
Matthew C. Bella
Supervisory Patent Examiner (ID: 4823, Phone: (571)272-7778 , Office: P/2667 )
| Most Active Art Unit | 2721 |
| Art Unit(s) | 2667, 2674, 2676, 2899, 2606, 2624, 2621, 2616, 2721 |
| Total Applications | 482 |
| Issued Applications | 278 |
| Pending Applications | 80 |
| Abandoned Applications | 127 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17934312
[patent_doc_number] => 20220329438
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-10-13
[patent_title] => A METHOD FOR STATISTICAL ANALYSIS OF AGGREGATE ENCRYPTED DATA WITH KEY-LEAKAGE RESILIENCE FOR SMART GRIDS
[patent_app_type] => utility
[patent_app_number] => 17/431133
[patent_app_country] => US
[patent_app_date] => 2020-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5487
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 342
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17431133
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/431133 | Method for statistical analysis of aggregate encrypted data with key-leakage resilience for smart grids | Jul 13, 2020 | Issued |
Array
(
[id] => 17348190
[patent_doc_number] => 20220014521
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-01-13
[patent_title] => SYSTEMS AND METHODS FOR SUPPORTING UNAUTHENTICATED POST REQUESTS THROUGH A REVERSE PROXY ENABLED FOR AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 16/922483
[patent_app_country] => US
[patent_app_date] => 2020-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14794
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16922483
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/922483 | Systems and methods for supporting unauthenticated post requests through a reverse proxy enabled for authentication | Jul 6, 2020 | Issued |
Array
(
[id] => 16575417
[patent_doc_number] => 10897351
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-01-19
[patent_title] => Encryption key management for an automated workflow
[patent_app_type] => utility
[patent_app_number] => 16/920053
[patent_app_country] => US
[patent_app_date] => 2020-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8053
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16920053
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/920053 | Encryption key management for an automated workflow | Jul 1, 2020 | Issued |
Array
(
[id] => 17338320
[patent_doc_number] => 20220004651
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-01-06
[patent_title] => MANAGEMENT OF COMPUTING SECRETS
[patent_app_type] => utility
[patent_app_number] => 16/919228
[patent_app_country] => US
[patent_app_date] => 2020-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6901
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 74
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16919228
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/919228 | Management of computing secrets | Jul 1, 2020 | Issued |
Array
(
[id] => 17560159
[patent_doc_number] => 11316893
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-26
[patent_title] => Method and system for identifying malicious activity of pre-determined type in local area network
[patent_app_type] => utility
[patent_app_number] => 16/911503
[patent_app_country] => US
[patent_app_date] => 2020-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8206
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16911503
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/911503 | Method and system for identifying malicious activity of pre-determined type in local area network | Jun 24, 2020 | Issued |
Array
(
[id] => 17819495
[patent_doc_number] => 11425125
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-23
[patent_title] => Shared resource identification
[patent_app_type] => utility
[patent_app_number] => 16/910344
[patent_app_country] => US
[patent_app_date] => 2020-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6932
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16910344
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/910344 | Shared resource identification | Jun 23, 2020 | Issued |
Array
(
[id] => 17701231
[patent_doc_number] => 11374968
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-06-28
[patent_title] => Detection of adversarial networks
[patent_app_type] => utility
[patent_app_number] => 16/909176
[patent_app_country] => US
[patent_app_date] => 2020-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9242
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16909176
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/909176 | Detection of adversarial networks | Jun 22, 2020 | Issued |
Array
(
[id] => 18220326
[patent_doc_number] => 11595284
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-02-28
[patent_title] => Packet analysis device and packet analysis method
[patent_app_type] => utility
[patent_app_number] => 16/909326
[patent_app_country] => US
[patent_app_date] => 2020-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 11054
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16909326
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/909326 | Packet analysis device and packet analysis method | Jun 22, 2020 | Issued |
Array
(
[id] => 18494826
[patent_doc_number] => 11700251
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-07-11
[patent_title] => Modification of device behavior for use in secure networking
[patent_app_type] => utility
[patent_app_number] => 16/903741
[patent_app_country] => US
[patent_app_date] => 2020-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 10
[patent_no_of_words] => 10637
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16903741
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/903741 | Modification of device behavior for use in secure networking | Jun 16, 2020 | Issued |
Array
(
[id] => 17276805
[patent_doc_number] => 20210383003
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-09
[patent_title] => GEOGRAPHICALLY CO-DEPENDENT DOCUMENT CONTAINERS
[patent_app_type] => utility
[patent_app_number] => 16/894414
[patent_app_country] => US
[patent_app_date] => 2020-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4009
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16894414
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/894414 | Geographically co-dependent document containers | Jun 4, 2020 | Issued |
Array
(
[id] => 17254977
[patent_doc_number] => 11190489
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-30
[patent_title] => Methods and systems for establishing a connection between a first device and a second device across a software-defined perimeter
[patent_app_type] => utility
[patent_app_number] => 16/891954
[patent_app_country] => US
[patent_app_date] => 2020-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8934
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 329
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16891954
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/891954 | Methods and systems for establishing a connection between a first device and a second device across a software-defined perimeter | Jun 2, 2020 | Issued |
Array
(
[id] => 18703578
[patent_doc_number] => 11790092
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-10-17
[patent_title] => Cryptoprocessor access management
[patent_app_type] => utility
[patent_app_number] => 16/883702
[patent_app_country] => US
[patent_app_date] => 2020-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9904
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16883702
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/883702 | Cryptoprocessor access management | May 25, 2020 | Issued |
Array
(
[id] => 17972257
[patent_doc_number] => 11489813
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-01
[patent_title] => Systems and methods for detecting and dynamically rate limiting account discovery and takeover attempts
[patent_app_type] => utility
[patent_app_number] => 16/877738
[patent_app_country] => US
[patent_app_date] => 2020-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12145
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16877738
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/877738 | Systems and methods for detecting and dynamically rate limiting account discovery and takeover attempts | May 18, 2020 | Issued |
Array
(
[id] => 17248214
[patent_doc_number] => 20210367959
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-25
[patent_title] => MALICIOUS SOFTWARE DETECTION AND MITIGATION
[patent_app_type] => utility
[patent_app_number] => 16/877616
[patent_app_country] => US
[patent_app_date] => 2020-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14373
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16877616
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/877616 | Malicious software detection and mitigation | May 18, 2020 | Issued |
Array
(
[id] => 16457153
[patent_doc_number] => 20200366579
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-19
[patent_title] => SYSTEMS AND METHODS FOR SIDE-CHANNEL MONITORING OF A LOCAL NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/874507
[patent_app_country] => US
[patent_app_date] => 2020-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6839
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16874507
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/874507 | Systems and methods for side-channel monitoring of a local network | May 13, 2020 | Issued |
Array
(
[id] => 19369642
[patent_doc_number] => 12061726
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-08-13
[patent_title] => Securely communicating and customizing artificial intelligence modules
[patent_app_type] => utility
[patent_app_number] => 15/931298
[patent_app_country] => US
[patent_app_date] => 2020-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9365
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15931298
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/931298 | Securely communicating and customizing artificial intelligence modules | May 12, 2020 | Issued |
Array
(
[id] => 17233445
[patent_doc_number] => 20210360002
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-18
[patent_title] => TIME-STAMPING FOR INDUSTRIAL UNIDIRECTIONAL COMMUNICATION DEVICE WITH DATA INTEGRITY MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 16/872680
[patent_app_country] => US
[patent_app_date] => 2020-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10302
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16872680
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/872680 | Time-stamping for industrial unidirectional communication device with data integrity management | May 11, 2020 | Issued |
Array
(
[id] => 17457099
[patent_doc_number] => 11271974
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-03-08
[patent_title] => Securely deploying security policy and configuration through network address translation systems
[patent_app_type] => utility
[patent_app_number] => 16/863699
[patent_app_country] => US
[patent_app_date] => 2020-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5913
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16863699
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/863699 | Securely deploying security policy and configuration through network address translation systems | Apr 29, 2020 | Issued |
Array
(
[id] => 17470893
[patent_doc_number] => 11277381
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-03-15
[patent_title] => Multi-channel based just-in-time firewall control
[patent_app_type] => utility
[patent_app_number] => 16/863206
[patent_app_country] => US
[patent_app_date] => 2020-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9737
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16863206
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/863206 | Multi-channel based just-in-time firewall control | Apr 29, 2020 | Issued |
Array
(
[id] => 17682659
[patent_doc_number] => 11366915
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-06-21
[patent_title] => Method and system for document authorization and distribution
[patent_app_type] => utility
[patent_app_number] => 16/854685
[patent_app_country] => US
[patent_app_date] => 2020-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 5703
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 244
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16854685
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/854685 | Method and system for document authorization and distribution | Apr 20, 2020 | Issued |