
Marcia Lynn Watkins
Examiner (ID: 10049, Phone: (571)270-1456 , Office: P/3774 )
| Most Active Art Unit | 3774 |
| Art Unit(s) | 3774 |
| Total Applications | 636 |
| Issued Applications | 371 |
| Pending Applications | 40 |
| Abandoned Applications | 234 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13041739
[patent_doc_number] => 10043007
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-07
[patent_title] => Security within a software-defined infrastructure
[patent_app_type] => utility
[patent_app_number] => 15/474207
[patent_app_country] => US
[patent_app_date] => 2017-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 7755
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15474207
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/474207 | Security within a software-defined infrastructure | Mar 29, 2017 | Issued |
Array
(
[id] => 18206204
[patent_doc_number] => 11588616
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-02-21
[patent_title] => Secret key estimation methods and devices
[patent_app_type] => utility
[patent_app_number] => 16/089304
[patent_app_country] => US
[patent_app_date] => 2017-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 9725
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 275
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16089304
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/089304 | Secret key estimation methods and devices | Mar 27, 2017 | Issued |
Array
(
[id] => 16365603
[patent_doc_number] => 20200322354
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-08
[patent_title] => Method and apparatuses for authenticating a data stream
[patent_app_type] => utility
[patent_app_number] => 16/098460
[patent_app_country] => US
[patent_app_date] => 2017-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7808
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16098460
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/098460 | Method and apparatuses for authenticating a data stream | Mar 27, 2017 | Issued |
Array
(
[id] => 11739402
[patent_doc_number] => 09703985
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-07-11
[patent_title] => 'Concealing a personal number'
[patent_app_type] => utility
[patent_app_number] => 15/468877
[patent_app_country] => US
[patent_app_date] => 2017-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 4371
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15468877
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/468877 | Concealing a personal number | Mar 23, 2017 | Issued |
Array
(
[id] => 11733898
[patent_doc_number] => 20170195340
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-06
[patent_title] => 'System and Method for Partial URL Signing With Applications to Dynamic Adaptive Streaming'
[patent_app_type] => utility
[patent_app_number] => 15/462627
[patent_app_country] => US
[patent_app_date] => 2017-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5958
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15462627
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/462627 | System and method for partial URL signing with applications to dynamic adaptive streaming | Mar 16, 2017 | Issued |
Array
(
[id] => 11716787
[patent_doc_number] => 20170185285
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-29
[patent_title] => 'DEVICE, METHOD, AND GRAPHICAL USER INTERFACE FOR INTEGRATING RECOGNITION OF HANDWRITING GESTURES WITH A SCREEN READER'
[patent_app_type] => utility
[patent_app_number] => 15/460857
[patent_app_country] => US
[patent_app_date] => 2017-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 65
[patent_figures_cnt] => 65
[patent_no_of_words] => 33041
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15460857
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/460857 | Device, method, and graphical user interface for integrating recognition of handwriting gestures with a screen reader | Mar 15, 2017 | Issued |
Array
(
[id] => 11719199
[patent_doc_number] => 20170187698
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-29
[patent_title] => 'SECURING COMMUNICATION WITHIN A NETWORK ENDPOINT'
[patent_app_type] => utility
[patent_app_number] => 15/459219
[patent_app_country] => US
[patent_app_date] => 2017-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4781
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15459219
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/459219 | Securing communication within a network endpoint | Mar 14, 2017 | Issued |
Array
(
[id] => 17122918
[patent_doc_number] => 11134067
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-09-28
[patent_title] => Token management in a managed directory service
[patent_app_type] => utility
[patent_app_number] => 15/457273
[patent_app_country] => US
[patent_app_date] => 2017-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10229
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15457273
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/457273 | Token management in a managed directory service | Mar 12, 2017 | Issued |
Array
(
[id] => 12696742
[patent_doc_number] => 20180124080
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-03
[patent_title] => Methods and Systems for Anomaly Detection Using Functional Specifications Derived from Server Input/Output (I/O) Behavior
[patent_app_type] => utility
[patent_app_number] => 15/455774
[patent_app_country] => US
[patent_app_date] => 2017-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11721
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 38
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15455774
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/455774 | Methods and Systems for Anomaly Detection Using Functional Specifications Derived from Server Input/Output (I/O) Behavior | Mar 9, 2017 | Abandoned |
Array
(
[id] => 13407119
[patent_doc_number] => 20180255102
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-06
[patent_title] => INCREMENTAL SECURITY POLICY DEVELOPMENT FOR AN ENTERPRISE NETWORK
[patent_app_type] => utility
[patent_app_number] => 15/449870
[patent_app_country] => US
[patent_app_date] => 2017-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16194
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15449870
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/449870 | Incremental security policy development for an enterprise network | Mar 2, 2017 | Issued |
Array
(
[id] => 17166976
[patent_doc_number] => 11153091
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-19
[patent_title] => Untrusted code distribution
[patent_app_type] => utility
[patent_app_number] => 16/086074
[patent_app_country] => US
[patent_app_date] => 2017-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 5222
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 272
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16086074
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/086074 | Untrusted code distribution | Mar 2, 2017 | Issued |
Array
(
[id] => 17715394
[patent_doc_number] => 11379385
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-05
[patent_title] => Techniques for protecting memory pages of a virtual computing instance
[patent_app_type] => utility
[patent_app_number] => 15/444350
[patent_app_country] => US
[patent_app_date] => 2017-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 7975
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15444350
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/444350 | Techniques for protecting memory pages of a virtual computing instance | Feb 27, 2017 | Issued |
Array
(
[id] => 12244103
[patent_doc_number] => 20180076965
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-15
[patent_title] => 'AUTHENTICATION SERVER, AUTHENTICATION SYSTEM, AND AUTHENTICATION METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/443228
[patent_app_country] => US
[patent_app_date] => 2017-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8912
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15443228
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/443228 | Authentication server, authentication system, and authentication method | Feb 26, 2017 | Issued |
Array
(
[id] => 11946858
[patent_doc_number] => 20170251009
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-31
[patent_title] => 'SYSTEMS AND METHODS FOR PERFORMING OR CREATING SIMULATED PHISHING ATTACKS AND PHISHING ATTACK CAMPAIGNS'
[patent_app_type] => utility
[patent_app_number] => 15/442215
[patent_app_country] => US
[patent_app_date] => 2017-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 21284
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15442215
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/442215 | Systems and methods for performing or creating simulated phishing attacks and phishing attack campaigns | Feb 23, 2017 | Issued |
Array
(
[id] => 12576558
[patent_doc_number] => 10021126
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-10
[patent_title] => Systems and methods for creating and running heterogeneous phishing attack campaigns
[patent_app_type] => utility
[patent_app_number] => 15/442218
[patent_app_country] => US
[patent_app_date] => 2017-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 20822
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 266
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15442218
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/442218 | Systems and methods for creating and running heterogeneous phishing attack campaigns | Feb 23, 2017 | Issued |
Array
(
[id] => 14528039
[patent_doc_number] => 10341293
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-02
[patent_title] => Transparent firewall for protecting field devices
[patent_app_type] => utility
[patent_app_number] => 15/439638
[patent_app_country] => US
[patent_app_date] => 2017-02-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2985
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15439638
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/439638 | Transparent firewall for protecting field devices | Feb 21, 2017 | Issued |
Array
(
[id] => 11940395
[patent_doc_number] => 20170244546
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-24
[patent_title] => 'CLOCK PERIOD RANDOMIZATION FOR DEFENSE AGAINST CRYPTOGRAPHIC ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 15/436489
[patent_app_country] => US
[patent_app_date] => 2017-02-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10462
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 11
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15436489
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/436489 | Clock period randomization for defense against cryptographic attacks | Feb 16, 2017 | Issued |
Array
(
[id] => 12096308
[patent_doc_number] => 20170353401
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-07
[patent_title] => 'DRAGONFLY PROCESSOR INTERCONNECT NETWORK'
[patent_app_type] => utility
[patent_app_number] => 15/435952
[patent_app_country] => US
[patent_app_date] => 2017-02-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6556
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15435952
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/435952 | Dragonfly processor interconnect network | Feb 16, 2017 | Issued |
Array
(
[id] => 14013185
[patent_doc_number] => 10225078
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-05
[patent_title] => Managing a database management system using a blockchain database
[patent_app_type] => utility
[patent_app_number] => 15/429121
[patent_app_country] => US
[patent_app_date] => 2017-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 12692
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15429121
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/429121 | Managing a database management system using a blockchain database | Feb 8, 2017 | Issued |
Array
(
[id] => 13336707
[patent_doc_number] => 20180219892
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-02
[patent_title] => Methods and Systems for Detecting Viruses in Emails
[patent_app_type] => utility
[patent_app_number] => 15/423505
[patent_app_country] => US
[patent_app_date] => 2017-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6436
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15423505
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/423505 | Methods and systems for detecting viruses in emails | Feb 1, 2017 | Issued |