Marcus Charles
Examiner (ID: 7741, Phone: (571)272-7101 , Office: P/3656 )
Most Active Art Unit | 3656 |
Art Unit(s) | 3656, 3682, 3622, 3681 |
Total Applications | 2578 |
Issued Applications | 2127 |
Pending Applications | 87 |
Abandoned Applications | 364 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 6140647
[patent_doc_number] => 20110010540
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-13
[patent_title] => 'Method for Providing Information Security for Wireless Transmissions'
[patent_app_type] => utility
[patent_app_number] => 12/848745
[patent_app_country] => US
[patent_app_date] => 2010-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3128
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0010/20110010540.pdf
[firstpage_image] =>[orig_patent_app_number] => 12848745
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/848745 | Method for Providing Information Security for Wireless Transmissions | Aug 1, 2010 | Abandoned |
Array
(
[id] => 6273643
[patent_doc_number] => 20100299749
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-11-25
[patent_title] => 'Secure Booting System And Method'
[patent_app_type] => utility
[patent_app_number] => 12/846488
[patent_app_country] => US
[patent_app_date] => 2010-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 91
[patent_figures_cnt] => 91
[patent_no_of_words] => 21328
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0299/20100299749.pdf
[firstpage_image] =>[orig_patent_app_number] => 12846488
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/846488 | Secure booting system and method | Jul 28, 2010 | Issued |
Array
(
[id] => 9110264
[patent_doc_number] => 20130283396
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-24
[patent_title] => 'SYSTEM AND METHOD FOR LIMITING EXECUTION OF SOFTWARE TO AUTHORIZED USERS'
[patent_app_type] => utility
[patent_app_number] => 13/387914
[patent_app_country] => US
[patent_app_date] => 2010-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4923
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13387914
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/387914 | SYSTEM AND METHOD FOR LIMITING EXECUTION OF SOFTWARE TO AUTHORIZED USERS | Jul 25, 2010 | Abandoned |
Array
(
[id] => 8978974
[patent_doc_number] => 20130212404
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-15
[patent_title] => 'DOCUMENT MODIFICATION DETECTION AND PREVENTION'
[patent_app_type] => utility
[patent_app_number] => 12/795502
[patent_app_country] => US
[patent_app_date] => 2010-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5820
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12795502
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/795502 | Document modification detection and prevention | Jun 6, 2010 | Issued |
Array
(
[id] => 6584986
[patent_doc_number] => 20100235624
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-16
[patent_title] => 'METHOD AND APPARATUS FOR PROTECTING THE TRANSFER OF DATA'
[patent_app_type] => utility
[patent_app_number] => 12/790108
[patent_app_country] => US
[patent_app_date] => 2010-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 11019
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20100235624.pdf
[firstpage_image] =>[orig_patent_app_number] => 12790108
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/790108 | Method and apparatus for protecting the transfer of data | May 27, 2010 | Issued |
Array
(
[id] => 8144025
[patent_doc_number] => 20120096558
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-19
[patent_title] => 'Assessing Threat to at Least One Computer Network'
[patent_app_type] => utility
[patent_app_number] => 13/322298
[patent_app_country] => US
[patent_app_date] => 2010-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9796
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0096/20120096558.pdf
[firstpage_image] =>[orig_patent_app_number] => 13322298
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/322298 | Assessing threat to at least one computer network | May 18, 2010 | Issued |
Array
(
[id] => 8941840
[patent_doc_number] => 20130191637
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-25
[patent_title] => 'METHOD AND APPARATUS FOR AUTHENTICATED ENCRYPTION OF AUDIO'
[patent_app_type] => utility
[patent_app_number] => 13/638647
[patent_app_country] => US
[patent_app_date] => 2010-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1688
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13638647
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/638647 | METHOD AND APPARATUS FOR AUTHENTICATED ENCRYPTION OF AUDIO | Mar 30, 2010 | Abandoned |
Array
(
[id] => 6126364
[patent_doc_number] => 20110078794
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-31
[patent_title] => 'Network-Based Binary File Extraction and Analysis for Malware Detection'
[patent_app_type] => utility
[patent_app_number] => 12/571294
[patent_app_country] => US
[patent_app_date] => 2009-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8916
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0078/20110078794.pdf
[firstpage_image] =>[orig_patent_app_number] => 12571294
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/571294 | Network-based binary file extraction and analysis for malware detection | Sep 29, 2009 | Issued |
Array
(
[id] => 8445556
[patent_doc_number] => 08287603
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-10-16
[patent_title] => 'Electronic device with protection from unauthorized utilization'
[patent_app_type] => utility
[patent_app_number] => 12/538099
[patent_app_country] => US
[patent_app_date] => 2009-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 90
[patent_figures_cnt] => 99
[patent_no_of_words] => 21279
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12538099
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/538099 | Electronic device with protection from unauthorized utilization | Aug 6, 2009 | Issued |
Array
(
[id] => 6094072
[patent_doc_number] => 20110002460
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-06
[patent_title] => 'HIGH-SPEED CRYPTOGRAPHIC SYSTEM USING CHAOTIC SEQUENCES'
[patent_app_type] => utility
[patent_app_number] => 12/496085
[patent_app_country] => US
[patent_app_date] => 2009-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12406
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0002/20110002460.pdf
[firstpage_image] =>[orig_patent_app_number] => 12496085
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/496085 | High-speed cryptographic system using chaotic sequences | Jun 30, 2009 | Issued |
Array
(
[id] => 9878948
[patent_doc_number] => 08966244
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-24
[patent_title] => 'Embedded apparatus, remote-processing method, and computer program product'
[patent_app_type] => utility
[patent_app_number] => 12/495938
[patent_app_country] => US
[patent_app_date] => 2009-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 19
[patent_no_of_words] => 10104
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 303
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12495938
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/495938 | Embedded apparatus, remote-processing method, and computer program product | Jun 30, 2009 | Issued |
Array
(
[id] => 6340089
[patent_doc_number] => 20100329450
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-12-30
[patent_title] => 'INSTRUCTIONS FOR PERFORMING DATA ENCRYPTION STANDARD (DES) COMPUTATIONS USING GENERAL-PURPOSE REGISTERS'
[patent_app_type] => utility
[patent_app_number] => 12/494481
[patent_app_country] => US
[patent_app_date] => 2009-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 11003
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0329/20100329450.pdf
[firstpage_image] =>[orig_patent_app_number] => 12494481
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/494481 | INSTRUCTIONS FOR PERFORMING DATA ENCRYPTION STANDARD (DES) COMPUTATIONS USING GENERAL-PURPOSE REGISTERS | Jun 29, 2009 | Abandoned |
Array
(
[id] => 8985102
[patent_doc_number] => 08516232
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-20
[patent_title] => 'Method and memory device for performing an operation on data'
[patent_app_type] => utility
[patent_app_number] => 12/495302
[patent_app_country] => US
[patent_app_date] => 2009-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4585
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12495302
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/495302 | Method and memory device for performing an operation on data | Jun 29, 2009 | Issued |
Array
(
[id] => 9680519
[patent_doc_number] => 08819446
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-08-26
[patent_title] => 'Support for secure objects in a computer system'
[patent_app_type] => utility
[patent_app_number] => 12/492738
[patent_app_country] => US
[patent_app_date] => 2009-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 5498
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12492738
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/492738 | Support for secure objects in a computer system | Jun 25, 2009 | Issued |
Array
(
[id] => 6539241
[patent_doc_number] => 20100287613
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-11-11
[patent_title] => 'SANITIZATION OF PACKETS'
[patent_app_type] => utility
[patent_app_number] => 12/437559
[patent_app_country] => US
[patent_app_date] => 2009-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6384
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0287/20100287613.pdf
[firstpage_image] =>[orig_patent_app_number] => 12437559
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/437559 | Sanitization of packets | May 7, 2009 | Issued |
Array
(
[id] => 7536768
[patent_doc_number] => 08050408
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-11-01
[patent_title] => 'Techniques for managing keys using a key server in a network segment'
[patent_app_type] => utility
[patent_app_number] => 12/412109
[patent_app_country] => US
[patent_app_date] => 2009-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 4608
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/050/08050408.pdf
[firstpage_image] =>[orig_patent_app_number] => 12412109
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/412109 | Techniques for managing keys using a key server in a network segment | Mar 25, 2009 | Issued |
Array
(
[id] => 7682321
[patent_doc_number] => 20100242090
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-23
[patent_title] => 'USER AUTHENTICATION METHOD AND SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 12/408757
[patent_app_country] => US
[patent_app_date] => 2009-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3567
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0242/20100242090.pdf
[firstpage_image] =>[orig_patent_app_number] => 12408757
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/408757 | User authentication method and system | Mar 22, 2009 | Issued |
Array
(
[id] => 10854574
[patent_doc_number] => 08881287
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-04
[patent_title] => 'Systems and methods for library function identification in automatic malware signature generation'
[patent_app_type] => utility
[patent_app_number] => 12/408277
[patent_app_country] => US
[patent_app_date] => 2009-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8854
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12408277
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/408277 | Systems and methods for library function identification in automatic malware signature generation | Mar 19, 2009 | Issued |
Array
(
[id] => 7682316
[patent_doc_number] => 20100242095
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-23
[patent_title] => 'METHOD AND APPARATUS FOR MULTI-USER, MULTI-APPLICATION INTERNET ACCESS AUTHENTICATION AND CONTROL'
[patent_app_type] => utility
[patent_app_number] => 12/407852
[patent_app_country] => US
[patent_app_date] => 2009-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 1763
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0242/20100242095.pdf
[firstpage_image] =>[orig_patent_app_number] => 12407852
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/407852 | METHOD AND APPARATUS FOR MULTI-USER, MULTI-APPLICATION INTERNET ACCESS AUTHENTICATION AND CONTROL | Mar 19, 2009 | Abandoned |
Array
(
[id] => 5472345
[patent_doc_number] => 20090245511
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-10-01
[patent_title] => 'IMAGE ENCRYPTION APPARATUS AND IMAGE DECRYPTION APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 12/407119
[patent_app_country] => US
[patent_app_date] => 2009-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 4872
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0245/20090245511.pdf
[firstpage_image] =>[orig_patent_app_number] => 12407119
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/407119 | IMAGE ENCRYPTION APPARATUS AND IMAGE DECRYPTION APPARATUS | Mar 18, 2009 | Abandoned |