
Marcia Lynn Watkins
Examiner (ID: 10049, Phone: (571)270-1456 , Office: P/3774 )
| Most Active Art Unit | 3774 |
| Art Unit(s) | 3774 |
| Total Applications | 636 |
| Issued Applications | 371 |
| Pending Applications | 40 |
| Abandoned Applications | 234 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11719218
[patent_doc_number] => 20170187717
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-29
[patent_title] => 'IMPROVED COMPUTERIZED SYSTEM FACILITATING SECURED ELECTRONIC COMMUNICATION BETWEEN AND WITH CHILDREN'
[patent_app_type] => utility
[patent_app_number] => 15/317392
[patent_app_country] => US
[patent_app_date] => 2016-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 12856
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15317392
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/317392 | Computerized system facilitating secured electronic communication between and with children | Jun 15, 2016 | Issued |
Array
(
[id] => 11095429
[patent_doc_number] => 20160292399
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'ENABLING ENFORCEMENT OF LICENSING TERMS IN DISTRIBUTING CONTENT IN CONTAINERS BY INCLUDING A KEY IN THE CONTAINER CONTAINING THE PERTINENT LICENSING TERMS'
[patent_app_type] => utility
[patent_app_number] => 15/184074
[patent_app_country] => US
[patent_app_date] => 2016-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5174
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15184074
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/184074 | Enabling enforcement of licensing terms in distributing content in containers by including a key in the container containing the pertinent licensing terms | Jun 15, 2016 | Issued |
Array
(
[id] => 11340406
[patent_doc_number] => 20160366162
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'METHODS CIRCUITS DEVICES ASSEMBLIES SYSTEMS AND FUNCTIONALLY ASSOCIATED COMPUTER EXECUTABLE CODE FOR DETECTING A LINE CONDITION'
[patent_app_type] => utility
[patent_app_number] => 15/181454
[patent_app_country] => US
[patent_app_date] => 2016-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6900
[patent_no_of_claims] => 53
[patent_no_of_ind_claims] => 36
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15181454
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/181454 | METHODS CIRCUITS DEVICES ASSEMBLIES SYSTEMS AND FUNCTIONALLY ASSOCIATED COMPUTER EXECUTABLE CODE FOR DETECTING A LINE CONDITION | Jun 13, 2016 | Abandoned |
Array
(
[id] => 12419715
[patent_doc_number] => 09973525
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-05-15
[patent_title] => Systems and methods for determining the risk of information leaks from cloud-based services
[patent_app_type] => utility
[patent_app_number] => 15/182101
[patent_app_country] => US
[patent_app_date] => 2016-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9663
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15182101
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/182101 | Systems and methods for determining the risk of information leaks from cloud-based services | Jun 13, 2016 | Issued |
Array
(
[id] => 16357200
[patent_doc_number] => 10797722
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-06
[patent_title] => System and method for providing hardware based fast and secure expansion and compression functions
[patent_app_type] => utility
[patent_app_number] => 15/178973
[patent_app_country] => US
[patent_app_date] => 2016-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4268
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178973
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/178973 | System and method for providing hardware based fast and secure expansion and compression functions | Jun 9, 2016 | Issued |
Array
(
[id] => 13696919
[patent_doc_number] => 20170359414
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => Management of Advanced Connection State During Migration
[patent_app_type] => utility
[patent_app_number] => 15/178402
[patent_app_country] => US
[patent_app_date] => 2016-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5356
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178402
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/178402 | Management of advanced connection state during migration | Jun 8, 2016 | Issued |
Array
(
[id] => 12013388
[patent_doc_number] => 09806718
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-31
[patent_title] => 'Authenticatable device with reconfigurable physical unclonable functions'
[patent_app_type] => utility
[patent_app_number] => 15/176766
[patent_app_country] => US
[patent_app_date] => 2016-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 15742
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15176766
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/176766 | Authenticatable device with reconfigurable physical unclonable functions | Jun 7, 2016 | Issued |
Array
(
[id] => 11695254
[patent_doc_number] => 20170170971
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-15
[patent_title] => 'EXTENDING SHROUDING CAPABILITY OF HOSTING SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/175247
[patent_app_country] => US
[patent_app_date] => 2016-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 16088
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15175247
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/175247 | Extending shrouding capability of hosting system | Jun 6, 2016 | Issued |
Array
(
[id] => 12096361
[patent_doc_number] => 20170353455
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-07
[patent_title] => 'METHOD AND MANAGEMENT SERVER FOR REVOKING GROUP SERVER IDENTIFIERS OF COMPROMISED GROUP SERVERS'
[patent_app_type] => utility
[patent_app_number] => 15/174816
[patent_app_country] => US
[patent_app_date] => 2016-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6249
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15174816
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/174816 | Method and management server for revoking group server identifiers of compromised group servers | Jun 5, 2016 | Issued |
Array
(
[id] => 11086775
[patent_doc_number] => 20160283741
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-29
[patent_title] => 'ACCESS CONTROL METHOD AND TERMINAL DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/172945
[patent_app_country] => US
[patent_app_date] => 2016-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7188
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15172945
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/172945 | Access control method and terminal device | Jun 2, 2016 | Issued |
Array
(
[id] => 11080453
[patent_doc_number] => 20160277417
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-22
[patent_title] => 'METHOD AND APPARATUS FOR COMMUNICATION NUMBER UPDATE'
[patent_app_type] => utility
[patent_app_number] => 15/171050
[patent_app_country] => US
[patent_app_date] => 2016-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6267
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15171050
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/171050 | Method and apparatus for communication number update | Jun 1, 2016 | Issued |
Array
(
[id] => 13144251
[patent_doc_number] => 10089460
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-02
[patent_title] => Behavior-based malicious code detecting apparatus and method using multiple feature vectors
[patent_app_type] => utility
[patent_app_number] => 15/169259
[patent_app_country] => US
[patent_app_date] => 2016-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5017
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15169259
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/169259 | Behavior-based malicious code detecting apparatus and method using multiple feature vectors | May 30, 2016 | Issued |
Array
(
[id] => 14674249
[patent_doc_number] => 10375055
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-06
[patent_title] => Device authentication based upon tunnel client network requests
[patent_app_type] => utility
[patent_app_number] => 15/168404
[patent_app_country] => US
[patent_app_date] => 2016-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8665
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15168404
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/168404 | Device authentication based upon tunnel client network requests | May 30, 2016 | Issued |
Array
(
[id] => 11405846
[patent_doc_number] => 20170026384
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-26
[patent_title] => 'CONTEXT-BASED ANALYTICS AND INTELLIGENCE'
[patent_app_type] => utility
[patent_app_number] => 15/169394
[patent_app_country] => US
[patent_app_date] => 2016-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12865
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15169394
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/169394 | Context-based analytics and intelligence | May 30, 2016 | Issued |
Array
(
[id] => 19429587
[patent_doc_number] => 12089034
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-09-10
[patent_title] => Protection of privacy in wireless telecommunication networks
[patent_app_type] => utility
[patent_app_number] => 16/303833
[patent_app_country] => US
[patent_app_date] => 2016-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 13363
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 379
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16303833
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/303833 | Protection of privacy in wireless telecommunication networks | May 29, 2016 | Issued |
Array
(
[id] => 12460269
[patent_doc_number] => 09985965
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-29
[patent_title] => Security verification method, apparatus, and system
[patent_app_type] => utility
[patent_app_number] => 15/167384
[patent_app_country] => US
[patent_app_date] => 2016-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 10
[patent_no_of_words] => 7204
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15167384
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/167384 | Security verification method, apparatus, and system | May 26, 2016 | Issued |
Array
(
[id] => 11317170
[patent_doc_number] => 20160353280
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-01
[patent_title] => 'REAL-TIME DEVICE MONITORING AND ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 15/166320
[patent_app_country] => US
[patent_app_date] => 2016-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2511
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15166320
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/166320 | REAL-TIME DEVICE MONITORING AND ANALYSIS | May 26, 2016 | Abandoned |
Array
(
[id] => 11899004
[patent_doc_number] => 09768951
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-19
[patent_title] => 'Symmetric keying and chain of trust'
[patent_app_type] => utility
[patent_app_number] => 15/161873
[patent_app_country] => US
[patent_app_date] => 2016-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13709
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15161873
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/161873 | Symmetric keying and chain of trust | May 22, 2016 | Issued |
Array
(
[id] => 12062823
[patent_doc_number] => 20170339167
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-23
[patent_title] => 'REMOTE MONITORING OF SOFTWARE'
[patent_app_type] => utility
[patent_app_number] => 15/159872
[patent_app_country] => US
[patent_app_date] => 2016-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4211
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15159872
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/159872 | Remote monitoring of software | May 19, 2016 | Issued |
Array
(
[id] => 13148593
[patent_doc_number] => 10091649
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-02
[patent_title] => Network architecture and security with encrypted client device contexts
[patent_app_type] => utility
[patent_app_number] => 15/160198
[patent_app_country] => US
[patent_app_date] => 2016-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 35
[patent_figures_cnt] => 35
[patent_no_of_words] => 36887
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15160198
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/160198 | Network architecture and security with encrypted client device contexts | May 19, 2016 | Issued |