Search

Matthew C. Bella

Supervisory Patent Examiner (ID: 4823, Phone: (571)272-7778 , Office: P/2667 )

Most Active Art Unit
2721
Art Unit(s)
2667, 2674, 2676, 2899, 2606, 2624, 2621, 2616, 2721
Total Applications
482
Issued Applications
278
Pending Applications
80
Abandoned Applications
127

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 18062940 [patent_doc_number] => 20220394027 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-12-08 [patent_title] => Single Sign-On From Desktop to Network [patent_app_type] => utility [patent_app_number] => 17/891076 [patent_app_country] => US [patent_app_date] => 2022-08-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11021 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 97 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17891076 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/891076
Single sign-on from desktop to network Aug 17, 2022 Issued
Array ( [id] => 19706075 [patent_doc_number] => 12200127 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-01-14 [patent_title] => Point-to-point tokens for software-defined network anti-spoof protection [patent_app_type] => utility [patent_app_number] => 17/888595 [patent_app_country] => US [patent_app_date] => 2022-08-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6309 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 138 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17888595 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/888595
Point-to-point tokens for software-defined network anti-spoof protection Aug 15, 2022 Issued
Array ( [id] => 18521495 [patent_doc_number] => 11711396 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2023-07-25 [patent_title] => Extended enterprise browser blocking spread of ransomware from alternate browsers in a system providing agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links [patent_app_type] => utility [patent_app_number] => 17/888387 [patent_app_country] => US [patent_app_date] => 2022-08-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 26 [patent_figures_cnt] => 27 [patent_no_of_words] => 9808 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 107 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17888387 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/888387
Extended enterprise browser blocking spread of ransomware from alternate browsers in a system providing agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links Aug 14, 2022 Issued
Array ( [id] => 18474551 [patent_doc_number] => 20230208839 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-06-29 [patent_title] => ACCESS CONTROL POLICY FOR PROXY SERVICES [patent_app_type] => utility [patent_app_number] => 17/875813 [patent_app_country] => US [patent_app_date] => 2022-07-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11384 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 164 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17875813 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/875813
Access control policy for proxy services Jul 27, 2022 Issued
Array ( [id] => 17992179 [patent_doc_number] => 20220358216 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-11-10 [patent_title] => COMPUTER-IMPLEMENTED METHODS AND SYSTEM FOR PREVENTING AND REMOVING UNAUTHORIZED FILE MODIFICATION BY MALICIOUS SOFTWARE AND THE LIKE [patent_app_type] => utility [patent_app_number] => 17/872415 [patent_app_country] => US [patent_app_date] => 2022-07-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 24262 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -19 [patent_words_short_claim] => 184 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17872415 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/872415
Computer-implemented methods and system for preventing and removing unauthorized file modification by malicious software and the like Jul 24, 2022 Issued
Array ( [id] => 18840843 [patent_doc_number] => 11848932 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-12-19 [patent_title] => Shared resource identification [patent_app_type] => utility [patent_app_number] => 17/814173 [patent_app_country] => US [patent_app_date] => 2022-07-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6990 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 149 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17814173 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/814173
Shared resource identification Jul 20, 2022 Issued
Array ( [id] => 18139943 [patent_doc_number] => 20230013780 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-01-19 [patent_title] => METHOD AND SYSTEM FOR PERMITTING ONE OR MORE FEATURES ON A COMPUTER PROGRAM [patent_app_type] => utility [patent_app_number] => 17/813394 [patent_app_country] => US [patent_app_date] => 2022-07-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5433 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 111 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17813394 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/813394
Method and system for permitting one or more features on a computer program Jul 18, 2022 Issued
Array ( [id] => 18600948 [patent_doc_number] => 20230275751 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-08-31 [patent_title] => Decentralized Cryptography [patent_app_type] => utility [patent_app_number] => 17/813478 [patent_app_country] => US [patent_app_date] => 2022-07-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12920 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 102 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17813478 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/813478
Decentralized Cryptography Jul 18, 2022 Pending
Array ( [id] => 19703584 [patent_doc_number] => 12197615 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-01-14 [patent_title] => Secured search for ready-made search software [patent_app_type] => utility [patent_app_number] => 17/813430 [patent_app_country] => US [patent_app_date] => 2022-07-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 27 [patent_figures_cnt] => 27 [patent_no_of_words] => 11966 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 190 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17813430 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/813430
Secured search for ready-made search software Jul 18, 2022 Issued
Array ( [id] => 18204379 [patent_doc_number] => 11586774 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2023-02-21 [patent_title] => Systems and methods for dynamic checksum generation and validation with customizable levels of integrity verification [patent_app_type] => utility [patent_app_number] => 17/811621 [patent_app_country] => US [patent_app_date] => 2022-07-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 11946 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 126 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17811621 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/811621
Systems and methods for dynamic checksum generation and validation with customizable levels of integrity verification Jul 10, 2022 Issued
Array ( [id] => 19726090 [patent_doc_number] => 20250028841 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-23 [patent_title] => ENCRYPTED SEAL, AND SECONDARY ENCRYPTION METHOD FOR STRIP-SHAPED DATA [patent_app_type] => utility [patent_app_number] => 18/292830 [patent_app_country] => US [patent_app_date] => 2022-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3893 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -27 [patent_words_short_claim] => 150 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18292830 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/292830
Encrypted seal, and secondary encryption method for strip-shaped data Jun 26, 2022 Issued
Array ( [id] => 19924830 [patent_doc_number] => 12299110 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-05-13 [patent_title] => Deep learning access and authentication in a computing architecture [patent_app_type] => utility [patent_app_number] => 17/808921 [patent_app_country] => US [patent_app_date] => 2022-06-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 9 [patent_no_of_words] => 11615 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 111 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17808921 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/808921
Deep learning access and authentication in a computing architecture Jun 23, 2022 Issued
Array ( [id] => 17919135 [patent_doc_number] => 20220321531 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-10-06 [patent_title] => METHODS AND SYSTEMS FOR EFFICIENT ADAPTIVE LOGGING OF CYBER THREAT INCIDENTS [patent_app_type] => utility [patent_app_number] => 17/838478 [patent_app_country] => US [patent_app_date] => 2022-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13561 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -27 [patent_words_short_claim] => 166 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17838478 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/838478
Methods and systems for efficient adaptive logging of cyber threat incidents Jun 12, 2022 Issued
Array ( [id] => 17872076 [patent_doc_number] => 20220294813 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-09-15 [patent_title] => MALICIOUS SOFTWARE DETECTION AND MITIGATION [patent_app_type] => utility [patent_app_number] => 17/804588 [patent_app_country] => US [patent_app_date] => 2022-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14403 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17804588 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/804588
MALICIOUS SOFTWARE DETECTION AND MITIGATION May 29, 2022 Abandoned
Array ( [id] => 19625800 [patent_doc_number] => 12164632 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-12-10 [patent_title] => Automatically detecting unknown packers [patent_app_type] => utility [patent_app_number] => 17/824427 [patent_app_country] => US [patent_app_date] => 2022-05-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 11046 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 241 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17824427 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/824427
Automatically detecting unknown packers May 24, 2022 Issued
Array ( [id] => 18811120 [patent_doc_number] => 20230385456 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-11-30 [patent_title] => AUTOMATIC SEGMENTATION USING HIERARCHICAL TIMESERIES ANALYSIS [patent_app_type] => utility [patent_app_number] => 17/824206 [patent_app_country] => US [patent_app_date] => 2022-05-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9868 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 233 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17824206 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/824206
Automatic segmentation using hierarchical timeseries analysis May 24, 2022 Issued
Array ( [id] => 17869467 [patent_doc_number] => 20220292204 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-09-15 [patent_title] => METHOD OF CONTROLLING CLIPBOARD AND ELECTRONIC DEVICE FOR PERFORMING THE SAME [patent_app_type] => utility [patent_app_number] => 17/824533 [patent_app_country] => US [patent_app_date] => 2022-05-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14472 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 87 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17824533 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/824533
Method of controlling clipboard and electronic device for performing the same May 24, 2022 Issued
Array ( [id] => 20145887 [patent_doc_number] => 12380230 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-08-05 [patent_title] => System and method for guiding privacy-enhancing transformations [patent_app_type] => utility [patent_app_number] => 17/752158 [patent_app_country] => US [patent_app_date] => 2022-05-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 1117 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 153 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17752158 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/752158
System and method for guiding privacy-enhancing transformations May 23, 2022 Issued
Array ( [id] => 18007298 [patent_doc_number] => 20220366064 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-11-17 [patent_title] => SECURE DEPLOYMENT OF DE-RISKED CONFIDENTIAL DATA WITHIN A DISTRIBUTED COMPUTING ENVIRONMENT [patent_app_type] => utility [patent_app_number] => 17/745703 [patent_app_country] => US [patent_app_date] => 2022-05-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 30045 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 149 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17745703 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/745703
Secure deployment of de-risked confidential data within a distributed computing environment May 15, 2022 Issued
Array ( [id] => 17812463 [patent_doc_number] => 20220264298 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-08-18 [patent_title] => INFERENCE-BASED DETECTION OF PROXIMITY CHANGES [patent_app_type] => utility [patent_app_number] => 17/738274 [patent_app_country] => US [patent_app_date] => 2022-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10377 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17738274 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/738274
Inference-based detection of proximity changes May 5, 2022 Issued
Menu