Search

Marcia Lynn Watkins

Examiner (ID: 10049, Phone: (571)270-1456 , Office: P/3774 )

Most Active Art Unit
3774
Art Unit(s)
3774
Total Applications
636
Issued Applications
371
Pending Applications
40
Abandoned Applications
234

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11181755 [patent_doc_number] => 09413765 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-08-09 [patent_title] => 'Multinode hubs for trusted computing' [patent_app_type] => utility [patent_app_number] => 14/225140 [patent_app_country] => US [patent_app_date] => 2014-03-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 8 [patent_no_of_words] => 9551 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 131 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14225140 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/225140
Multinode hubs for trusted computing Mar 24, 2014 Issued
Array ( [id] => 10543838 [patent_doc_number] => 09268970 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-02-23 [patent_title] => 'System and method for security-aware master' [patent_app_type] => utility [patent_app_number] => 14/220992 [patent_app_country] => US [patent_app_date] => 2014-03-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 5645 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 64 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14220992 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/220992
System and method for security-aware master Mar 19, 2014 Issued
Array ( [id] => 10384378 [patent_doc_number] => 20150269385 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-24 [patent_title] => 'PROTECTION AGAINST KEY TAMPERING' [patent_app_type] => utility [patent_app_number] => 14/220937 [patent_app_country] => US [patent_app_date] => 2014-03-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5450 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14220937 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/220937
Protection against key tampering Mar 19, 2014 Issued
Array ( [id] => 11322242 [patent_doc_number] => 09520994 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-12-13 [patent_title] => 'System and method for deriving secrets from a master key bound to an application on a device' [patent_app_type] => utility [patent_app_number] => 14/220988 [patent_app_country] => US [patent_app_date] => 2014-03-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 4885 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 218 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14220988 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/220988
System and method for deriving secrets from a master key bound to an application on a device Mar 19, 2014 Issued
Array ( [id] => 11797563 [patent_doc_number] => 09407444 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-08-02 [patent_title] => 'Method for validating messages' [patent_app_type] => utility [patent_app_number] => 14/220983 [patent_app_country] => US [patent_app_date] => 2014-03-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 12458 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 150 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14220983 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/220983
Method for validating messages Mar 19, 2014 Issued
Array ( [id] => 11565853 [patent_doc_number] => 09628459 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-04-18 [patent_title] => 'Secure data transmission using multi-channel communication' [patent_app_type] => utility [patent_app_number] => 14/218345 [patent_app_country] => US [patent_app_date] => 2014-03-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6733 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 278 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14218345 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/218345
Secure data transmission using multi-channel communication Mar 17, 2014 Issued
Array ( [id] => 11285789 [patent_doc_number] => 09501645 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-11-22 [patent_title] => 'System and method for the protection of computers and computer networks against cyber threats' [patent_app_type] => utility [patent_app_number] => 14/216789 [patent_app_country] => US [patent_app_date] => 2014-03-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5246 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 23 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14216789 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/216789
System and method for the protection of computers and computer networks against cyber threats Mar 16, 2014 Issued
Array ( [id] => 9747195 [patent_doc_number] => 20140282915 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-09-18 [patent_title] => 'CONTEXT-BASED ANALYTICS AND INTELLIGENCE' [patent_app_type] => utility [patent_app_number] => 14/214623 [patent_app_country] => US [patent_app_date] => 2014-03-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 12763 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14214623 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/214623
CONTEXT-BASED ANALYTICS AND INTELLIGENCE Mar 13, 2014 Abandoned
Array ( [id] => 10941872 [patent_doc_number] => 20140344893 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-11-20 [patent_title] => 'Remote Access to Streaming Video' [patent_app_type] => utility [patent_app_number] => 14/214460 [patent_app_country] => US [patent_app_date] => 2014-03-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4537 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14214460 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/214460
Remote Access to Streaming Video Mar 13, 2014 Abandoned
Array ( [id] => 10557894 [patent_doc_number] => 09282103 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-03-08 [patent_title] => 'Restriction lists for remote video transfer' [patent_app_type] => utility [patent_app_number] => 14/214485 [patent_app_country] => US [patent_app_date] => 2014-03-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4589 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 116 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14214485 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/214485
Restriction lists for remote video transfer Mar 13, 2014 Issued
Array ( [id] => 10378848 [patent_doc_number] => 20150263855 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'SYMMETRIC KEYING AND CHAIN OF TRUST' [patent_app_type] => utility [patent_app_number] => 14/209129 [patent_app_country] => US [patent_app_date] => 2014-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 11226 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14209129 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/209129
Symmetric keying and chain of trust Mar 12, 2014 Issued
Array ( [id] => 10378849 [patent_doc_number] => 20150263856 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'PASSWORD ENCRYPTION FOR CONTROLLING ACCESS TO ELECTRONIC CONTROL UNITS' [patent_app_type] => utility [patent_app_number] => 14/204178 [patent_app_country] => US [patent_app_date] => 2014-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6945 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14204178 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/204178
Password encryption for controlling access to electronic control units Mar 10, 2014 Issued
Array ( [id] => 10166801 [patent_doc_number] => 09198044 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-24 [patent_title] => 'Front end filter control for shared access system' [patent_app_type] => utility [patent_app_number] => 14/202901 [patent_app_country] => US [patent_app_date] => 2014-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 14 [patent_no_of_words] => 20281 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 188 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14202901 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/202901
Front end filter control for shared access system Mar 9, 2014 Issued
Array ( [id] => 11504086 [patent_doc_number] => 20170078271 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-03-16 [patent_title] => 'Emulation Of Federative Authentication' [patent_app_type] => utility [patent_app_number] => 15/124902 [patent_app_country] => US [patent_app_date] => 2014-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4044 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15124902 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/124902
Emulation Of Federative Authentication Mar 9, 2014 Abandoned
Array ( [id] => 10151232 [patent_doc_number] => 09183526 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-10 [patent_title] => 'Metadata-driven audit reporting system that applies data security to audit data' [patent_app_type] => utility [patent_app_number] => 14/200382 [patent_app_country] => US [patent_app_date] => 2014-03-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 8866 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14200382 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/200382
Metadata-driven audit reporting system that applies data security to audit data Mar 6, 2014 Issued
Array ( [id] => 10371508 [patent_doc_number] => 20150256514 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-10 [patent_title] => 'AUTOMATIC DETECTION OF AUTHENTICATION METHODS BY A GATEWAY' [patent_app_type] => utility [patent_app_number] => 14/201780 [patent_app_country] => US [patent_app_date] => 2014-03-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5612 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14201780 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/201780
Automatic detection of authentication methods by a gateway Mar 6, 2014 Issued
Array ( [id] => 10178105 [patent_doc_number] => 09208311 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-08 [patent_title] => 'Detection of a threat in a communications network' [patent_app_type] => utility [patent_app_number] => 14/198786 [patent_app_country] => US [patent_app_date] => 2014-03-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 5987 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 199 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14198786 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/198786
Detection of a threat in a communications network Mar 5, 2014 Issued
Array ( [id] => 10571295 [patent_doc_number] => 09294486 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-03-22 [patent_title] => 'Malware detection and analysis' [patent_app_type] => utility [patent_app_number] => 14/198366 [patent_app_country] => US [patent_app_date] => 2014-03-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4793 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 211 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14198366 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/198366
Malware detection and analysis Mar 4, 2014 Issued
Array ( [id] => 10363550 [patent_doc_number] => 20150248554 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-03 [patent_title] => 'Systems And Methods For Executing Arbitrary Applications In Secure Environments' [patent_app_type] => utility [patent_app_number] => 14/195132 [patent_app_country] => US [patent_app_date] => 2014-03-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 8620 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14195132 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/195132
Systems and methods for executing arbitrary applications in secure environments Mar 2, 2014 Issued
Array ( [id] => 9564264 [patent_doc_number] => 20140181977 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-06-26 [patent_title] => 'HANDLING POTENTIALLY MALICIOUS COMMUNICATION ACTIVITY' [patent_app_type] => utility [patent_app_number] => 14/194483 [patent_app_country] => US [patent_app_date] => 2014-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 10073 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14194483 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/194483
Handling potentially malicious communication activity Feb 27, 2014 Issued
Menu