
Marcia Lynn Watkins
Examiner (ID: 10049, Phone: (571)270-1456 , Office: P/3774 )
| Most Active Art Unit | 3774 |
| Art Unit(s) | 3774 |
| Total Applications | 636 |
| Issued Applications | 371 |
| Pending Applications | 40 |
| Abandoned Applications | 234 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11181755
[patent_doc_number] => 09413765
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-09
[patent_title] => 'Multinode hubs for trusted computing'
[patent_app_type] => utility
[patent_app_number] => 14/225140
[patent_app_country] => US
[patent_app_date] => 2014-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 8
[patent_no_of_words] => 9551
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14225140
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/225140 | Multinode hubs for trusted computing | Mar 24, 2014 | Issued |
Array
(
[id] => 10543838
[patent_doc_number] => 09268970
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-23
[patent_title] => 'System and method for security-aware master'
[patent_app_type] => utility
[patent_app_number] => 14/220992
[patent_app_country] => US
[patent_app_date] => 2014-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 5645
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14220992
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/220992 | System and method for security-aware master | Mar 19, 2014 | Issued |
Array
(
[id] => 10384378
[patent_doc_number] => 20150269385
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-24
[patent_title] => 'PROTECTION AGAINST KEY TAMPERING'
[patent_app_type] => utility
[patent_app_number] => 14/220937
[patent_app_country] => US
[patent_app_date] => 2014-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5450
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14220937
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/220937 | Protection against key tampering | Mar 19, 2014 | Issued |
Array
(
[id] => 11322242
[patent_doc_number] => 09520994
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-12-13
[patent_title] => 'System and method for deriving secrets from a master key bound to an application on a device'
[patent_app_type] => utility
[patent_app_number] => 14/220988
[patent_app_country] => US
[patent_app_date] => 2014-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4885
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14220988
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/220988 | System and method for deriving secrets from a master key bound to an application on a device | Mar 19, 2014 | Issued |
Array
(
[id] => 11797563
[patent_doc_number] => 09407444
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-02
[patent_title] => 'Method for validating messages'
[patent_app_type] => utility
[patent_app_number] => 14/220983
[patent_app_country] => US
[patent_app_date] => 2014-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12458
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14220983
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/220983 | Method for validating messages | Mar 19, 2014 | Issued |
Array
(
[id] => 11565853
[patent_doc_number] => 09628459
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-18
[patent_title] => 'Secure data transmission using multi-channel communication'
[patent_app_type] => utility
[patent_app_number] => 14/218345
[patent_app_country] => US
[patent_app_date] => 2014-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6733
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 278
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14218345
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/218345 | Secure data transmission using multi-channel communication | Mar 17, 2014 | Issued |
Array
(
[id] => 11285789
[patent_doc_number] => 09501645
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-22
[patent_title] => 'System and method for the protection of computers and computer networks against cyber threats'
[patent_app_type] => utility
[patent_app_number] => 14/216789
[patent_app_country] => US
[patent_app_date] => 2014-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5246
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 23
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14216789
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/216789 | System and method for the protection of computers and computer networks against cyber threats | Mar 16, 2014 | Issued |
Array
(
[id] => 9747195
[patent_doc_number] => 20140282915
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'CONTEXT-BASED ANALYTICS AND INTELLIGENCE'
[patent_app_type] => utility
[patent_app_number] => 14/214623
[patent_app_country] => US
[patent_app_date] => 2014-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 12763
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14214623
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/214623 | CONTEXT-BASED ANALYTICS AND INTELLIGENCE | Mar 13, 2014 | Abandoned |
Array
(
[id] => 10941872
[patent_doc_number] => 20140344893
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-20
[patent_title] => 'Remote Access to Streaming Video'
[patent_app_type] => utility
[patent_app_number] => 14/214460
[patent_app_country] => US
[patent_app_date] => 2014-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4537
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14214460
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/214460 | Remote Access to Streaming Video | Mar 13, 2014 | Abandoned |
Array
(
[id] => 10557894
[patent_doc_number] => 09282103
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-08
[patent_title] => 'Restriction lists for remote video transfer'
[patent_app_type] => utility
[patent_app_number] => 14/214485
[patent_app_country] => US
[patent_app_date] => 2014-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4589
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14214485
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/214485 | Restriction lists for remote video transfer | Mar 13, 2014 | Issued |
Array
(
[id] => 10378848
[patent_doc_number] => 20150263855
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'SYMMETRIC KEYING AND CHAIN OF TRUST'
[patent_app_type] => utility
[patent_app_number] => 14/209129
[patent_app_country] => US
[patent_app_date] => 2014-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11226
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14209129
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/209129 | Symmetric keying and chain of trust | Mar 12, 2014 | Issued |
Array
(
[id] => 10378849
[patent_doc_number] => 20150263856
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'PASSWORD ENCRYPTION FOR CONTROLLING ACCESS TO ELECTRONIC CONTROL UNITS'
[patent_app_type] => utility
[patent_app_number] => 14/204178
[patent_app_country] => US
[patent_app_date] => 2014-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6945
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14204178
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/204178 | Password encryption for controlling access to electronic control units | Mar 10, 2014 | Issued |
Array
(
[id] => 10166801
[patent_doc_number] => 09198044
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-24
[patent_title] => 'Front end filter control for shared access system'
[patent_app_type] => utility
[patent_app_number] => 14/202901
[patent_app_country] => US
[patent_app_date] => 2014-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 14
[patent_no_of_words] => 20281
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14202901
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/202901 | Front end filter control for shared access system | Mar 9, 2014 | Issued |
Array
(
[id] => 11504086
[patent_doc_number] => 20170078271
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-16
[patent_title] => 'Emulation Of Federative Authentication'
[patent_app_type] => utility
[patent_app_number] => 15/124902
[patent_app_country] => US
[patent_app_date] => 2014-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4044
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15124902
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/124902 | Emulation Of Federative Authentication | Mar 9, 2014 | Abandoned |
Array
(
[id] => 10151232
[patent_doc_number] => 09183526
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-10
[patent_title] => 'Metadata-driven audit reporting system that applies data security to audit data'
[patent_app_type] => utility
[patent_app_number] => 14/200382
[patent_app_country] => US
[patent_app_date] => 2014-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8866
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14200382
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/200382 | Metadata-driven audit reporting system that applies data security to audit data | Mar 6, 2014 | Issued |
Array
(
[id] => 10371508
[patent_doc_number] => 20150256514
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-10
[patent_title] => 'AUTOMATIC DETECTION OF AUTHENTICATION METHODS BY A GATEWAY'
[patent_app_type] => utility
[patent_app_number] => 14/201780
[patent_app_country] => US
[patent_app_date] => 2014-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5612
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14201780
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/201780 | Automatic detection of authentication methods by a gateway | Mar 6, 2014 | Issued |
Array
(
[id] => 10178105
[patent_doc_number] => 09208311
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-08
[patent_title] => 'Detection of a threat in a communications network'
[patent_app_type] => utility
[patent_app_number] => 14/198786
[patent_app_country] => US
[patent_app_date] => 2014-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 5987
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14198786
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/198786 | Detection of a threat in a communications network | Mar 5, 2014 | Issued |
Array
(
[id] => 10571295
[patent_doc_number] => 09294486
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-22
[patent_title] => 'Malware detection and analysis'
[patent_app_type] => utility
[patent_app_number] => 14/198366
[patent_app_country] => US
[patent_app_date] => 2014-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4793
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14198366
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/198366 | Malware detection and analysis | Mar 4, 2014 | Issued |
Array
(
[id] => 10363550
[patent_doc_number] => 20150248554
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-03
[patent_title] => 'Systems And Methods For Executing Arbitrary Applications In Secure Environments'
[patent_app_type] => utility
[patent_app_number] => 14/195132
[patent_app_country] => US
[patent_app_date] => 2014-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8620
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14195132
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/195132 | Systems and methods for executing arbitrary applications in secure environments | Mar 2, 2014 | Issued |
Array
(
[id] => 9564264
[patent_doc_number] => 20140181977
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-26
[patent_title] => 'HANDLING POTENTIALLY MALICIOUS COMMUNICATION ACTIVITY'
[patent_app_type] => utility
[patent_app_number] => 14/194483
[patent_app_country] => US
[patent_app_date] => 2014-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10073
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14194483
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/194483 | Handling potentially malicious communication activity | Feb 27, 2014 | Issued |