Search

Marcus Charles

Examiner (ID: 7741, Phone: (571)272-7101 , Office: P/3656 )

Most Active Art Unit
3656
Art Unit(s)
3656, 3682, 3622, 3681
Total Applications
2578
Issued Applications
2127
Pending Applications
87
Abandoned Applications
364

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 6140647 [patent_doc_number] => 20110010540 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-13 [patent_title] => 'Method for Providing Information Security for Wireless Transmissions' [patent_app_type] => utility [patent_app_number] => 12/848745 [patent_app_country] => US [patent_app_date] => 2010-08-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3128 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0010/20110010540.pdf [firstpage_image] =>[orig_patent_app_number] => 12848745 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/848745
Method for Providing Information Security for Wireless Transmissions Aug 1, 2010 Abandoned
Array ( [id] => 6273643 [patent_doc_number] => 20100299749 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-11-25 [patent_title] => 'Secure Booting System And Method' [patent_app_type] => utility [patent_app_number] => 12/846488 [patent_app_country] => US [patent_app_date] => 2010-07-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 91 [patent_figures_cnt] => 91 [patent_no_of_words] => 21328 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0299/20100299749.pdf [firstpage_image] =>[orig_patent_app_number] => 12846488 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/846488
Secure booting system and method Jul 28, 2010 Issued
Array ( [id] => 9110264 [patent_doc_number] => 20130283396 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-10-24 [patent_title] => 'SYSTEM AND METHOD FOR LIMITING EXECUTION OF SOFTWARE TO AUTHORIZED USERS' [patent_app_type] => utility [patent_app_number] => 13/387914 [patent_app_country] => US [patent_app_date] => 2010-07-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4923 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13387914 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/387914
SYSTEM AND METHOD FOR LIMITING EXECUTION OF SOFTWARE TO AUTHORIZED USERS Jul 25, 2010 Abandoned
Array ( [id] => 8978974 [patent_doc_number] => 20130212404 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-08-15 [patent_title] => 'DOCUMENT MODIFICATION DETECTION AND PREVENTION' [patent_app_type] => utility [patent_app_number] => 12/795502 [patent_app_country] => US [patent_app_date] => 2010-06-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5820 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12795502 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/795502
Document modification detection and prevention Jun 6, 2010 Issued
Array ( [id] => 6584986 [patent_doc_number] => 20100235624 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-09-16 [patent_title] => 'METHOD AND APPARATUS FOR PROTECTING THE TRANSFER OF DATA' [patent_app_type] => utility [patent_app_number] => 12/790108 [patent_app_country] => US [patent_app_date] => 2010-05-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 22 [patent_figures_cnt] => 22 [patent_no_of_words] => 11019 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0235/20100235624.pdf [firstpage_image] =>[orig_patent_app_number] => 12790108 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/790108
Method and apparatus for protecting the transfer of data May 27, 2010 Issued
Array ( [id] => 8144025 [patent_doc_number] => 20120096558 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-19 [patent_title] => 'Assessing Threat to at Least One Computer Network' [patent_app_type] => utility [patent_app_number] => 13/322298 [patent_app_country] => US [patent_app_date] => 2010-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 9796 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0096/20120096558.pdf [firstpage_image] =>[orig_patent_app_number] => 13322298 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/322298
Assessing threat to at least one computer network May 18, 2010 Issued
Array ( [id] => 8941840 [patent_doc_number] => 20130191637 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-07-25 [patent_title] => 'METHOD AND APPARATUS FOR AUTHENTICATED ENCRYPTION OF AUDIO' [patent_app_type] => utility [patent_app_number] => 13/638647 [patent_app_country] => US [patent_app_date] => 2010-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 1688 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13638647 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/638647
METHOD AND APPARATUS FOR AUTHENTICATED ENCRYPTION OF AUDIO Mar 30, 2010 Abandoned
Array ( [id] => 6126364 [patent_doc_number] => 20110078794 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-31 [patent_title] => 'Network-Based Binary File Extraction and Analysis for Malware Detection' [patent_app_type] => utility [patent_app_number] => 12/571294 [patent_app_country] => US [patent_app_date] => 2009-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8916 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0078/20110078794.pdf [firstpage_image] =>[orig_patent_app_number] => 12571294 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/571294
Network-based binary file extraction and analysis for malware detection Sep 29, 2009 Issued
Array ( [id] => 8445556 [patent_doc_number] => 08287603 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-10-16 [patent_title] => 'Electronic device with protection from unauthorized utilization' [patent_app_type] => utility [patent_app_number] => 12/538099 [patent_app_country] => US [patent_app_date] => 2009-08-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 90 [patent_figures_cnt] => 99 [patent_no_of_words] => 21279 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 131 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12538099 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/538099
Electronic device with protection from unauthorized utilization Aug 6, 2009 Issued
Array ( [id] => 6094072 [patent_doc_number] => 20110002460 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-06 [patent_title] => 'HIGH-SPEED CRYPTOGRAPHIC SYSTEM USING CHAOTIC SEQUENCES' [patent_app_type] => utility [patent_app_number] => 12/496085 [patent_app_country] => US [patent_app_date] => 2009-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 12406 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0002/20110002460.pdf [firstpage_image] =>[orig_patent_app_number] => 12496085 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/496085
High-speed cryptographic system using chaotic sequences Jun 30, 2009 Issued
Array ( [id] => 9878948 [patent_doc_number] => 08966244 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-02-24 [patent_title] => 'Embedded apparatus, remote-processing method, and computer program product' [patent_app_type] => utility [patent_app_number] => 12/495938 [patent_app_country] => US [patent_app_date] => 2009-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 19 [patent_no_of_words] => 10104 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 303 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12495938 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/495938
Embedded apparatus, remote-processing method, and computer program product Jun 30, 2009 Issued
Array ( [id] => 6340089 [patent_doc_number] => 20100329450 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-12-30 [patent_title] => 'INSTRUCTIONS FOR PERFORMING DATA ENCRYPTION STANDARD (DES) COMPUTATIONS USING GENERAL-PURPOSE REGISTERS' [patent_app_type] => utility [patent_app_number] => 12/494481 [patent_app_country] => US [patent_app_date] => 2009-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 11003 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0329/20100329450.pdf [firstpage_image] =>[orig_patent_app_number] => 12494481 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/494481
INSTRUCTIONS FOR PERFORMING DATA ENCRYPTION STANDARD (DES) COMPUTATIONS USING GENERAL-PURPOSE REGISTERS Jun 29, 2009 Abandoned
Array ( [id] => 8985102 [patent_doc_number] => 08516232 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-08-20 [patent_title] => 'Method and memory device for performing an operation on data' [patent_app_type] => utility [patent_app_number] => 12/495302 [patent_app_country] => US [patent_app_date] => 2009-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4585 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 146 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12495302 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/495302
Method and memory device for performing an operation on data Jun 29, 2009 Issued
Array ( [id] => 9680519 [patent_doc_number] => 08819446 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-08-26 [patent_title] => 'Support for secure objects in a computer system' [patent_app_type] => utility [patent_app_number] => 12/492738 [patent_app_country] => US [patent_app_date] => 2009-06-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 10 [patent_no_of_words] => 5498 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 195 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12492738 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/492738
Support for secure objects in a computer system Jun 25, 2009 Issued
Array ( [id] => 6539241 [patent_doc_number] => 20100287613 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-11-11 [patent_title] => 'SANITIZATION OF PACKETS' [patent_app_type] => utility [patent_app_number] => 12/437559 [patent_app_country] => US [patent_app_date] => 2009-05-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6384 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0287/20100287613.pdf [firstpage_image] =>[orig_patent_app_number] => 12437559 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/437559
Sanitization of packets May 7, 2009 Issued
Array ( [id] => 7536768 [patent_doc_number] => 08050408 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-11-01 [patent_title] => 'Techniques for managing keys using a key server in a network segment' [patent_app_type] => utility [patent_app_number] => 12/412109 [patent_app_country] => US [patent_app_date] => 2009-03-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 4608 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 158 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/050/08050408.pdf [firstpage_image] =>[orig_patent_app_number] => 12412109 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/412109
Techniques for managing keys using a key server in a network segment Mar 25, 2009 Issued
Array ( [id] => 7682321 [patent_doc_number] => 20100242090 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-09-23 [patent_title] => 'USER AUTHENTICATION METHOD AND SYSTEM' [patent_app_type] => utility [patent_app_number] => 12/408757 [patent_app_country] => US [patent_app_date] => 2009-03-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3567 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0242/20100242090.pdf [firstpage_image] =>[orig_patent_app_number] => 12408757 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/408757
User authentication method and system Mar 22, 2009 Issued
Array ( [id] => 10854574 [patent_doc_number] => 08881287 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-11-04 [patent_title] => 'Systems and methods for library function identification in automatic malware signature generation' [patent_app_type] => utility [patent_app_number] => 12/408277 [patent_app_country] => US [patent_app_date] => 2009-03-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8854 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 116 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12408277 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/408277
Systems and methods for library function identification in automatic malware signature generation Mar 19, 2009 Issued
Array ( [id] => 7682316 [patent_doc_number] => 20100242095 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-09-23 [patent_title] => 'METHOD AND APPARATUS FOR MULTI-USER, MULTI-APPLICATION INTERNET ACCESS AUTHENTICATION AND CONTROL' [patent_app_type] => utility [patent_app_number] => 12/407852 [patent_app_country] => US [patent_app_date] => 2009-03-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 1763 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0242/20100242095.pdf [firstpage_image] =>[orig_patent_app_number] => 12407852 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/407852
METHOD AND APPARATUS FOR MULTI-USER, MULTI-APPLICATION INTERNET ACCESS AUTHENTICATION AND CONTROL Mar 19, 2009 Abandoned
Array ( [id] => 5472345 [patent_doc_number] => 20090245511 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-10-01 [patent_title] => 'IMAGE ENCRYPTION APPARATUS AND IMAGE DECRYPTION APPARATUS' [patent_app_type] => utility [patent_app_number] => 12/407119 [patent_app_country] => US [patent_app_date] => 2009-03-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 23 [patent_figures_cnt] => 23 [patent_no_of_words] => 4872 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0245/20090245511.pdf [firstpage_image] =>[orig_patent_app_number] => 12407119 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/407119
IMAGE ENCRYPTION APPARATUS AND IMAGE DECRYPTION APPARATUS Mar 18, 2009 Abandoned
Menu