Marcus Charles
Examiner (ID: 7741, Phone: (571)272-7101 , Office: P/3656 )
Most Active Art Unit | 3656 |
Art Unit(s) | 3656, 3682, 3622, 3681 |
Total Applications | 2578 |
Issued Applications | 2127 |
Pending Applications | 87 |
Abandoned Applications | 364 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 17877597
[patent_doc_number] => 11449613
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-20
[patent_title] => Systems and methods for providing security services during power management mode
[patent_app_type] => utility
[patent_app_number] => 16/404408
[patent_app_country] => US
[patent_app_date] => 2019-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 23
[patent_no_of_words] => 17614
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16404408
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/404408 | Systems and methods for providing security services during power management mode | May 5, 2019 | Issued |
Array
(
[id] => 14970511
[patent_doc_number] => 20190312734
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-10
[patent_title] => SYSTEMS AND METHODS AUTHENTICATING A DIGITALLY SIGNED ASSERTION USING VERIFIED EVALUATORS
[patent_app_type] => utility
[patent_app_number] => 16/400636
[patent_app_country] => US
[patent_app_date] => 2019-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 40780
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16400636
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/400636 | Systems and methods authenticating a digitally signed assertion using verified evaluators | Apr 30, 2019 | Issued |
Array
(
[id] => 16790656
[patent_doc_number] => 10993107
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-27
[patent_title] => Multi-factor autonomous SIM lock
[patent_app_type] => utility
[patent_app_number] => 16/289756
[patent_app_country] => US
[patent_app_date] => 2019-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11975
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16289756
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/289756 | Multi-factor autonomous SIM lock | Feb 28, 2019 | Issued |
Array
(
[id] => 14478611
[patent_doc_number] => 20190190959
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-06-20
[patent_title] => AUTHORIZATION POLICY OPTIMIZATION METHOD AND APPARATUS, AND STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 16/285290
[patent_app_country] => US
[patent_app_date] => 2019-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8079
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16285290
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/285290 | Authorization policy optimization method and apparatus, and storage medium | Feb 25, 2019 | Issued |
Array
(
[id] => 18828330
[patent_doc_number] => 11843628
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-12-12
[patent_title] => Cyber security appliance for an operational technology network
[patent_app_type] => utility
[patent_app_number] => 16/278953
[patent_app_country] => US
[patent_app_date] => 2019-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 15942
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16278953
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/278953 | Cyber security appliance for an operational technology network | Feb 18, 2019 | Issued |
Array
(
[id] => 17804204
[patent_doc_number] => 11418523
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-16
[patent_title] => Artificial intelligence privacy protection for cybersecurity analysis
[patent_app_type] => utility
[patent_app_number] => 16/279013
[patent_app_country] => US
[patent_app_date] => 2019-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 19766
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 330
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16279013
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/279013 | Artificial intelligence privacy protection for cybersecurity analysis | Feb 18, 2019 | Issued |
Array
(
[id] => 16255776
[patent_doc_number] => 20200265150
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-20
[patent_title] => CROSS-DOMAIN CONTENT-LIFECYCLE MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 16/275842
[patent_app_country] => US
[patent_app_date] => 2019-02-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9191
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16275842
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/275842 | Cross-domain content-lifecycle management | Feb 13, 2019 | Issued |
Array
(
[id] => 18549129
[patent_doc_number] => 11722493
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-08-08
[patent_title] => Access analysis system and access analysis method
[patent_app_type] => utility
[patent_app_number] => 16/969263
[patent_app_country] => US
[patent_app_date] => 2019-02-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4933
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 272
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16969263
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/969263 | Access analysis system and access analysis method | Feb 6, 2019 | Issued |
Array
(
[id] => 16510203
[patent_doc_number] => 20200389459
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-10
[patent_title] => System and Method for Trustworthy Internet Whitelists
[patent_app_type] => utility
[patent_app_number] => 16/960567
[patent_app_country] => US
[patent_app_date] => 2019-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8001
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16960567
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/960567 | System and method for trustworthy internet whitelists | Jan 10, 2019 | Issued |
Array
(
[id] => 14223325
[patent_doc_number] => 20190124047
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-25
[patent_title] => SERVER-CLIENT AUTHENTICATION WITH INTEGRATED STATUS UPDATE
[patent_app_type] => utility
[patent_app_number] => 16/224218
[patent_app_country] => US
[patent_app_date] => 2018-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 34361
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 69
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16224218
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/224218 | Server-client authentication with integrated status update | Dec 17, 2018 | Issued |
Array
(
[id] => 16826582
[patent_doc_number] => 20210141875
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-13
[patent_title] => DEVICE FOR AUTOMATICALLY IDENTIFYING ANTI-ANALYSIS TECHNIQUES BY USING SIGNATURE EXTRACTION AND METHOD THEREFOR
[patent_app_type] => utility
[patent_app_number] => 17/262745
[patent_app_country] => US
[patent_app_date] => 2018-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3975
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17262745
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/262745 | Device for automatically identifying anti-analysis techniques by using signature extraction and method therefor | Nov 25, 2018 | Issued |
Array
(
[id] => 14139179
[patent_doc_number] => 20190103979
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-04
[patent_title] => USING MULTIPLE DIGITAL IDENTIFICATION DOCUMENTS TO CONTROL INFORMATION DISCLOSURE
[patent_app_type] => utility
[patent_app_number] => 16/194450
[patent_app_country] => US
[patent_app_date] => 2018-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8168
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 306
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16194450
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/194450 | Using multiple digital identification documents to control information disclosure | Nov 18, 2018 | Issued |
Array
(
[id] => 14166197
[patent_doc_number] => 20190110201
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-11
[patent_title] => WI-FI CONNECTION METHOD, MOBILE TERMINAL AND STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 16/190399
[patent_app_country] => US
[patent_app_date] => 2018-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6659
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16190399
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/190399 | Wi-Fi connection method, mobile terminal and storage medium | Nov 13, 2018 | Issued |
Array
(
[id] => 16921814
[patent_doc_number] => 20210194906
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-24
[patent_title] => METHOD AND SERVER FOR RECOGNIZING ABNORMAL ACCESS BEHAVIOR
[patent_app_type] => utility
[patent_app_number] => 16/767998
[patent_app_country] => US
[patent_app_date] => 2018-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4327
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16767998
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/767998 | METHOD AND SERVER FOR RECOGNIZING ABNORMAL ACCESS BEHAVIOR | Oct 30, 2018 | Abandoned |
Array
(
[id] => 17353783
[patent_doc_number] => 11228438
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-01-18
[patent_title] => Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device
[patent_app_type] => utility
[patent_app_number] => 16/146409
[patent_app_country] => US
[patent_app_date] => 2018-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 21
[patent_no_of_words] => 11018
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16146409
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/146409 | Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device | Sep 27, 2018 | Issued |
Array
(
[id] => 16685258
[patent_doc_number] => 10944758
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-03-09
[patent_title] => Computer resource vulnerability assessment and remediation
[patent_app_type] => utility
[patent_app_number] => 16/146439
[patent_app_country] => US
[patent_app_date] => 2018-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 13653
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16146439
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/146439 | Computer resource vulnerability assessment and remediation | Sep 27, 2018 | Issued |
Array
(
[id] => 16250505
[patent_doc_number] => 10749891
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-18
[patent_title] => Valuing cyber risks for insurance pricing and underwriting using network monitored sensors and methods of use
[patent_app_type] => utility
[patent_app_number] => 16/129820
[patent_app_country] => US
[patent_app_date] => 2018-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 9523
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 307
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16129820
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/129820 | Valuing cyber risks for insurance pricing and underwriting using network monitored sensors and methods of use | Sep 12, 2018 | Issued |
Array
(
[id] => 15705705
[patent_doc_number] => 10609048
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-31
[patent_title] => Systems and methods for the detection of advanced attackers using client side honeytokens
[patent_app_type] => utility
[patent_app_number] => 16/113124
[patent_app_country] => US
[patent_app_date] => 2018-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9175
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 249
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16113124
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/113124 | Systems and methods for the detection of advanced attackers using client side honeytokens | Aug 26, 2018 | Issued |
Array
(
[id] => 13611711
[patent_doc_number] => 20180357405
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-13
[patent_title] => Authentication Using an Interactive Cord
[patent_app_type] => utility
[patent_app_number] => 16/102216
[patent_app_country] => US
[patent_app_date] => 2018-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7389
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16102216
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/102216 | Authentication using an interactive cord | Aug 12, 2018 | Issued |
Array
(
[id] => 18982180
[patent_doc_number] => 11907354
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-02-20
[patent_title] => Secure authentication
[patent_app_type] => utility
[patent_app_number] => 16/059556
[patent_app_country] => US
[patent_app_date] => 2018-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10833
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 375
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16059556
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/059556 | Secure authentication | Aug 8, 2018 | Issued |