
Marcia Lynn Watkins
Examiner (ID: 10049, Phone: (571)270-1456 , Office: P/3774 )
| Most Active Art Unit | 3774 |
| Art Unit(s) | 3774 |
| Total Applications | 636 |
| Issued Applications | 371 |
| Pending Applications | 40 |
| Abandoned Applications | 234 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12956653
[patent_doc_number] => 09838394
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-12-05
[patent_title] => Sensor-based human authorization evaluation
[patent_app_type] => utility
[patent_app_number] => 15/409793
[patent_app_country] => US
[patent_app_date] => 2017-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 27281
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 312
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15409793
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/409793 | Sensor-based human authorization evaluation | Jan 18, 2017 | Issued |
Array
(
[id] => 11825763
[patent_doc_number] => 20170214700
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-27
[patent_title] => 'Method and System for Forensic Data Tracking'
[patent_app_type] => utility
[patent_app_number] => 15/406746
[patent_app_country] => US
[patent_app_date] => 2017-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 33
[patent_figures_cnt] => 33
[patent_no_of_words] => 21116
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15406746
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/406746 | Method and system for forensic data tracking | Jan 14, 2017 | Issued |
Array
(
[id] => 11607001
[patent_doc_number] => 20170124304
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-04
[patent_title] => 'ENABLING ENFORCEMENT OF LICENSING TERMS IN DISTRIBUTING CONTENT IN CONTAINERS BY INCLUDING A KEY IN THE CONTAINER CONTAINING THE PERTINENT LICENSING TERMS'
[patent_app_type] => utility
[patent_app_number] => 15/401793
[patent_app_country] => US
[patent_app_date] => 2017-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5174
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15401793
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/401793 | Enabling enforcement of licensing terms in distributing content in containers by including a key in the container containing the pertinent licensing terms | Jan 8, 2017 | Issued |
Array
(
[id] => 12251110
[patent_doc_number] => 09923906
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-20
[patent_title] => 'System, method and computer program product for access authentication'
[patent_app_type] => utility
[patent_app_number] => 15/401062
[patent_app_country] => US
[patent_app_date] => 2017-01-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 4420
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15401062
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/401062 | System, method and computer program product for access authentication | Jan 7, 2017 | Issued |
Array
(
[id] => 14206935
[patent_doc_number] => 10270601
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-23
[patent_title] => Providing forward secrecy in a terminating SSL/TLS connection proxy using ephemeral Diffie-Hellman key exchange
[patent_app_type] => utility
[patent_app_number] => 15/390587
[patent_app_country] => US
[patent_app_date] => 2016-12-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 7100
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15390587
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/390587 | Providing forward secrecy in a terminating SSL/TLS connection proxy using ephemeral Diffie-Hellman key exchange | Dec 25, 2016 | Issued |
Array
(
[id] => 13801861
[patent_doc_number] => 20190014469
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-10
[patent_title] => WIRELESS COMMUNICATION SYSTEM WITH MULTIPLE SECURITY LEVELS
[patent_app_type] => utility
[patent_app_number] => 16/064166
[patent_app_country] => US
[patent_app_date] => 2016-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12904
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -11
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16064166
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/064166 | Wireless communication system with multiple security levels | Dec 20, 2016 | Issued |
Array
(
[id] => 11998288
[patent_doc_number] => 20170302443
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-19
[patent_title] => 'Methods and Apparatus for Cryptography'
[patent_app_type] => utility
[patent_app_number] => 15/378365
[patent_app_country] => US
[patent_app_date] => 2016-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5579
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15378365
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/378365 | Methods and Apparatus for Cryptography | Dec 13, 2016 | Abandoned |
Array
(
[id] => 13850807
[patent_doc_number] => 20190028888
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-24
[patent_title] => PROCESSING OF STATUS DATA IN AN ELECTRONIC DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/065065
[patent_app_country] => US
[patent_app_date] => 2016-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3943
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16065065
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/065065 | PROCESSING OF STATUS DATA IN AN ELECTRONIC DEVICE | Dec 13, 2016 | Abandoned |
Array
(
[id] => 11629942
[patent_doc_number] => 20170140132
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-18
[patent_title] => 'DEVELOP AND DEPLOY SOFTWARE IN MULTIPLE ENVIRONMENTS'
[patent_app_type] => utility
[patent_app_number] => 15/360746
[patent_app_country] => US
[patent_app_date] => 2016-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5548
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15360746
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/360746 | Software development and deployment in multiple environments | Nov 22, 2016 | Issued |
Array
(
[id] => 11892026
[patent_doc_number] => 09762599
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-12
[patent_title] => 'Multi-node affinity-based examination for computer network security remediation'
[patent_app_type] => utility
[patent_app_number] => 15/348978
[patent_app_country] => US
[patent_app_date] => 2016-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 14713
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15348978
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/348978 | Multi-node affinity-based examination for computer network security remediation | Nov 9, 2016 | Issued |
Array
(
[id] => 11477055
[patent_doc_number] => 20170063839
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'Providing Virtualized Private Network Tunnels'
[patent_app_type] => utility
[patent_app_number] => 15/347247
[patent_app_country] => US
[patent_app_date] => 2016-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 26276
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15347247
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/347247 | Providing virtualized private network tunnels | Nov 8, 2016 | Issued |
Array
(
[id] => 11460854
[patent_doc_number] => 20170054760
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-23
[patent_title] => 'Policy-Based Application Management'
[patent_app_type] => utility
[patent_app_number] => 15/345584
[patent_app_country] => US
[patent_app_date] => 2016-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 40
[patent_figures_cnt] => 40
[patent_no_of_words] => 65660
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15345584
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/345584 | Policy-Based Application Management | Nov 7, 2016 | Abandoned |
Array
(
[id] => 11447244
[patent_doc_number] => 20170048265
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'Detection of Potential Security Threats Based on Categorical Patterns'
[patent_app_type] => utility
[patent_app_number] => 15/339955
[patent_app_country] => US
[patent_app_date] => 2016-11-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 14333
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15339955
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/339955 | Detection of potential security threats based on categorical patterns | Oct 31, 2016 | Issued |
Array
(
[id] => 12971662
[patent_doc_number] => 09876812
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-01-23
[patent_title] => Automatic malware signature extraction from runtime information
[patent_app_type] => utility
[patent_app_number] => 15/339102
[patent_app_country] => US
[patent_app_date] => 2016-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 16
[patent_no_of_words] => 4206
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15339102
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/339102 | Automatic malware signature extraction from runtime information | Oct 30, 2016 | Issued |
Array
(
[id] => 11593613
[patent_doc_number] => 20170118025
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-27
[patent_title] => 'PASSWORD-LESS AUTHENTICATION FOR ACCESS MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 15/299950
[patent_app_country] => US
[patent_app_date] => 2016-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 22606
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15299950
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/299950 | Password-less authentication for access management | Oct 20, 2016 | Issued |
Array
(
[id] => 14092613
[patent_doc_number] => 10242214
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-26
[patent_title] => Dynamic change in plurality of security layers based on projected risk
[patent_app_type] => utility
[patent_app_number] => 15/297275
[patent_app_country] => US
[patent_app_date] => 2016-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 11
[patent_no_of_words] => 9269
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 281
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15297275
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/297275 | Dynamic change in plurality of security layers based on projected risk | Oct 18, 2016 | Issued |
Array
(
[id] => 12256232
[patent_doc_number] => 09928378
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-27
[patent_title] => 'Sensitive data obfuscation in output files'
[patent_app_type] => utility
[patent_app_number] => 15/291618
[patent_app_country] => US
[patent_app_date] => 2016-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5361
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15291618
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/291618 | Sensitive data obfuscation in output files | Oct 11, 2016 | Issued |
Array
(
[id] => 11477096
[patent_doc_number] => 20170063879
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'SYSTEM AND METHOD FOR THE PROTECTION OF COMPUTERS AND COMPUTER NETWORKS AGAINST CYBER THREATS'
[patent_app_type] => utility
[patent_app_number] => 15/290416
[patent_app_country] => US
[patent_app_date] => 2016-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5243
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15290416
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/290416 | System and method for the protection of computers and computer networks against cyber threats | Oct 10, 2016 | Issued |
Array
(
[id] => 11386949
[patent_doc_number] => 20170013005
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-12
[patent_title] => 'SYSTEM AND METHOD FOR CONSISTENCY BASED ANOMALY DETECTION IN AN IN-VEHICLE COMMUNICATION NETWORK'
[patent_app_type] => utility
[patent_app_number] => 15/272934
[patent_app_country] => US
[patent_app_date] => 2016-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 43299
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15272934
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/272934 | System and method for consistency based anomaly detection in an in-vehicle communication network | Sep 21, 2016 | Issued |
Array
(
[id] => 11982511
[patent_doc_number] => 20170286665
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-05
[patent_title] => 'DEVICES AND METHODS FOR FACILITATING SOFTWARE SIGNING BY MORE THAN ONE SIGNING AUTHORITY'
[patent_app_type] => utility
[patent_app_number] => 15/263170
[patent_app_country] => US
[patent_app_date] => 2016-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6687
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15263170
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/263170 | DEVICES AND METHODS FOR FACILITATING SOFTWARE SIGNING BY MORE THAN ONE SIGNING AUTHORITY | Sep 11, 2016 | Abandoned |