Search

Matthew L. Hamilton

Examiner (ID: 4635, Phone: (571)270-1837 , Office: P/3682 )

Most Active Art Unit
3682
Art Unit(s)
3688, 3685, 3626, 3622, 3682, 3681
Total Applications
601
Issued Applications
284
Pending Applications
58
Abandoned Applications
267

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 8264160 [patent_doc_number] => 20120163590 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-28 [patent_title] => 'CRYPTOGRAPHY MODULE FOR USE WITH FRAGMENTED KEY AND METHODS FOR USE THEREWITH' [patent_app_type] => utility [patent_app_number] => 12/978484 [patent_app_country] => US [patent_app_date] => 2010-12-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6510 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12978484 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/978484
Cryptography module for use with fragmented key and methods for use therewith Dec 23, 2010 Issued
Array ( [id] => 10021624 [patent_doc_number] => 09064112 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-06-23 [patent_title] => 'Malware detection for SMS/MMS based attacks' [patent_app_type] => utility [patent_app_number] => 12/964015 [patent_app_country] => US [patent_app_date] => 2010-12-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 7485 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 234 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12964015 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/964015
Malware detection for SMS/MMS based attacks Dec 8, 2010 Issued
Array ( [id] => 9352544 [patent_doc_number] => 08671449 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-03-11 [patent_title] => 'Systems and methods for identifying potential malware' [patent_app_type] => utility [patent_app_number] => 12/943923 [patent_app_country] => US [patent_app_date] => 2010-11-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10104 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 199 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12943923 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/943923
Systems and methods for identifying potential malware Nov 9, 2010 Issued
Array ( [id] => 10867029 [patent_doc_number] => 08892754 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-11-18 [patent_title] => 'Executing untrusted content in a trusted network' [patent_app_type] => utility [patent_app_number] => 12/943132 [patent_app_country] => US [patent_app_date] => 2010-11-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9719 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 127 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12943132 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/943132
Executing untrusted content in a trusted network Nov 9, 2010 Issued
Array ( [id] => 6057430 [patent_doc_number] => 20110113256 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-12 [patent_title] => 'Secure Method for Processing a Content Stored Within a Component, and Corresponding Component' [patent_app_type] => utility [patent_app_number] => 12/942557 [patent_app_country] => US [patent_app_date] => 2010-11-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 4650 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0113/20110113256.pdf [firstpage_image] =>[orig_patent_app_number] => 12942557 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/942557
Secure method for processing a content stored within a component, and corresponding component Nov 8, 2010 Issued
Array ( [id] => 8189618 [patent_doc_number] => 20120117608 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-05-10 [patent_title] => 'CERTIFICATE POLICY MANAGEMENT TOOL' [patent_app_type] => utility [patent_app_number] => 12/942374 [patent_app_country] => US [patent_app_date] => 2010-11-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4680 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0117/20120117608.pdf [firstpage_image] =>[orig_patent_app_number] => 12942374 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/942374
CERTIFICATE POLICY MANAGEMENT TOOL Nov 8, 2010 Abandoned
Array ( [id] => 9630356 [patent_doc_number] => 08800050 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-08-05 [patent_title] => 'Security system for computing resources pre-releases' [patent_app_type] => utility [patent_app_number] => 12/942987 [patent_app_country] => US [patent_app_date] => 2010-11-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 19 [patent_no_of_words] => 13606 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 214 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12942987 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/942987
Security system for computing resources pre-releases Nov 8, 2010 Issued
Array ( [id] => 6057893 [patent_doc_number] => 20110113491 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-12 [patent_title] => 'COLLABORATIVE SYSTEM FOR PROTECTING AGAINST THE PROPAGATION OF MALWARES IN A NETWORK' [patent_app_type] => utility [patent_app_number] => 12/941199 [patent_app_country] => US [patent_app_date] => 2010-11-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 10090 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0113/20110113491.pdf [firstpage_image] =>[orig_patent_app_number] => 12941199 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/941199
COLLABORATIVE SYSTEM FOR PROTECTING AGAINST THE PROPAGATION OF MALWARES IN A NETWORK Nov 7, 2010 Abandoned
Array ( [id] => 9841262 [patent_doc_number] => 20150033344 [patent_country] => US [patent_kind] => A9 [patent_issue_date] => 2015-01-29 [patent_title] => 'INTERNET-BASED PROXY SECURITY SERVICES' [patent_app_type] => utility [patent_app_number] => 12/939908 [patent_app_country] => US [patent_app_date] => 2010-11-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 29 [patent_figures_cnt] => 29 [patent_no_of_words] => 31607 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12939908 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/939908
Internet-based proxy security services Nov 3, 2010 Issued
Array ( [id] => 8189663 [patent_doc_number] => 20120117633 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-05-10 [patent_title] => 'Enhanced Security For Pervasive Devices Using A Weighting System' [patent_app_type] => utility [patent_app_number] => 12/940024 [patent_app_country] => US [patent_app_date] => 2010-11-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5868 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0117/20120117633.pdf [firstpage_image] =>[orig_patent_app_number] => 12940024 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/940024
Enhanced Security For Pervasive Devices Using A Weighting System Nov 3, 2010 Abandoned
Array ( [id] => 9841262 [patent_doc_number] => 20150033344 [patent_country] => US [patent_kind] => A9 [patent_issue_date] => 2015-01-29 [patent_title] => 'INTERNET-BASED PROXY SECURITY SERVICES' [patent_app_type] => utility [patent_app_number] => 12/939908 [patent_app_country] => US [patent_app_date] => 2010-11-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 29 [patent_figures_cnt] => 29 [patent_no_of_words] => 31607 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12939908 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/939908
Internet-based proxy security services Nov 3, 2010 Issued
Array ( [id] => 9998979 [patent_doc_number] => 09043596 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-05-26 [patent_title] => 'Method and apparatus for authenticating public key without authentication server' [patent_app_type] => utility [patent_app_number] => 12/830033 [patent_app_country] => US [patent_app_date] => 2010-07-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 7454 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12830033 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/830033
Method and apparatus for authenticating public key without authentication server Jul 1, 2010 Issued
Array ( [id] => 8613781 [patent_doc_number] => 20130019093 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-01-17 [patent_title] => 'CERTIFICATE AUTHORITY' [patent_app_type] => utility [patent_app_number] => 13/638300 [patent_app_country] => US [patent_app_date] => 2010-04-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4318 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13638300 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/638300
Certificate authority Mar 31, 2010 Issued
Array ( [id] => 9829569 [patent_doc_number] => 08938808 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-01-20 [patent_title] => 'Systems and methods for using virtualization to implement information rights management' [patent_app_type] => utility [patent_app_number] => 12/715213 [patent_app_country] => US [patent_app_date] => 2010-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10557 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 168 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12715213 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/715213
Systems and methods for using virtualization to implement information rights management Feb 28, 2010 Issued
Array ( [id] => 10196607 [patent_doc_number] => 09225525 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-29 [patent_title] => 'Identity management certificate operations' [patent_app_type] => utility [patent_app_number] => 12/714108 [patent_app_country] => US [patent_app_date] => 2010-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 10687 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 249 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12714108 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/714108
Identity management certificate operations Feb 25, 2010 Issued
Array ( [id] => 10873236 [patent_doc_number] => 08898457 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-11-25 [patent_title] => 'Automatically generating a certificate operation request' [patent_app_type] => utility [patent_app_number] => 12/714227 [patent_app_country] => US [patent_app_date] => 2010-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 10680 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 143 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12714227 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/714227
Automatically generating a certificate operation request Feb 25, 2010 Issued
Array ( [id] => 8512256 [patent_doc_number] => 20120311663 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-12-06 [patent_title] => 'IDENTITY MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 13/577053 [patent_app_country] => US [patent_app_date] => 2010-02-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 12247 [patent_no_of_claims] => 31 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13577053 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/577053
IDENTITY MANAGEMENT Feb 4, 2010 Abandoned
Array ( [id] => 6614403 [patent_doc_number] => 20100132043 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-05-27 [patent_title] => 'Method and Apparatus for an End User Identity Protection Suite' [patent_app_type] => utility [patent_app_number] => 12/619665 [patent_app_country] => US [patent_app_date] => 2009-11-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 8676 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0132/20100132043.pdf [firstpage_image] =>[orig_patent_app_number] => 12619665 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/619665
Method and apparatus for an end user identity protection suite Nov 15, 2009 Issued
Array ( [id] => 6006608 [patent_doc_number] => 20110119738 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-19 [patent_title] => 'IDENTITY MANAGEMENT FOR TRANSACTIONAL CONTENT' [patent_app_type] => utility [patent_app_number] => 12/618207 [patent_app_country] => US [patent_app_date] => 2009-11-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7525 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0119/20110119738.pdf [firstpage_image] =>[orig_patent_app_number] => 12618207 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/618207
Identity management for transactional content Nov 12, 2009 Issued
Array ( [id] => 8285696 [patent_doc_number] => 08219810 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-07-10 [patent_title] => 'Method and system for facilitating throttling of interpolation-based authentication' [patent_app_type] => utility [patent_app_number] => 12/618385 [patent_app_country] => US [patent_app_date] => 2009-11-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 4703 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 81 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12618385 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/618385
Method and system for facilitating throttling of interpolation-based authentication Nov 12, 2009 Issued
Menu