
Marcia Lynn Watkins
Examiner (ID: 10049, Phone: (571)270-1456 , Office: P/3774 )
| Most Active Art Unit | 3774 |
| Art Unit(s) | 3774 |
| Total Applications | 636 |
| Issued Applications | 371 |
| Pending Applications | 40 |
| Abandoned Applications | 234 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9766212
[patent_doc_number] => 08850561
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-30
[patent_title] => 'Associating operating system native authorizations with console roles'
[patent_app_type] => utility
[patent_app_number] => 12/197349
[patent_app_country] => US
[patent_app_date] => 2008-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 5668
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12197349
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/197349 | Associating operating system native authorizations with console roles | Aug 24, 2008 | Issued |
Array
(
[id] => 10538801
[patent_doc_number] => 09264443
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-16
[patent_title] => 'Browser based method of assessing web application vulnerability'
[patent_app_type] => utility
[patent_app_number] => 12/197461
[patent_app_country] => US
[patent_app_date] => 2008-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 3816
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12197461
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/197461 | Browser based method of assessing web application vulnerability | Aug 24, 2008 | Issued |
Array
(
[id] => 11933404
[patent_doc_number] => 09800413
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-24
[patent_title] => 'System and method for performing an asymmetric key exchange between a vehicle and a remote device'
[patent_app_type] => utility
[patent_app_number] => 12/192870
[patent_app_country] => US
[patent_app_date] => 2008-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 6422
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12192870
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/192870 | System and method for performing an asymmetric key exchange between a vehicle and a remote device | Aug 14, 2008 | Issued |
Array
(
[id] => 6088056
[patent_doc_number] => 20110145592
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-16
[patent_title] => 'Virtual Token for Transparently Self-Installing Security Environment'
[patent_app_type] => utility
[patent_app_number] => 12/673295
[patent_app_country] => US
[patent_app_date] => 2008-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4049
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0145/20110145592.pdf
[firstpage_image] =>[orig_patent_app_number] => 12673295
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/673295 | Virtual Token for Transparently Self-Installing Security Environment | Aug 12, 2008 | Abandoned |
Array
(
[id] => 5445635
[patent_doc_number] => 20090046861
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-02-19
[patent_title] => 'SECURITY FOR A HETEROGENEOUS AD HOC MOBILE BROADBAND NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/189008
[patent_app_country] => US
[patent_app_date] => 2008-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7663
[patent_no_of_claims] => 76
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0046/20090046861.pdf
[firstpage_image] =>[orig_patent_app_number] => 12189008
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/189008 | SECURITY FOR A HETEROGENEOUS AD HOC MOBILE BROADBAND NETWORK | Aug 7, 2008 | Abandoned |
Array
(
[id] => 5468132
[patent_doc_number] => 20090328210
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-31
[patent_title] => 'CHAIN OF EVENTS TRACKING WITH DATA TAINTING FOR AUTOMATED SECURITY FEEDBACK'
[patent_app_type] => utility
[patent_app_number] => 12/165608
[patent_app_country] => US
[patent_app_date] => 2008-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 3647
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0328/20090328210.pdf
[firstpage_image] =>[orig_patent_app_number] => 12165608
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/165608 | CHAIN OF EVENTS TRACKING WITH DATA TAINTING FOR AUTOMATED SECURITY FEEDBACK | Jun 29, 2008 | Abandoned |
Array
(
[id] => 5399581
[patent_doc_number] => 20090319644
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-24
[patent_title] => 'METHODS AND APPARATUS FOR AUTOMATICALLY CONFIGURING COMPUTING DEVICES FOR WIRELESS NETWORK CONNECTIONS'
[patent_app_type] => utility
[patent_app_number] => 12/142647
[patent_app_country] => US
[patent_app_date] => 2008-06-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5392
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0319/20090319644.pdf
[firstpage_image] =>[orig_patent_app_number] => 12142647
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/142647 | METHODS AND APPARATUS FOR AUTOMATICALLY CONFIGURING COMPUTING DEVICES FOR WIRELESS NETWORK CONNECTIONS | Jun 18, 2008 | Abandoned |
Array
(
[id] => 6078967
[patent_doc_number] => 20110142226
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-16
[patent_title] => 'METHOD OF GENERATING PSEUDO-RANDOM BIT STRINGS'
[patent_app_type] => utility
[patent_app_number] => 12/599716
[patent_app_country] => US
[patent_app_date] => 2008-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6599
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0142/20110142226.pdf
[firstpage_image] =>[orig_patent_app_number] => 12599716
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/599716 | METHOD OF GENERATING PSEUDO-RANDOM BIT STRINGS | May 11, 2008 | Abandoned |
Array
(
[id] => 5403053
[patent_doc_number] => 20090238367
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-09-24
[patent_title] => 'DIRECT DELIVERY OF CONTENT DESCRAMBLING KEYS USING CHIP-UNIQUE CODE'
[patent_app_type] => utility
[patent_app_number] => 12/050406
[patent_app_country] => US
[patent_app_date] => 2008-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7758
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0238/20090238367.pdf
[firstpage_image] =>[orig_patent_app_number] => 12050406
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/050406 | Direct delivery of content descrambling keys using chip-unique code | Mar 17, 2008 | Issued |
Array
(
[id] => 5482084
[patent_doc_number] => 20090205041
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-08-13
[patent_title] => 'Emergency Information Access on Portable Electronic Devices'
[patent_app_type] => utility
[patent_app_number] => 12/028276
[patent_app_country] => US
[patent_app_date] => 2008-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6799
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0205/20090205041.pdf
[firstpage_image] =>[orig_patent_app_number] => 12028276
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/028276 | Emergency information access on portable electronic devices | Feb 7, 2008 | Issued |
Array
(
[id] => 5528937
[patent_doc_number] => 20090199014
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-08-06
[patent_title] => 'SYSTEM AND METHOD FOR SECURING AND EXECUTING A FLASH ROUTINE'
[patent_app_type] => utility
[patent_app_number] => 12/025671
[patent_app_country] => US
[patent_app_date] => 2008-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2580
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0199/20090199014.pdf
[firstpage_image] =>[orig_patent_app_number] => 12025671
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/025671 | SYSTEM AND METHOD FOR SECURING AND EXECUTING A FLASH ROUTINE | Feb 3, 2008 | Abandoned |
Array
(
[id] => 9351664
[patent_doc_number] => 08670565
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-11
[patent_title] => 'Encrypted packet communication system'
[patent_app_type] => utility
[patent_app_number] => 11/965839
[patent_app_country] => US
[patent_app_date] => 2007-12-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5485
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 552
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11965839
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/965839 | Encrypted packet communication system | Dec 27, 2007 | Issued |
Array
(
[id] => 9848055
[patent_doc_number] => 08949990
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-02-03
[patent_title] => 'Script-based XSS vulnerability detection'
[patent_app_type] => utility
[patent_app_number] => 11/962795
[patent_app_country] => US
[patent_app_date] => 2007-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 5506
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11962795
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/962795 | Script-based XSS vulnerability detection | Dec 20, 2007 | Issued |
Array
(
[id] => 10139378
[patent_doc_number] => 09172707
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-27
[patent_title] => 'Reducing cross-site scripting attacks by segregating HTTP resources by subdomain'
[patent_app_type] => utility
[patent_app_number] => 11/959479
[patent_app_country] => US
[patent_app_date] => 2007-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 3920
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11959479
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/959479 | Reducing cross-site scripting attacks by segregating HTTP resources by subdomain | Dec 18, 2007 | Issued |
Array
(
[id] => 5548515
[patent_doc_number] => 20090158392
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-06-18
[patent_title] => 'DYNAMIC AUTHENTICATION GATEWAY'
[patent_app_type] => utility
[patent_app_number] => 11/959025
[patent_app_country] => US
[patent_app_date] => 2007-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5332
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0158/20090158392.pdf
[firstpage_image] =>[orig_patent_app_number] => 11959025
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/959025 | Dynamic authentication gateway | Dec 17, 2007 | Issued |
Array
(
[id] => 4825018
[patent_doc_number] => 20080228675
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-09-18
[patent_title] => 'MULTI-TIERED CASCADING CRAWLING SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 11/872380
[patent_app_country] => US
[patent_app_date] => 2007-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 18240
[patent_no_of_claims] => 80
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0228/20080228675.pdf
[firstpage_image] =>[orig_patent_app_number] => 11872380
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/872380 | MULTI-TIERED CASCADING CRAWLING SYSTEM | Oct 14, 2007 | Abandoned |
Array
(
[id] => 12103166
[patent_doc_number] => 09860274
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-02
[patent_title] => 'Policy management'
[patent_app_type] => utility
[patent_app_number] => 11/855107
[patent_app_country] => US
[patent_app_date] => 2007-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 20653
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 263
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11855107
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/855107 | Policy management | Sep 12, 2007 | Issued |
Array
(
[id] => 5086708
[patent_doc_number] => 20070276759
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-29
[patent_title] => 'TRUSTED INFRASTRUCTURE SUPPORT SYSTEMS, METHODS AND TECHNIQUES FOR SECURE ELECTRONIC COMMERCE ELECTRONIC TRANSACTION AND RIGHTS MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 11/834784
[patent_app_country] => US
[patent_app_date] => 2007-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 100
[patent_figures_cnt] => 100
[patent_no_of_words] => 69647
[patent_no_of_claims] => 96
[patent_no_of_ind_claims] => 14
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0276/20070276759.pdf
[firstpage_image] =>[orig_patent_app_number] => 11834784
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/834784 | TRUSTED INFRASTRUCTURE SUPPORT SYSTEMS, METHODS AND TECHNIQUES FOR SECURE ELECTRONIC COMMERCE ELECTRONIC TRANSACTION AND RIGHTS MANAGEMENT | Aug 6, 2007 | Abandoned |
Array
(
[id] => 9415519
[patent_doc_number] => 08699569
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-04-15
[patent_title] => 'Motion picture encoding device and method, motion picture decoding device and method, motion picture recording device, program, and data structure'
[patent_app_type] => utility
[patent_app_number] => 11/820155
[patent_app_country] => US
[patent_app_date] => 2007-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 39
[patent_no_of_words] => 22451
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11820155
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/820155 | Motion picture encoding device and method, motion picture decoding device and method, motion picture recording device, program, and data structure | Jun 17, 2007 | Issued |
Array
(
[id] => 5295508
[patent_doc_number] => 20090010434
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-01-08
[patent_title] => 'METHOD OF ESTABLISHING A CRYPTOGRAPHIC KEY, NETWORK HEAD AND RECEIVER FOR THIS METHOD, AND METHOD OF TRANSMITTING SIGNALS'
[patent_app_type] => utility
[patent_app_number] => 12/279410
[patent_app_country] => US
[patent_app_date] => 2007-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10242
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0010/20090010434.pdf
[firstpage_image] =>[orig_patent_app_number] => 12279410
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/279410 | Method of establishing a cryptographic key, network head and receiver for this method, and method of transmitting signals | Feb 20, 2007 | Issued |