
Matthew C. Bella
Supervisory Patent Examiner (ID: 4823, Phone: (571)272-7778 , Office: P/2667 )
| Most Active Art Unit | 2721 |
| Art Unit(s) | 2667, 2674, 2676, 2899, 2606, 2624, 2621, 2616, 2721 |
| Total Applications | 482 |
| Issued Applications | 278 |
| Pending Applications | 80 |
| Abandoned Applications | 127 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17146290
[patent_doc_number] => 20210314303
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-10-07
[patent_title] => APPLICATION AWARE TCP PERFORMANCE TUNING ON HARDWARE ACCELERATED TCP PROXY SERVICES
[patent_app_type] => utility
[patent_app_number] => 16/842537
[patent_app_country] => US
[patent_app_date] => 2020-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18617
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16842537
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/842537 | Application aware TCP performance tuning on hardware accelerated TCP proxy services | Apr 6, 2020 | Issued |
Array
(
[id] => 17530954
[patent_doc_number] => 11303672
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-12
[patent_title] => Detecting replay attacks using action windows
[patent_app_type] => utility
[patent_app_number] => 16/838639
[patent_app_country] => US
[patent_app_date] => 2020-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8897
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16838639
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/838639 | Detecting replay attacks using action windows | Apr 1, 2020 | Issued |
Array
(
[id] => 16349419
[patent_doc_number] => 20200314070
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-01
[patent_title] => OBSCURED MEDIA COMMUNICATION
[patent_app_type] => utility
[patent_app_number] => 16/832257
[patent_app_country] => US
[patent_app_date] => 2020-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6683
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -29
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16832257
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/832257 | OBSCURED MEDIA COMMUNICATION | Mar 26, 2020 | Abandoned |
Array
(
[id] => 17128943
[patent_doc_number] => 20210303712
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-09-30
[patent_title] => SECURE FAST CHANNEL CHANGE
[patent_app_type] => utility
[patent_app_number] => 16/831551
[patent_app_country] => US
[patent_app_date] => 2020-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8624
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16831551
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/831551 | Secure fast channel change | Mar 25, 2020 | Issued |
Array
(
[id] => 16602579
[patent_doc_number] => 20210029110
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-28
[patent_title] => SERVICE PROVIDING METHOD AND APPARATUS AND ELECTRONIC DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/829078
[patent_app_country] => US
[patent_app_date] => 2020-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8104
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16829078
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/829078 | Service providing method and apparatus and electronic device | Mar 24, 2020 | Issued |
Array
(
[id] => 16349491
[patent_doc_number] => 20200314142
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-01
[patent_title] => METHODS AND SYSTEMS FOR DETECTION OF MAN-IN-THE-MIDDLE ATTACKS FOR SCADA COMMUNICATION NETWORKS AND APPLICATIONS OF SAME
[patent_app_type] => utility
[patent_app_number] => 16/828006
[patent_app_country] => US
[patent_app_date] => 2020-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10255
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16828006
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/828006 | Methods and systems for detection of man-in-the-middle attacks for SCADA communication networks and applications of same | Mar 23, 2020 | Issued |
Array
(
[id] => 16083291
[patent_doc_number] => 20200195632
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-18
[patent_title] => RESOURCE PROCESSING METHOD, APPARATUS, AND SYSTEM, AND COMPUTER-READABLE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 16/803443
[patent_app_country] => US
[patent_app_date] => 2020-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10975
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16803443
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/803443 | Resource processing method, apparatus, and system, and computer-readable medium | Feb 26, 2020 | Issued |
Array
(
[id] => 17366752
[patent_doc_number] => 11233790
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-01-25
[patent_title] => Network-based NT LAN manager (NTLM) relay attack detection and prevention
[patent_app_type] => utility
[patent_app_number] => 16/795140
[patent_app_country] => US
[patent_app_date] => 2020-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7554
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16795140
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/795140 | Network-based NT LAN manager (NTLM) relay attack detection and prevention | Feb 18, 2020 | Issued |
Array
(
[id] => 17797258
[patent_doc_number] => 20220256350
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-11
[patent_title] => SYSTEM FOR TRUSTED DISTANCE MEASUREMENT
[patent_app_type] => utility
[patent_app_number] => 17/429405
[patent_app_country] => US
[patent_app_date] => 2020-02-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18888
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17429405
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/429405 | System for trusted distance measurement | Feb 16, 2020 | Issued |
Array
(
[id] => 16003007
[patent_doc_number] => 20200177374
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-04
[patent_title] => AUTHENTICATED COPYING OF ENCRYPTION KEYS BETWEEN SECURE ZONES
[patent_app_type] => utility
[patent_app_number] => 16/783279
[patent_app_country] => US
[patent_app_date] => 2020-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16352
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16783279
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/783279 | Authenticated copying of encryption keys between secure zones | Feb 5, 2020 | Issued |
Array
(
[id] => 17715601
[patent_doc_number] => 11379594
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-05
[patent_title] => Media obfuscation
[patent_app_type] => utility
[patent_app_number] => 16/747500
[patent_app_country] => US
[patent_app_date] => 2020-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 16439
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16747500
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/747500 | Media obfuscation | Jan 19, 2020 | Issued |
Array
(
[id] => 16195288
[patent_doc_number] => 20200236137
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-23
[patent_title] => METHOD AND SYSTEM FOR CHECKING MALICIOUS HYPERLINK IN EMAIL BODY
[patent_app_type] => utility
[patent_app_number] => 16/747376
[patent_app_country] => US
[patent_app_date] => 2020-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4712
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16747376
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/747376 | Network-based document protection system for protection of business secret | Jan 19, 2020 | Issued |
Array
(
[id] => 16454925
[patent_doc_number] => 20200364351
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-19
[patent_title] => SYSTEM AND METHOD FOR ENFORCING CONTEXT-BASED DATA TRANSFER AND ACCESS
[patent_app_type] => utility
[patent_app_number] => 16/743645
[patent_app_country] => US
[patent_app_date] => 2020-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9896
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16743645
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/743645 | System and method for enforcing context-based data transfer and access | Jan 14, 2020 | Issued |
Array
(
[id] => 16937799
[patent_doc_number] => 20210203688
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-01
[patent_title] => DYNAMIC SECURITY ACTIONS FOR NETWORK TUNNELS AGAINST SPOOFING
[patent_app_type] => utility
[patent_app_number] => 16/732140
[patent_app_country] => US
[patent_app_date] => 2019-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10108
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16732140
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/732140 | Dynamic security actions for network tunnels against spoofing | Dec 30, 2019 | Issued |
Array
(
[id] => 17942769
[patent_doc_number] => 11477241
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-18
[patent_title] => Selectively disabling anti-replay protection by a network security device
[patent_app_type] => utility
[patent_app_number] => 16/729853
[patent_app_country] => US
[patent_app_date] => 2019-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 6850
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16729853
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/729853 | Selectively disabling anti-replay protection by a network security device | Dec 29, 2019 | Issued |
Array
(
[id] => 15843103
[patent_doc_number] => 20200136834
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-30
[patent_title] => CONTRIBUTION SIGNATURES FOR TAGGING
[patent_app_type] => utility
[patent_app_number] => 16/726734
[patent_app_country] => US
[patent_app_date] => 2019-12-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8855
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16726734
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/726734 | Contribution signatures for tagging | Dec 23, 2019 | Issued |
Array
(
[id] => 17416003
[patent_doc_number] => 20220050907
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-02-17
[patent_title] => DYNAMIC BATCH LIMIT VALIDATION
[patent_app_type] => utility
[patent_app_number] => 17/414633
[patent_app_country] => US
[patent_app_date] => 2019-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21479
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17414633
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/414633 | Dynamic batch limit validation | Dec 19, 2019 | Issued |
Array
(
[id] => 17225651
[patent_doc_number] => 11178168
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-11-16
[patent_title] => Self-learning cybersecurity threat detection system, method, and computer program for multi-domain data
[patent_app_type] => utility
[patent_app_number] => 16/720732
[patent_app_country] => US
[patent_app_date] => 2019-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4898
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16720732
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/720732 | Self-learning cybersecurity threat detection system, method, and computer program for multi-domain data | Dec 18, 2019 | Issued |
Array
(
[id] => 17416000
[patent_doc_number] => 20220050904
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-02-17
[patent_title] => SYSTEMS AND METHODS FOR DATA LIFECYCLE PROTECTION
[patent_app_type] => utility
[patent_app_number] => 17/312675
[patent_app_country] => US
[patent_app_date] => 2019-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15964
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17312675
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/312675 | Systems and methods for data lifecycle protection | Dec 17, 2019 | Issued |
Array
(
[id] => 16630635
[patent_doc_number] => 20210049288
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-18
[patent_title] => BLOCKCHAIN-BASED SERVICE OF PROCESS
[patent_app_type] => utility
[patent_app_number] => 16/714378
[patent_app_country] => US
[patent_app_date] => 2019-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 42053
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -25
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16714378
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/714378 | Blockchain-based service of process | Dec 12, 2019 | Issued |