Search

Marcus Charles

Examiner (ID: 7741, Phone: (571)272-7101 , Office: P/3656 )

Most Active Art Unit
3656
Art Unit(s)
3656, 3682, 3622, 3681
Total Applications
2578
Issued Applications
2127
Pending Applications
87
Abandoned Applications
364

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 5770819 [patent_doc_number] => 20060020818 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-01-26 [patent_title] => 'Disk control unit' [patent_app_type] => utility [patent_app_number] => 11/234196 [patent_app_country] => US [patent_app_date] => 2005-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5095 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0020/20060020818.pdf [firstpage_image] =>[orig_patent_app_number] => 11234196 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/234196
Disk control unit Sep 25, 2005 Issued
Array ( [id] => 5144097 [patent_doc_number] => 20070006313 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-01-04 [patent_title] => 'Method and apparatus for combating malicious code' [patent_app_type] => utility [patent_app_number] => 11/230419 [patent_app_country] => US [patent_app_date] => 2005-09-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3232 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0006/20070006313.pdf [firstpage_image] =>[orig_patent_app_number] => 11230419 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/230419
Method and apparatus for combating malicious code Sep 18, 2005 Issued
Array ( [id] => 4636940 [patent_doc_number] => 08015404 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-09-06 [patent_title] => 'System and method for collecting traffic data using probe vehicles' [patent_app_type] => utility [patent_app_number] => 11/229116 [patent_app_country] => US [patent_app_date] => 2005-09-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 1862 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 198 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/015/08015404.pdf [firstpage_image] =>[orig_patent_app_number] => 11229116 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/229116
System and method for collecting traffic data using probe vehicles Sep 15, 2005 Issued
Array ( [id] => 7231162 [patent_doc_number] => 20050262086 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-11-24 [patent_title] => 'Systems and methods for integrity certification and verification' [patent_app_type] => utility [patent_app_number] => 11/117444 [patent_app_country] => US [patent_app_date] => 2005-04-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 13871 [patent_no_of_claims] => 87 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0262/20050262086.pdf [firstpage_image] =>[orig_patent_app_number] => 11117444 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/117444
Systems and methods for integrity certification and verification Apr 28, 2005 Abandoned
Array ( [id] => 9404724 [patent_doc_number] => 08694788 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-04-08 [patent_title] => 'Security system' [patent_app_type] => utility [patent_app_number] => 11/117877 [patent_app_country] => US [patent_app_date] => 2005-04-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5047 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 150 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11117877 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/117877
Security system Apr 28, 2005 Issued
Array ( [id] => 5597869 [patent_doc_number] => 20060161787 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-07-20 [patent_title] => 'Authentication key and apparatus, method, and computer program for authentication' [patent_app_type] => utility [patent_app_number] => 11/117751 [patent_app_country] => US [patent_app_date] => 2005-04-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 10172 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0161/20060161787.pdf [firstpage_image] =>[orig_patent_app_number] => 11117751 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/117751
Authentication key and apparatus, method, and computer program for authentication Apr 28, 2005 Abandoned
Array ( [id] => 7241092 [patent_doc_number] => 20050257043 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-11-17 [patent_title] => 'System and method for content protection on a computing device' [patent_app_type] => utility [patent_app_number] => 11/118133 [patent_app_country] => US [patent_app_date] => 2005-04-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 6600 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0257/20050257043.pdf [firstpage_image] =>[orig_patent_app_number] => 11118133 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/118133
System and method for content protection on a computing device Apr 28, 2005 Issued
Array ( [id] => 5836753 [patent_doc_number] => 20060248585 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-11-02 [patent_title] => 'Mandatory integrity control' [patent_app_type] => utility [patent_app_number] => 11/117621 [patent_app_country] => US [patent_app_date] => 2005-04-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6570 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0248/20060248585.pdf [firstpage_image] =>[orig_patent_app_number] => 11117621 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/117621
Mandatory integrity control Apr 27, 2005 Issued
Array ( [id] => 5928510 [patent_doc_number] => 20060242702 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-10-26 [patent_title] => 'Method for fast decryption of processor instructions in an encrypted instruction power architecture' [patent_app_type] => utility [patent_app_number] => 11/114552 [patent_app_country] => US [patent_app_date] => 2005-04-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4658 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0242/20060242702.pdf [firstpage_image] =>[orig_patent_app_number] => 11114552 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/114552
Method for fast decryption of processor instructions in an encrypted instruction power architecture Apr 25, 2005 Issued
Array ( [id] => 5928513 [patent_doc_number] => 20060242705 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-10-26 [patent_title] => 'System and method for detection and mitigation of network worms' [patent_app_type] => utility [patent_app_number] => 11/114575 [patent_app_country] => US [patent_app_date] => 2005-04-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 4027 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0242/20060242705.pdf [firstpage_image] =>[orig_patent_app_number] => 11114575 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/114575
System and method for detection and mitigation of network worms Apr 25, 2005 Issued
Array ( [id] => 5770811 [patent_doc_number] => 20060020812 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-01-26 [patent_title] => 'System and method of using human friendly representations of mathematical function results and transaction analysis to prevent fraud' [patent_app_type] => utility [patent_app_number] => 11/114945 [patent_app_country] => US [patent_app_date] => 2005-04-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6052 [patent_no_of_claims] => 37 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0020/20060020812.pdf [firstpage_image] =>[orig_patent_app_number] => 11114945 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/114945
System and method of using human friendly representations of mathematical function results and transaction analysis to prevent fraud Apr 25, 2005 Abandoned
Array ( [id] => 372366 [patent_doc_number] => 07478423 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2009-01-13 [patent_title] => 'Protected execution environments within a computer system' [patent_app_type] => utility [patent_app_number] => 11/106832 [patent_app_country] => US [patent_app_date] => 2005-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 6486 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 100 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/478/07478423.pdf [firstpage_image] =>[orig_patent_app_number] => 11106832 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/106832
Protected execution environments within a computer system Apr 14, 2005 Issued
Array ( [id] => 7140744 [patent_doc_number] => 20050182964 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-08-18 [patent_title] => 'Protected execution environments within a computer system' [patent_app_type] => utility [patent_app_number] => 11/107018 [patent_app_country] => US [patent_app_date] => 2005-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6479 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0182/20050182964.pdf [firstpage_image] =>[orig_patent_app_number] => 11107018 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/107018
Protected execution environments within a computer system Apr 14, 2005 Issued
Array ( [id] => 375115 [patent_doc_number] => 07475423 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2009-01-06 [patent_title] => 'Protected execution environments within a computer system' [patent_app_type] => utility [patent_app_number] => 11/106942 [patent_app_country] => US [patent_app_date] => 2005-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 6484 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/475/07475423.pdf [firstpage_image] =>[orig_patent_app_number] => 11106942 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/106942
Protected execution environments within a computer system Apr 14, 2005 Issued
Array ( [id] => 7052508 [patent_doc_number] => 20050188227 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-08-25 [patent_title] => 'Protected execution environments within a computer system' [patent_app_type] => utility [patent_app_number] => 11/106951 [patent_app_country] => US [patent_app_date] => 2005-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6479 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0188/20050188227.pdf [firstpage_image] =>[orig_patent_app_number] => 11106951 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/106951
Protected execution environments within a computer system Apr 14, 2005 Issued
Array ( [id] => 6943930 [patent_doc_number] => 20050195979 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-09-08 [patent_title] => 'System and method for limiting access to data' [patent_app_type] => utility [patent_app_number] => 11/103301 [patent_app_country] => US [patent_app_date] => 2005-04-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6281 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0195/20050195979.pdf [firstpage_image] =>[orig_patent_app_number] => 11103301 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/103301
System and method for limiting access to data Apr 10, 2005 Issued
Array ( [id] => 4862288 [patent_doc_number] => 20080270798 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-10-30 [patent_title] => 'Anonymous Authentification Method' [patent_app_type] => utility [patent_app_number] => 10/593124 [patent_app_country] => US [patent_app_date] => 2005-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4639 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0270/20080270798.pdf [firstpage_image] =>[orig_patent_app_number] => 10593124 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/593124
Anonymous Authentification Method Mar 3, 2005 Abandoned
Array ( [id] => 5696252 [patent_doc_number] => 20060156399 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-07-13 [patent_title] => 'System and method for implementing network security using a sequestered partition' [patent_app_type] => utility [patent_app_number] => 11/027253 [patent_app_country] => US [patent_app_date] => 2004-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4126 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0156/20060156399.pdf [firstpage_image] =>[orig_patent_app_number] => 11027253 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/027253
System and method for implementing network security using a sequestered partition Dec 29, 2004 Abandoned
Array ( [id] => 5159011 [patent_doc_number] => 20070172055 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-07-26 [patent_title] => 'Apparatus and method for distorting digital contents and recovering the distorted contents' [patent_app_type] => utility [patent_app_number] => 10/582547 [patent_app_country] => US [patent_app_date] => 2004-12-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 7716 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0172/20070172055.pdf [firstpage_image] =>[orig_patent_app_number] => 10582547 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/582547
Apparatus and method for distorting digital contents and recovering the distorted contents Dec 10, 2004 Abandoned
Array ( [id] => 5744357 [patent_doc_number] => 20060090083 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-04-27 [patent_title] => 'Data protection system' [patent_app_type] => utility [patent_app_number] => 10/974634 [patent_app_country] => US [patent_app_date] => 2004-10-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 2665 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0090/20060090083.pdf [firstpage_image] =>[orig_patent_app_number] => 10974634 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/974634
Data protection system Oct 26, 2004 Abandoned
Menu