
Marcia Lynn Watkins
Examiner (ID: 10049, Phone: (571)270-1456 , Office: P/3774 )
| Most Active Art Unit | 3774 |
| Art Unit(s) | 3774 |
| Total Applications | 636 |
| Issued Applications | 371 |
| Pending Applications | 40 |
| Abandoned Applications | 234 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16747467
[patent_doc_number] => 10972477
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-04-06
[patent_title] => Systems and methods for performing micro-segmenting
[patent_app_type] => utility
[patent_app_number] => 16/142235
[patent_app_country] => US
[patent_app_date] => 2018-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12611
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16142235
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/142235 | Systems and methods for performing micro-segmenting | Sep 25, 2018 | Issued |
Array
(
[id] => 14841053
[patent_doc_number] => 20190278927
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-12
[patent_title] => ELECTRONIC DOCUMENT DISPLAY CONTROL SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/141991
[patent_app_country] => US
[patent_app_date] => 2018-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7025
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16141991
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/141991 | ELECTRONIC DOCUMENT DISPLAY CONTROL SYSTEM | Sep 25, 2018 | Abandoned |
Array
(
[id] => 14112719
[patent_doc_number] => 20190098035
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-28
[patent_title] => SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR ANOMALY DETECTION
[patent_app_type] => utility
[patent_app_number] => 16/140711
[patent_app_country] => US
[patent_app_date] => 2018-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7313
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16140711
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/140711 | Systems, methods and computer program products for anomaly detection | Sep 24, 2018 | Issued |
Array
(
[id] => 14112589
[patent_doc_number] => 20190097970
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-28
[patent_title] => NETWORK ISOLATION WITH CLOUD NETWORKS
[patent_app_type] => utility
[patent_app_number] => 16/141378
[patent_app_country] => US
[patent_app_date] => 2018-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13108
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16141378
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/141378 | Network isolation with cloud networks | Sep 24, 2018 | Issued |
Array
(
[id] => 15690079
[patent_doc_number] => 20200099703
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-26
[patent_title] => INTRUSION DETECTION ON LOAD BALANCED NETWORK TRAFFIC
[patent_app_type] => utility
[patent_app_number] => 16/140957
[patent_app_country] => US
[patent_app_date] => 2018-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10787
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16140957
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/140957 | Intrusion detection on load balanced network traffic | Sep 24, 2018 | Issued |
Array
(
[id] => 16501664
[patent_doc_number] => 10867052
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-15
[patent_title] => Encryption intermediary for volume creation
[patent_app_type] => utility
[patent_app_number] => 16/141689
[patent_app_country] => US
[patent_app_date] => 2018-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8895
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16141689
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/141689 | Encryption intermediary for volume creation | Sep 24, 2018 | Issued |
Array
(
[id] => 14081703
[patent_doc_number] => 20190089739
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-21
[patent_title] => CLONED DEVICE DETECTION
[patent_app_type] => utility
[patent_app_number] => 16/133503
[patent_app_country] => US
[patent_app_date] => 2018-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1615
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16133503
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/133503 | Cloned device detection | Sep 16, 2018 | Issued |
Array
(
[id] => 16747475
[patent_doc_number] => 10972485
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-06
[patent_title] => Enterprise network threat detection
[patent_app_type] => utility
[patent_app_number] => 16/129143
[patent_app_country] => US
[patent_app_date] => 2018-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 25520
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 219
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16129143
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/129143 | Enterprise network threat detection | Sep 11, 2018 | Issued |
Array
(
[id] => 15623351
[patent_doc_number] => 20200082080
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-12
[patent_title] => BINARY RISK EVALUATION
[patent_app_type] => utility
[patent_app_number] => 16/129306
[patent_app_country] => US
[patent_app_date] => 2018-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3737
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 38
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16129306
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/129306 | BINARY RISK EVALUATION | Sep 11, 2018 | Abandoned |
Array
(
[id] => 15600475
[patent_doc_number] => 20200076772
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => COMMUNICATION PROTOCOL
[patent_app_type] => utility
[patent_app_number] => 16/114654
[patent_app_country] => US
[patent_app_date] => 2018-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12076
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16114654
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/114654 | Communication protocol | Aug 27, 2018 | Issued |
Array
(
[id] => 17877587
[patent_doc_number] => 11449603
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-20
[patent_title] => Managing data exfiltration risk
[patent_app_type] => utility
[patent_app_number] => 16/643529
[patent_app_country] => US
[patent_app_date] => 2018-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8487
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16643529
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/643529 | Managing data exfiltration risk | Aug 26, 2018 | Issued |
Array
(
[id] => 16685220
[patent_doc_number] => 10944720
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-09
[patent_title] => Methods and systems for network security
[patent_app_type] => utility
[patent_app_number] => 16/641489
[patent_app_country] => US
[patent_app_date] => 2018-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4848
[patent_no_of_claims] => 49
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16641489
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/641489 | Methods and systems for network security | Aug 22, 2018 | Issued |
Array
(
[id] => 13600869
[patent_doc_number] => 20180351983
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-06
[patent_title] => Security Threat Detection based on Patterns in Machine Data Events
[patent_app_type] => utility
[patent_app_number] => 16/100147
[patent_app_country] => US
[patent_app_date] => 2018-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14001
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16100147
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/100147 | Security threat detection based o patterns in machine data events | Aug 8, 2018 | Issued |
Array
(
[id] => 13738833
[patent_doc_number] => 20180373886
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-27
[patent_title] => CONTROLLING ACCESS TO APPLICATION DATA
[patent_app_type] => utility
[patent_app_number] => 16/055674
[patent_app_country] => US
[patent_app_date] => 2018-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8000
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16055674
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/055674 | Controlling access to application data | Aug 5, 2018 | Issued |
Array
(
[id] => 16219615
[patent_doc_number] => 10735447
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-04
[patent_title] => System and method of protecting a network
[patent_app_type] => utility
[patent_app_number] => 16/048265
[patent_app_country] => US
[patent_app_date] => 2018-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 6960
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16048265
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/048265 | System and method of protecting a network | Jul 27, 2018 | Issued |
Array
(
[id] => 16357531
[patent_doc_number] => 10798058
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-06
[patent_title] => Distributed identity-based firewalls
[patent_app_type] => utility
[patent_app_number] => 16/041698
[patent_app_country] => US
[patent_app_date] => 2018-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6090
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16041698
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/041698 | Distributed identity-based firewalls | Jul 19, 2018 | Issued |
Array
(
[id] => 16464936
[patent_doc_number] => 10848304
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-24
[patent_title] => Public-private key pair protected password manager
[patent_app_type] => utility
[patent_app_number] => 16/038011
[patent_app_country] => US
[patent_app_date] => 2018-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 10542
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16038011
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/038011 | Public-private key pair protected password manager | Jul 16, 2018 | Issued |
Array
(
[id] => 13846007
[patent_doc_number] => 20190026488
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-24
[patent_title] => IDENTIFYING AND PROTECTING PERSONAL SENSITIVE DOCUMENTS
[patent_app_type] => utility
[patent_app_number] => 16/037997
[patent_app_country] => US
[patent_app_date] => 2018-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4933
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16037997
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/037997 | Identifying and protecting personal sensitive documents | Jul 16, 2018 | Issued |
Array
(
[id] => 16240730
[patent_doc_number] => 20200257964
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-13
[patent_title] => MACHINE LEARNING SYSTEM FOR VARIOUS COMPUTER APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 16/632267
[patent_app_country] => US
[patent_app_date] => 2018-07-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6813
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16632267
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/632267 | Machine learning system for various computer applications | Jul 12, 2018 | Issued |
Array
(
[id] => 17211958
[patent_doc_number] => 11172357
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-09
[patent_title] => Network architecture and security with encrypted client device contexts
[patent_app_type] => utility
[patent_app_number] => 16/031923
[patent_app_country] => US
[patent_app_date] => 2018-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 35
[patent_figures_cnt] => 35
[patent_no_of_words] => 36912
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16031923
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/031923 | Network architecture and security with encrypted client device contexts | Jul 9, 2018 | Issued |