
Matthew C. Bella
Supervisory Patent Examiner (ID: 17031, Phone: (571)272-7778 , Office: P/2667 )
| Most Active Art Unit | 2721 |
| Art Unit(s) | 2899, 2674, 2621, 2616, 2721, 2667, 2624, 2676, 2606 |
| Total Applications | 479 |
| Issued Applications | 276 |
| Pending Applications | 79 |
| Abandoned Applications | 127 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16661616
[patent_doc_number] => 20210058253
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-25
[patent_title] => BLOCKCHAIN-BASED TRANSACTION METHOD AND APPARATUS, AND REMITTER DEVICE
[patent_app_type] => utility
[patent_app_number] => 17/079362
[patent_app_country] => US
[patent_app_date] => 2020-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10466
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17079362
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/079362 | Blockchain-based transaction method and apparatus, and remitter device | Oct 22, 2020 | Issued |
Array
(
[id] => 16866851
[patent_doc_number] => 11025617
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-01
[patent_title] => Identification of a related computing device for automatic account login
[patent_app_type] => utility
[patent_app_number] => 16/945764
[patent_app_country] => US
[patent_app_date] => 2020-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8034
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16945764
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/945764 | Identification of a related computing device for automatic account login | Jul 30, 2020 | Issued |
Array
(
[id] => 16912220
[patent_doc_number] => 11044275
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-22
[patent_title] => Secure web container for a secure online user environment
[patent_app_type] => utility
[patent_app_number] => 16/807157
[patent_app_country] => US
[patent_app_date] => 2020-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 16
[patent_no_of_words] => 15052
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16807157
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/807157 | Secure web container for a secure online user environment | Mar 1, 2020 | Issued |
Array
(
[id] => 16921614
[patent_doc_number] => 20210194706
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-24
[patent_title] => TEMPERATURE SENSING PHYSICAL UNCLONABLE FUNCTION (PUF) AUTHENTICATION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/789264
[patent_app_country] => US
[patent_app_date] => 2020-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9307
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16789264
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/789264 | Temperature sensing physical unclonable function (PUF) authentication system | Feb 11, 2020 | Issued |
Array
(
[id] => 16594991
[patent_doc_number] => 10904280
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-01-26
[patent_title] => Detecting malicious network activity using time series payload data
[patent_app_type] => utility
[patent_app_number] => 16/712710
[patent_app_country] => US
[patent_app_date] => 2019-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5183
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16712710
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/712710 | Detecting malicious network activity using time series payload data | Dec 11, 2019 | Issued |
Array
(
[id] => 15334497
[patent_doc_number] => 20200007578
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-02
[patent_title] => BROADCAST-CONTROLLING METHOD IN OPERATING SYSTEM AND MOBILE TERMINAL
[patent_app_type] => utility
[patent_app_number] => 16/565467
[patent_app_country] => US
[patent_app_date] => 2019-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6594
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16565467
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/565467 | Broadcast-controlling method in operating system and mobile terminal | Sep 8, 2019 | Issued |
Array
(
[id] => 15095087
[patent_doc_number] => 20190342355
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-07
[patent_title] => Public/Private Communications Paths
[patent_app_type] => utility
[patent_app_number] => 16/516315
[patent_app_country] => US
[patent_app_date] => 2019-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7468
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16516315
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/516315 | Public/private communications paths | Jul 18, 2019 | Issued |
Array
(
[id] => 14997861
[patent_doc_number] => 20190317888
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-17
[patent_title] => APPLICATION TESTING FOR SECURITY VULNERABILITIES
[patent_app_type] => utility
[patent_app_number] => 16/452583
[patent_app_country] => US
[patent_app_date] => 2019-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7245
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16452583
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/452583 | Application testing for security vulnerabilities | Jun 25, 2019 | Issued |
Array
(
[id] => 15261907
[patent_doc_number] => 20190379687
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-12
[patent_title] => THREAT MITIGATION SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 16/432556
[patent_app_country] => US
[patent_app_date] => 2019-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21192
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 61
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16432556
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/432556 | Threat mitigation system and method | Jun 4, 2019 | Issued |
Array
(
[id] => 16745388
[patent_doc_number] => 10970378
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-06
[patent_title] => Secure generation and verification of machine-readable visual codes
[patent_app_type] => utility
[patent_app_number] => 16/410182
[patent_app_country] => US
[patent_app_date] => 2019-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9929
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16410182
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/410182 | Secure generation and verification of machine-readable visual codes | May 12, 2019 | Issued |
Array
(
[id] => 16374020
[patent_doc_number] => 10805802
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-10-13
[patent_title] => NFC-enhanced firmware security
[patent_app_type] => utility
[patent_app_number] => 16/405971
[patent_app_country] => US
[patent_app_date] => 2019-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5125
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16405971
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/405971 | NFC-enhanced firmware security | May 6, 2019 | Issued |
Array
(
[id] => 15735537
[patent_doc_number] => 10616213
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-07
[patent_title] => Password manipulation for secure account creation and verification through third-party servers
[patent_app_type] => utility
[patent_app_number] => 16/242885
[patent_app_country] => US
[patent_app_date] => 2019-01-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 7764
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16242885
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/242885 | Password manipulation for secure account creation and verification through third-party servers | Jan 7, 2019 | Issued |
Array
(
[id] => 16960030
[patent_doc_number] => 11063921
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-13
[patent_title] => Extracting data from passively captured web traffic that is encrypted in accordance with an anonymous key agreement protocol
[patent_app_type] => utility
[patent_app_number] => 16/182591
[patent_app_country] => US
[patent_app_date] => 2018-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7371
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16182591
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/182591 | Extracting data from passively captured web traffic that is encrypted in accordance with an anonymous key agreement protocol | Nov 5, 2018 | Issued |
Array
(
[id] => 14478513
[patent_doc_number] => 20190190910
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-06-20
[patent_title] => END-TO-END SECURITY COMMUNICATION METHOD BASED ON MAC PROTOCOL USING SOFTWARE DEFINED-NETWORKING, AND COMMUNICATION CONTROLLER AND COMPUTER PROGRAM FOR THE SAME
[patent_app_type] => utility
[patent_app_number] => 16/170373
[patent_app_country] => US
[patent_app_date] => 2018-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5123
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16170373
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/170373 | End-to-end security communication method based on mac protocol using software defined-networking, and communication controller and computer program for the same | Oct 24, 2018 | Issued |
Array
(
[id] => 13938121
[patent_doc_number] => 20190052576
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-14
[patent_title] => INTERNET-BASED PROXY SECURITY SERVICES
[patent_app_type] => utility
[patent_app_number] => 16/162167
[patent_app_country] => US
[patent_app_date] => 2018-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 30744
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16162167
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/162167 | Internet-based proxy security services | Oct 15, 2018 | Issued |
Array
(
[id] => 15743949
[patent_doc_number] => 20200110863
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-09
[patent_title] => USER AUTHENTICATION VIA EMOTION DETECTION
[patent_app_type] => utility
[patent_app_number] => 16/155463
[patent_app_country] => US
[patent_app_date] => 2018-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4704
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16155463
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/155463 | User authentication via emotion detection | Oct 8, 2018 | Issued |
Array
(
[id] => 14112675
[patent_doc_number] => 20190098013
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-28
[patent_title] => System and Methods for Location Verification with Blockchain Controls
[patent_app_type] => utility
[patent_app_number] => 16/140016
[patent_app_country] => US
[patent_app_date] => 2018-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10639
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 294
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16140016
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/140016 | System and Methods for Location Verification with Blockchain Controls | Sep 23, 2018 | Abandoned |
Array
(
[id] => 14319591
[patent_doc_number] => 20190149499
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-16
[patent_title] => Authenticating and confidence marking e-mail messages
[patent_app_type] => utility
[patent_app_number] => 16/132251
[patent_app_country] => US
[patent_app_date] => 2018-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6454
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16132251
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/132251 | Authenticating and confidence marking e-mail messages | Sep 13, 2018 | Issued |
Array
(
[id] => 14026255
[patent_doc_number] => 20190075121
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-07
[patent_title] => SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR INGRESS EMAIL SECURITY
[patent_app_type] => utility
[patent_app_number] => 16/112294
[patent_app_country] => US
[patent_app_date] => 2018-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7875
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16112294
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/112294 | Systems, methods and computer program products for ingress email security | Aug 23, 2018 | Issued |
Array
(
[id] => 16929233
[patent_doc_number] => 11050735
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-29
[patent_title] => Customizable authentication system
[patent_app_type] => utility
[patent_app_number] => 16/110749
[patent_app_country] => US
[patent_app_date] => 2018-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7341
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16110749
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/110749 | Customizable authentication system | Aug 22, 2018 | Issued |