Search

Marcus Charles

Examiner (ID: 7741, Phone: (571)272-7101 , Office: P/3656 )

Most Active Art Unit
3656
Art Unit(s)
3656, 3682, 3622, 3681
Total Applications
2578
Issued Applications
2127
Pending Applications
87
Abandoned Applications
364

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9208078 [patent_doc_number] => 20140007255 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-01-02 [patent_title] => 'Privacy Control in a Social Network' [patent_app_type] => utility [patent_app_number] => 13/535920 [patent_app_country] => US [patent_app_date] => 2012-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 7029 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 10 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13535920 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/535920
Privacy Control in a Social Network Jun 27, 2012 Abandoned
Array ( [id] => 8433134 [patent_doc_number] => 20120255009 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-10-04 [patent_title] => 'METHOD AND APPARATUS FOR COMBATING MALICIOUS CODE' [patent_app_type] => utility [patent_app_number] => 13/490998 [patent_app_country] => US [patent_app_date] => 2012-06-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3254 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13490998 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/490998
METHOD AND APPARATUS FOR COMBATING MALICIOUS CODE Jun 6, 2012 Abandoned
Array ( [id] => 8395620 [patent_doc_number] => 20120233459 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-09-13 [patent_title] => 'System and Method for Content Protection on a Computing Device' [patent_app_type] => utility [patent_app_number] => 13/481892 [patent_app_country] => US [patent_app_date] => 2012-05-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 6656 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13481892 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/481892
System and method for content protection on a computing device May 27, 2012 Issued
Array ( [id] => 9242516 [patent_doc_number] => 08607323 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-12-10 [patent_title] => 'Method for providing media communication across firewalls' [patent_app_type] => utility [patent_app_number] => 13/506330 [patent_app_country] => US [patent_app_date] => 2012-04-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 16 [patent_no_of_words] => 8101 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 119 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13506330 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/506330
Method for providing media communication across firewalls Apr 10, 2012 Issued
Array ( [id] => 8952865 [patent_doc_number] => 20130198646 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-08-01 [patent_title] => 'METHOD AND SYSTEM FOR PROTECTING USER CHOICES' [patent_app_type] => utility [patent_app_number] => 13/442507 [patent_app_country] => US [patent_app_date] => 2012-04-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5352 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13442507 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/442507
Method and system for protecting user choices Apr 8, 2012 Issued
Array ( [id] => 11565846 [patent_doc_number] => 09628452 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-04-18 [patent_title] => 'Mobile device security' [patent_app_type] => utility [patent_app_number] => 13/982188 [patent_app_country] => US [patent_app_date] => 2012-01-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 1 [patent_no_of_words] => 6562 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 20 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13982188 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/982188
Mobile device security Jan 29, 2012 Issued
Array ( [id] => 9826283 [patent_doc_number] => 08935779 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-01-13 [patent_title] => 'Network-based binary file extraction and analysis for malware detection' [patent_app_type] => utility [patent_app_number] => 13/350645 [patent_app_country] => US [patent_app_date] => 2012-01-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8946 [patent_no_of_claims] => 76 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 234 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13350645 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/350645
Network-based binary file extraction and analysis for malware detection Jan 12, 2012 Issued
Array ( [id] => 12048335 [patent_doc_number] => 09825952 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-11-21 [patent_title] => 'Secure machine to machine communication' [patent_app_type] => utility [patent_app_number] => 13/976069 [patent_app_country] => US [patent_app_date] => 2011-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4493 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 183 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13976069 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/976069
Secure machine to machine communication Dec 29, 2011 Issued
Array ( [id] => 8781978 [patent_doc_number] => 20130103953 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-04-25 [patent_title] => 'APPARATUS AND METHOD FOR ENCRYPTING HARD DISK' [patent_app_type] => utility [patent_app_number] => 13/325915 [patent_app_country] => US [patent_app_date] => 2011-12-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5118 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13325915 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/325915
APPARATUS AND METHOD FOR ENCRYPTING HARD DISK Dec 13, 2011 Abandoned
Array ( [id] => 10632656 [patent_doc_number] => 09350819 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-05-24 [patent_title] => 'Centralized service for distributed service deployments' [patent_app_type] => utility [patent_app_number] => 13/325995 [patent_app_country] => US [patent_app_date] => 2011-12-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6401 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 213 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13325995 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/325995
Centralized service for distributed service deployments Dec 13, 2011 Issued
Array ( [id] => 8254836 [patent_doc_number] => 20120159165 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-21 [patent_title] => 'Protecting Computers Using an Identity-Based Router' [patent_app_type] => utility [patent_app_number] => 13/324737 [patent_app_country] => US [patent_app_date] => 2011-12-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4222 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0159/20120159165.pdf [firstpage_image] =>[orig_patent_app_number] => 13324737 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/324737
Protecting computers using an identity-based router Dec 12, 2011 Issued
Array ( [id] => 10179937 [patent_doc_number] => 09210161 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-08 [patent_title] => 'Authentication certificates as source of contextual information in business intelligence processes' [patent_app_type] => utility [patent_app_number] => 13/324805 [patent_app_country] => US [patent_app_date] => 2011-12-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3120 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 168 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13324805 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/324805
Authentication certificates as source of contextual information in business intelligence processes Dec 12, 2011 Issued
Array ( [id] => 8242860 [patent_doc_number] => 20120151600 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-14 [patent_title] => 'METHOD AND SYSTEM FOR PROTECTING INTELLECTUAL PROPERTY IN SOFTWARE' [patent_app_type] => utility [patent_app_number] => 13/323786 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 27 [patent_figures_cnt] => 27 [patent_no_of_words] => 6855 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323786 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/323786
Method and system for protecting intellectual property in software Dec 11, 2011 Issued
Array ( [id] => 10172891 [patent_doc_number] => 09203609 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-01 [patent_title] => 'Method and apparatus for implementing key stream hierarchy' [patent_app_type] => utility [patent_app_number] => 13/316932 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 9714 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 157 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13316932 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/316932
Method and apparatus for implementing key stream hierarchy Dec 11, 2011 Issued
Array ( [id] => 8865107 [patent_doc_number] => 20130148810 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-06-13 [patent_title] => 'SINGLE USE RECOVERY KEY' [patent_app_type] => utility [patent_app_number] => 13/316587 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9021 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13316587 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/316587
Single use recovery key Dec 11, 2011 Issued
Array ( [id] => 8868485 [patent_doc_number] => 20130152188 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-06-13 [patent_title] => 'PORT ALLOCATION IN A FIREWALL CLUSTER' [patent_app_type] => utility [patent_app_number] => 13/323815 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2932 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323815 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/323815
Port allocation in a firewall cluster Dec 11, 2011 Issued
Array ( [id] => 11780751 [patent_doc_number] => 09389933 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-07-12 [patent_title] => 'Facilitating system service request interactions for hardware-protected applications' [patent_app_type] => utility [patent_app_number] => 13/323562 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7299 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323562 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/323562
Facilitating system service request interactions for hardware-protected applications Dec 11, 2011 Issued
Array ( [id] => 8864950 [patent_doc_number] => 20130148653 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-06-13 [patent_title] => 'MECHANISM FOR ESTABLISHING REPUTATION IN A NETWORK ENVIRONMENT' [patent_app_type] => utility [patent_app_number] => 13/313933 [patent_app_country] => US [patent_app_date] => 2011-12-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 12180 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13313933 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/313933
Mechanism for establishing reputation in a network environment Dec 6, 2011 Issued
Array ( [id] => 8693189 [patent_doc_number] => 08392725 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-03-05 [patent_title] => 'Method for fast decryption of processor instructions' [patent_app_type] => utility [patent_app_number] => 13/301227 [patent_app_country] => US [patent_app_date] => 2011-11-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 3347 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 94 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13301227 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/301227
Method for fast decryption of processor instructions Nov 20, 2011 Issued
Array ( [id] => 8677424 [patent_doc_number] => 08385552 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-02-26 [patent_title] => 'Techniques for managing keys using a key server in a network segment' [patent_app_type] => utility [patent_app_number] => 13/285938 [patent_app_country] => US [patent_app_date] => 2011-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 4625 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 249 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13285938 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/285938
Techniques for managing keys using a key server in a network segment Oct 30, 2011 Issued
Menu