
John F. Mortell
Examiner (ID: 470, Phone: (571)270-1873 , Office: P/2689 )
| Most Active Art Unit | 2689 |
| Art Unit(s) | 2612, 2681, 2689 |
| Total Applications | 1004 |
| Issued Applications | 672 |
| Pending Applications | 73 |
| Abandoned Applications | 277 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16225180
[patent_doc_number] => 20200250297
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-06
[patent_title] => AUTHENTICATION SYSTEM, AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND PROGRAM
[patent_app_type] => utility
[patent_app_number] => 16/652067
[patent_app_country] => US
[patent_app_date] => 2018-12-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16562
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16652067
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/652067 | Authentication system, authentication device, authentication method, and program | Dec 25, 2018 | Issued |
Array
(
[id] => 17877614
[patent_doc_number] => 11449630
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-20
[patent_title] => Embedded third-party application programming interface to prevent transmission of sensitive data
[patent_app_type] => utility
[patent_app_number] => 16/772568
[patent_app_country] => US
[patent_app_date] => 2018-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8861
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 266
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16772568
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/772568 | Embedded third-party application programming interface to prevent transmission of sensitive data | Dec 12, 2018 | Issued |
Array
(
[id] => 14112641
[patent_doc_number] => 20190097996
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-28
[patent_title] => AUTOMATIC LOGIN METHOD AND DEVICE BETWEEN MULTIPLE WEBSITES
[patent_app_type] => utility
[patent_app_number] => 16/184679
[patent_app_country] => US
[patent_app_date] => 2018-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12865
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16184679
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/184679 | Automatic login method and device between multiple websites | Nov 7, 2018 | Issued |
Array
(
[id] => 15876087
[patent_doc_number] => 20200145447
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => Contagion Risk Detection, Analysis and Protection
[patent_app_type] => utility
[patent_app_number] => 16/179062
[patent_app_country] => US
[patent_app_date] => 2018-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18213
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16179062
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/179062 | Contagion risk detection, analysis and protection | Nov 1, 2018 | Issued |
Array
(
[id] => 16294696
[patent_doc_number] => 10771559
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-08
[patent_title] => Presence-based network authentication
[patent_app_type] => utility
[patent_app_number] => 16/175291
[patent_app_country] => US
[patent_app_date] => 2018-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 9687
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16175291
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/175291 | Presence-based network authentication | Oct 29, 2018 | Issued |
Array
(
[id] => 13998441
[patent_doc_number] => 20190068378
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => DETERMINISTIC VERIFICATION OF DIGITAL IDENTITY DOCUMENTS
[patent_app_type] => utility
[patent_app_number] => 16/170527
[patent_app_country] => US
[patent_app_date] => 2018-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10228
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 406
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16170527
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/170527 | Deterministic verification of digital identity documents | Oct 24, 2018 | Issued |
Array
(
[id] => 15789767
[patent_doc_number] => 10628610
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-21
[patent_title] => Identifying stolen databases
[patent_app_type] => utility
[patent_app_number] => 16/170243
[patent_app_country] => US
[patent_app_date] => 2018-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9697
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16170243
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/170243 | Identifying stolen databases | Oct 24, 2018 | Issued |
Array
(
[id] => 13964721
[patent_doc_number] => 20190058705
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-21
[patent_title] => Protecting Information Using Policies and Encryption
[patent_app_type] => utility
[patent_app_number] => 16/168793
[patent_app_country] => US
[patent_app_date] => 2018-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15842
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16168793
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/168793 | Protecting information using policies and encryption | Oct 22, 2018 | Issued |
Array
(
[id] => 14379965
[patent_doc_number] => 20190163895
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-30
[patent_title] => SENSOR DERIVED AUTHENTICATION FOR ESTABLISHING PEER-TO-PEER NETWORKS
[patent_app_type] => utility
[patent_app_number] => 16/149021
[patent_app_country] => US
[patent_app_date] => 2018-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11732
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16149021
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/149021 | Sensor derived authentication for establishing peer-to-peer networks | Sep 30, 2018 | Issued |
Array
(
[id] => 14935905
[patent_doc_number] => 20190303591
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-03
[patent_title] => COLLECTION FOLDER FOR COLLECTING FILE SUBMISSIONS IN RESPONSE TO A PUBLIC FILE REQUEST
[patent_app_type] => utility
[patent_app_number] => 16/119817
[patent_app_country] => US
[patent_app_date] => 2018-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 29647
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16119817
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/119817 | Collection folder for collecting file submissions in response to a public file request | Aug 30, 2018 | Issued |
Array
(
[id] => 16165287
[patent_doc_number] => 20200220876
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-09
[patent_title] => INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, CLIENT SYSTEM, AND CONTROL METHOD OF CLIENT SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/643644
[patent_app_country] => US
[patent_app_date] => 2018-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 22491
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 46
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16643644
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/643644 | Information processing apparatus, information processing method, client system, and control method of client system | Aug 27, 2018 | Issued |
Array
(
[id] => 14299477
[patent_doc_number] => 10289866
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-14
[patent_title] => Data processing systems for fulfilling data subject access requests and related methods
[patent_app_type] => utility
[patent_app_number] => 16/059911
[patent_app_country] => US
[patent_app_date] => 2018-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 50
[patent_figures_cnt] => 50
[patent_no_of_words] => 14400
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 391
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16059911
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/059911 | Data processing systems for fulfilling data subject access requests and related methods | Aug 8, 2018 | Issued |
Array
(
[id] => 15505383
[patent_doc_number] => 20200052880
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-13
[patent_title] => AD-HOC TRUSTED GROUPS ON A BLOCKCHAIN
[patent_app_type] => utility
[patent_app_number] => 16/058198
[patent_app_country] => US
[patent_app_date] => 2018-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8090
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16058198
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/058198 | Ad-hoc trusted groups on a blockchain | Aug 7, 2018 | Issued |
Array
(
[id] => 17528661
[patent_doc_number] => 11301349
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-12
[patent_title] => Method and process of cyber security via software imaging
[patent_app_type] => utility
[patent_app_number] => 16/057554
[patent_app_country] => US
[patent_app_date] => 2018-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3593
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16057554
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/057554 | Method and process of cyber security via software imaging | Aug 6, 2018 | Issued |
Array
(
[id] => 15612895
[patent_doc_number] => 10587530
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-10
[patent_title] => Automatically configuring computer network at hospitality establishment with reservation-specific settings
[patent_app_type] => utility
[patent_app_number] => 16/054151
[patent_app_country] => US
[patent_app_date] => 2018-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 15712
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16054151
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/054151 | Automatically configuring computer network at hospitality establishment with reservation-specific settings | Aug 2, 2018 | Issued |
Array
(
[id] => 13540841
[patent_doc_number] => 20180321967
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-08
[patent_title] => AUTOMATED ORCHESTRATION OF A VIRTUALIZED COMPUTING ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 16/032158
[patent_app_country] => US
[patent_app_date] => 2018-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9358
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16032158
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/032158 | Automated orchestration of a virtualized computing environment | Jul 10, 2018 | Issued |
Array
(
[id] => 14802887
[patent_doc_number] => 10404458
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-09-03
[patent_title] => Multi-round key encapsulation process
[patent_app_type] => utility
[patent_app_number] => 16/008944
[patent_app_country] => US
[patent_app_date] => 2018-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15222
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16008944
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/008944 | Multi-round key encapsulation process | Jun 13, 2018 | Issued |
Array
(
[id] => 16818917
[patent_doc_number] => 11003749
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-11
[patent_title] => Risk analysis apparatus and method for risk based authentication
[patent_app_type] => utility
[patent_app_number] => 15/989301
[patent_app_country] => US
[patent_app_date] => 2018-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9120
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15989301
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/989301 | Risk analysis apparatus and method for risk based authentication | May 24, 2018 | Issued |
Array
(
[id] => 15186931
[patent_doc_number] => 20190364057
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-28
[patent_title] => SYSTEM, DEVICE, AND METHOD OF DETECTING CRYPTOCURRENCY MINING ACTIVITY
[patent_app_type] => utility
[patent_app_number] => 15/987926
[patent_app_country] => US
[patent_app_date] => 2018-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10254
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -29
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15987926
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/987926 | System, device, and method of detecting cryptocurrency mining activity | May 23, 2018 | Issued |
Array
(
[id] => 17064191
[patent_doc_number] => 11108812
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-08-31
[patent_title] => Data plane with connection validation circuits
[patent_app_type] => utility
[patent_app_number] => 15/986048
[patent_app_country] => US
[patent_app_date] => 2018-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10230
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15986048
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/986048 | Data plane with connection validation circuits | May 21, 2018 | Issued |