Marcus Charles
Examiner (ID: 7741, Phone: (571)272-7101 , Office: P/3656 )
Most Active Art Unit | 3656 |
Art Unit(s) | 3656, 3682, 3622, 3681 |
Total Applications | 2578 |
Issued Applications | 2127 |
Pending Applications | 87 |
Abandoned Applications | 364 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 9208078
[patent_doc_number] => 20140007255
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-02
[patent_title] => 'Privacy Control in a Social Network'
[patent_app_type] => utility
[patent_app_number] => 13/535920
[patent_app_country] => US
[patent_app_date] => 2012-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7029
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13535920
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/535920 | Privacy Control in a Social Network | Jun 27, 2012 | Abandoned |
Array
(
[id] => 8433134
[patent_doc_number] => 20120255009
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-04
[patent_title] => 'METHOD AND APPARATUS FOR COMBATING MALICIOUS CODE'
[patent_app_type] => utility
[patent_app_number] => 13/490998
[patent_app_country] => US
[patent_app_date] => 2012-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3254
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13490998
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/490998 | METHOD AND APPARATUS FOR COMBATING MALICIOUS CODE | Jun 6, 2012 | Abandoned |
Array
(
[id] => 8395620
[patent_doc_number] => 20120233459
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-09-13
[patent_title] => 'System and Method for Content Protection on a Computing Device'
[patent_app_type] => utility
[patent_app_number] => 13/481892
[patent_app_country] => US
[patent_app_date] => 2012-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6656
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13481892
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/481892 | System and method for content protection on a computing device | May 27, 2012 | Issued |
Array
(
[id] => 9242516
[patent_doc_number] => 08607323
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-12-10
[patent_title] => 'Method for providing media communication across firewalls'
[patent_app_type] => utility
[patent_app_number] => 13/506330
[patent_app_country] => US
[patent_app_date] => 2012-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 16
[patent_no_of_words] => 8101
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13506330
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/506330 | Method for providing media communication across firewalls | Apr 10, 2012 | Issued |
Array
(
[id] => 8952865
[patent_doc_number] => 20130198646
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-01
[patent_title] => 'METHOD AND SYSTEM FOR PROTECTING USER CHOICES'
[patent_app_type] => utility
[patent_app_number] => 13/442507
[patent_app_country] => US
[patent_app_date] => 2012-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5352
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13442507
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/442507 | Method and system for protecting user choices | Apr 8, 2012 | Issued |
Array
(
[id] => 11565846
[patent_doc_number] => 09628452
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-18
[patent_title] => 'Mobile device security'
[patent_app_type] => utility
[patent_app_number] => 13/982188
[patent_app_country] => US
[patent_app_date] => 2012-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 6562
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 20
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13982188
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/982188 | Mobile device security | Jan 29, 2012 | Issued |
Array
(
[id] => 9826283
[patent_doc_number] => 08935779
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-13
[patent_title] => 'Network-based binary file extraction and analysis for malware detection'
[patent_app_type] => utility
[patent_app_number] => 13/350645
[patent_app_country] => US
[patent_app_date] => 2012-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8946
[patent_no_of_claims] => 76
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13350645
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/350645 | Network-based binary file extraction and analysis for malware detection | Jan 12, 2012 | Issued |
Array
(
[id] => 12048335
[patent_doc_number] => 09825952
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-21
[patent_title] => 'Secure machine to machine communication'
[patent_app_type] => utility
[patent_app_number] => 13/976069
[patent_app_country] => US
[patent_app_date] => 2011-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4493
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13976069
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/976069 | Secure machine to machine communication | Dec 29, 2011 | Issued |
Array
(
[id] => 8781978
[patent_doc_number] => 20130103953
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-25
[patent_title] => 'APPARATUS AND METHOD FOR ENCRYPTING HARD DISK'
[patent_app_type] => utility
[patent_app_number] => 13/325915
[patent_app_country] => US
[patent_app_date] => 2011-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5118
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13325915
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/325915 | APPARATUS AND METHOD FOR ENCRYPTING HARD DISK | Dec 13, 2011 | Abandoned |
Array
(
[id] => 10632656
[patent_doc_number] => 09350819
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-24
[patent_title] => 'Centralized service for distributed service deployments'
[patent_app_type] => utility
[patent_app_number] => 13/325995
[patent_app_country] => US
[patent_app_date] => 2011-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6401
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13325995
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/325995 | Centralized service for distributed service deployments | Dec 13, 2011 | Issued |
Array
(
[id] => 8254836
[patent_doc_number] => 20120159165
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-21
[patent_title] => 'Protecting Computers Using an Identity-Based Router'
[patent_app_type] => utility
[patent_app_number] => 13/324737
[patent_app_country] => US
[patent_app_date] => 2011-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4222
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0159/20120159165.pdf
[firstpage_image] =>[orig_patent_app_number] => 13324737
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/324737 | Protecting computers using an identity-based router | Dec 12, 2011 | Issued |
Array
(
[id] => 10179937
[patent_doc_number] => 09210161
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-08
[patent_title] => 'Authentication certificates as source of contextual information in business intelligence processes'
[patent_app_type] => utility
[patent_app_number] => 13/324805
[patent_app_country] => US
[patent_app_date] => 2011-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3120
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13324805
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/324805 | Authentication certificates as source of contextual information in business intelligence processes | Dec 12, 2011 | Issued |
Array
(
[id] => 8242860
[patent_doc_number] => 20120151600
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-14
[patent_title] => 'METHOD AND SYSTEM FOR PROTECTING INTELLECTUAL PROPERTY IN SOFTWARE'
[patent_app_type] => utility
[patent_app_number] => 13/323786
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 6855
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323786
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/323786 | Method and system for protecting intellectual property in software | Dec 11, 2011 | Issued |
Array
(
[id] => 10172891
[patent_doc_number] => 09203609
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-01
[patent_title] => 'Method and apparatus for implementing key stream hierarchy'
[patent_app_type] => utility
[patent_app_number] => 13/316932
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 9714
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13316932
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/316932 | Method and apparatus for implementing key stream hierarchy | Dec 11, 2011 | Issued |
Array
(
[id] => 8865107
[patent_doc_number] => 20130148810
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-13
[patent_title] => 'SINGLE USE RECOVERY KEY'
[patent_app_type] => utility
[patent_app_number] => 13/316587
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9021
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13316587
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/316587 | Single use recovery key | Dec 11, 2011 | Issued |
Array
(
[id] => 8868485
[patent_doc_number] => 20130152188
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-13
[patent_title] => 'PORT ALLOCATION IN A FIREWALL CLUSTER'
[patent_app_type] => utility
[patent_app_number] => 13/323815
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2932
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323815
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/323815 | Port allocation in a firewall cluster | Dec 11, 2011 | Issued |
Array
(
[id] => 11780751
[patent_doc_number] => 09389933
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'Facilitating system service request interactions for hardware-protected applications'
[patent_app_type] => utility
[patent_app_number] => 13/323562
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7299
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323562
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/323562 | Facilitating system service request interactions for hardware-protected applications | Dec 11, 2011 | Issued |
Array
(
[id] => 8864950
[patent_doc_number] => 20130148653
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-13
[patent_title] => 'MECHANISM FOR ESTABLISHING REPUTATION IN A NETWORK ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 13/313933
[patent_app_country] => US
[patent_app_date] => 2011-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12180
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13313933
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/313933 | Mechanism for establishing reputation in a network environment | Dec 6, 2011 | Issued |
Array
(
[id] => 8693189
[patent_doc_number] => 08392725
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-03-05
[patent_title] => 'Method for fast decryption of processor instructions'
[patent_app_type] => utility
[patent_app_number] => 13/301227
[patent_app_country] => US
[patent_app_date] => 2011-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 3347
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13301227
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/301227 | Method for fast decryption of processor instructions | Nov 20, 2011 | Issued |
Array
(
[id] => 8677424
[patent_doc_number] => 08385552
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-02-26
[patent_title] => 'Techniques for managing keys using a key server in a network segment'
[patent_app_type] => utility
[patent_app_number] => 13/285938
[patent_app_country] => US
[patent_app_date] => 2011-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 4625
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 249
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13285938
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/285938 | Techniques for managing keys using a key server in a network segment | Oct 30, 2011 | Issued |