_app_number] => 17/285426
[patent_app_country] => US
[patent_app_date] => 2018-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5015
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17285426
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/285426 | SECURE INVOCATION OF NETWORK SECURITY ENTITIES | Nov 6, 2018 | Abandoned |
Array
(
[id] => 16219366
[patent_doc_number] => 10735196
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-04
[patent_title] => Password-less authentication for access management
[patent_app_type] => utility
[patent_app_number] => 16/183406
[patent_app_country] => US
[patent_app_date] => 2018-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 22059
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16183406
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/183406 | Password-less authentication for access management | Nov 6, 2018 | Issued |
Array
(
[id] => 14240365
[patent_doc_number] => 20190132355
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-02
[patent_title] => MALICIOUS SCRIPT DETECTION
[patent_app_type] => utility
[patent_app_number] => 16/176206
[patent_app_country] => US
[patent_app_date] => 2018-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5215
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16176206
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/176206 | Malicious script detection | Oct 30, 2018 | Issued |
Array
(
[id] => 13993229
[patent_doc_number] => 20190065772
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => Converged Mechanism for Protecting Data
[patent_app_type] => utility
[patent_app_number] => 16/173976
[patent_app_country] => US
[patent_app_date] => 2018-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5180
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16173976
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/173976 | Converged mechanism for protecting data | Oct 28, 2018 | Issued |
Array
(
[id] => 19653175
[patent_doc_number] => 12174963
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-12-24
[patent_title] => Automated selection of secure design patterns
[patent_app_type] => utility
[patent_app_number] => 16/174092
[patent_app_country] => US
[patent_app_date] => 2018-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 17058
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16174092
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/174092 | Automated selection of secure design patterns | Oct 28, 2018 | Issued |
Array
(
[id] => 14223327
[patent_doc_number] => 20190124048
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-25
[patent_title] => SYSTEM FOR PROVIDING DNS-BASED POLICIES FOR DEVICES
[patent_app_type] => utility
[patent_app_number] => 16/170399
[patent_app_country] => US
[patent_app_date] => 2018-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5770
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16170399
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/170399 | SYSTEM FOR PROVIDING DNS-BASED POLICIES FOR DEVICES | Oct 24, 2018 | Abandoned |
Array
(
[id] => 14799127
[patent_doc_number] => 10402568
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-03
[patent_title] => Protecting computing devices from unauthorized access
[patent_app_type] => utility
[patent_app_number] => 16/168517
[patent_app_country] => US
[patent_app_date] => 2018-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9883
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16168517
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/168517 | Protecting computing devices from unauthorized access | Oct 22, 2018 | Issued |
Array
(
[id] => 16546280
[patent_doc_number] => 20200412695
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-31
[patent_title] => IOT COMPUTER SYSTEM AND ARRANGEMENT COMPRISING AN IOT COMPUTER SYSTEM AND AN EXTERNAL SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/494447
[patent_app_country] => US
[patent_app_date] => 2018-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6074
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16494447
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/494447 | IoT computer system and arrangement comprising an IoT computer system and an external system | Oct 15, 2018 | Issued |
Array
(
[id] => 14600965
[patent_doc_number] => 10353674
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-16
[patent_title] => Data processing and communications systems and methods for the efficient implementation of privacy by design
[patent_app_type] => utility
[patent_app_number] => 16/160577
[patent_app_country] => US
[patent_app_date] => 2018-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 25825
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 371
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16160577
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/160577 | Data processing and communications systems and methods for the efficient implementation of privacy by design | Oct 14, 2018 | Issued |
Array
(
[id] => 15778183
[patent_doc_number] => 20200120109
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-16
[patent_title] => Iterative constraint solving in abstract graph matching for cyber incident reasoning
[patent_app_type] => utility
[patent_app_number] => 16/158863
[patent_app_country] => US
[patent_app_date] => 2018-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13334
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16158863
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/158863 | Iterative constraint solving in abstract graph matching for cyber incident reasoning | Oct 11, 2018 | Issued |
Array
(
[id] => 15777791
[patent_doc_number] => 20200119913
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-16
[patent_title] => SECURED COMMUNICATION BETWEEN HOST DEVICES
[patent_app_type] => utility
[patent_app_number] => 16/158183
[patent_app_country] => US
[patent_app_date] => 2018-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13376
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16158183
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/158183 | Secured communication between host devices | Oct 10, 2018 | Issued |
Array
(
[id] => 15855427
[patent_doc_number] => 10643000
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-05
[patent_title] => Access control method and terminal device
[patent_app_type] => utility
[patent_app_number] => 16/155104
[patent_app_country] => US
[patent_app_date] => 2018-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 7186
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16155104
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/155104 | Access control method and terminal device | Oct 8, 2018 | Issued |
Array
(
[id] => 16698958
[patent_doc_number] => 10949560
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-03-16
[patent_title] => Systems and methods for providing access control to web services using mirrored, secluded web instances
[patent_app_type] => utility
[patent_app_number] => 16/155408
[patent_app_country] => US
[patent_app_date] => 2018-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2529
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16155408
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/155408 | Systems and methods for providing access control to web services using mirrored, secluded web instances | Oct 8, 2018 | Issued |
Array
(
[id] => 15720061
[patent_doc_number] => 20200106798
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-02
[patent_title] => COMPUTING ENTITY RESOLUTION FOR NETWORK ASSET CORRELATION
[patent_app_type] => utility
[patent_app_number] => 16/149240
[patent_app_country] => US
[patent_app_date] => 2018-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9300
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16149240
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/149240 | Computing entity resolution for network asset correlation | Oct 1, 2018 | Issued |
Array
(
[id] => 14107883
[patent_doc_number] => 20190095617
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-28
[patent_title] => SYSTEMS AND METHODS FOR INTRINSIC RUNTIME SECURITY
[patent_app_type] => utility
[patent_app_number] => 16/147396
[patent_app_country] => US
[patent_app_date] => 2018-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4533
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16147396
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/147396 | Systems and methods for intrinsic runtime security | Sep 27, 2018 | Issued |
Array
(
[id] => 15685965
[patent_doc_number] => 20200097646
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-26
[patent_title] => VIRTUALIZATION TECHNIQUES WITH REAL-TIME CONSTRAINTS
[patent_app_type] => utility
[patent_app_number] => 16/142353
[patent_app_country] => US
[patent_app_date] => 2018-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10899
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16142353
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/142353 | VIRTUALIZATION TECHNIQUES WITH REAL-TIME CONSTRAINTS | Sep 25, 2018 | Abandoned |
Array
(
[id] => 15690047
[patent_doc_number] => 20200099687
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-26
[patent_title] => SECURE COMMUNICATION BETWEEN A SERVICE HOSTED ON A PRIVATE CLOUD AND A SERVICE HOSTED ON A PUBLIC CLOUD
[patent_app_type] => utility
[patent_app_number] => 16/142601
[patent_app_country] => US
[patent_app_date] => 2018-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3567
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16142601
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/142601 | Secure communication between a service hosted on a private cloud and a service hosted on a public cloud | Sep 25, 2018 | Issued |