
Matthew Smithers
Examiner (ID: 2939, Phone: (571)272-3876 , Office: P/2437 )
| Most Active Art Unit | 2437 |
| Art Unit(s) | 2132, 2764, 2767, 2134, 2137, 2437 |
| Total Applications | 1843 |
| Issued Applications | 1578 |
| Pending Applications | 152 |
| Abandoned Applications | 145 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17348033
[patent_doc_number] => 20220014364
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-01-13
[patent_title] => QUANTUM INFORMATION INTERCEPTION PREVENTION
[patent_app_type] => utility
[patent_app_number] => 16/926325
[patent_app_country] => US
[patent_app_date] => 2020-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19656
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16926325
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/926325 | Quantum information interception prevention | Jul 9, 2020 | Issued |
Array
(
[id] => 17746471
[patent_doc_number] => 11394561
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-19
[patent_title] => Digital transaction signing for multiple client devices using secured encrypted private keys
[patent_app_type] => utility
[patent_app_number] => 16/917885
[patent_app_country] => US
[patent_app_date] => 2020-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13111
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16917885
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/917885 | Digital transaction signing for multiple client devices using secured encrypted private keys | Jun 29, 2020 | Issued |
Array
(
[id] => 16516956
[patent_doc_number] => 20200396214
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-17
[patent_title] => TRUSTED COMMUNICATION SESSION AND CONTENT DELIVERY
[patent_app_type] => utility
[patent_app_number] => 16/913928
[patent_app_country] => US
[patent_app_date] => 2020-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13093
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16913928
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/913928 | Trusted communication session and content delivery | Jun 25, 2020 | Issued |
Array
(
[id] => 16363699
[patent_doc_number] => 20200320450
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-08
[patent_title] => PERVASIVE, DOMAIN AND SITUATIONAL-AWARE, ADAPTIVE, AUTOMATED, AND COORDINATED BIG DATA ANALYSIS, CONTEXTUAL LEARNING AND PREDICTIVE CONTROL OF BUSINESS AND OPERATIONAL RISKS AND SECURITY
[patent_app_type] => utility
[patent_app_number] => 16/905554
[patent_app_country] => US
[patent_app_date] => 2020-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 23742
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16905554
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/905554 | Pervasive, domain and situational-aware, adaptive, automated, and coordinated big data analysis, contextual learning and predictive control of business and operational risks and security | Jun 17, 2020 | Issued |
Array
(
[id] => 16349083
[patent_doc_number] => 20200313734
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-01
[patent_title] => SECURE END-TO-END TRANSPORT THROUGH INTERMEDIARY NODES
[patent_app_type] => utility
[patent_app_number] => 16/902325
[patent_app_country] => US
[patent_app_date] => 2020-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5673
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16902325
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/902325 | Secure end-to-end transport through intermediary nodes | Jun 15, 2020 | Issued |
Array
(
[id] => 17264050
[patent_doc_number] => 20210377035
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-02
[patent_title] => INTELLIGENT HASHING OF SENSITIVE INFORMATION
[patent_app_type] => utility
[patent_app_number] => 16/884728
[patent_app_country] => US
[patent_app_date] => 2020-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11262
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16884728
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/884728 | Intelligent hashing of sensitive information | May 26, 2020 | Issued |
Array
(
[id] => 17639095
[patent_doc_number] => 11349835
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-31
[patent_title] => Systems and methods for authenticating a user based on a biometric model associated with the user
[patent_app_type] => utility
[patent_app_number] => 16/883636
[patent_app_country] => US
[patent_app_date] => 2020-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6006
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16883636
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/883636 | Systems and methods for authenticating a user based on a biometric model associated with the user | May 25, 2020 | Issued |
Array
(
[id] => 16472577
[patent_doc_number] => 20200374115
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-26
[patent_title] => SHARED SECRET GENERATION
[patent_app_type] => utility
[patent_app_number] => 16/879546
[patent_app_country] => US
[patent_app_date] => 2020-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5425
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 54
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16879546
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/879546 | Shared secret generation | May 19, 2020 | Issued |
Array
(
[id] => 16273096
[patent_doc_number] => 20200274584
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-27
[patent_title] => SECURE END-TO-END TRANSPORT THROUGH INTERMEDIARY NODES
[patent_app_type] => utility
[patent_app_number] => 15/931060
[patent_app_country] => US
[patent_app_date] => 2020-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5638
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 63
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15931060
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/931060 | Secure end-to-end transport through intermediary nodes | May 12, 2020 | Issued |
Array
(
[id] => 17739061
[patent_doc_number] => 20220224523
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-14
[patent_title] => APPARATUS AND METHOD FOR QUANTUM ENHANCED PHYSICAL LAYER SECURITY
[patent_app_type] => utility
[patent_app_number] => 17/613048
[patent_app_country] => US
[patent_app_date] => 2020-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2845
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17613048
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/613048 | Apparatus and method for quantum enhanced physical layer security | May 5, 2020 | Issued |
Array
(
[id] => 17942744
[patent_doc_number] => 11477216
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-18
[patent_title] => Detection of abnormal entities based on syntactic grouping of strings
[patent_app_type] => utility
[patent_app_number] => 16/866411
[patent_app_country] => US
[patent_app_date] => 2020-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6789
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16866411
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/866411 | Detection of abnormal entities based on syntactic grouping of strings | May 3, 2020 | Issued |
Array
(
[id] => 16257795
[patent_doc_number] => 20200267170
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-20
[patent_title] => SYSTEM AND METHOD FOR DETECTING AND CLASSIFYING MALWARE
[patent_app_type] => utility
[patent_app_number] => 15/929458
[patent_app_country] => US
[patent_app_date] => 2020-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8317
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15929458
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/929458 | System and method for detecting and classifying malware | May 3, 2020 | Issued |
Array
(
[id] => 16242595
[patent_doc_number] => 20200259829
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-13
[patent_title] => PROVIDING ACCESS CONTROL AND IDENTITY VERIFICATION FOR COMMUNICATIONS WHEN RECEIVING A COMMUNICATION AT AN ENTITY TO BE VERIFIED
[patent_app_type] => utility
[patent_app_number] => 16/861685
[patent_app_country] => US
[patent_app_date] => 2020-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21184
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -31
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16861685
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/861685 | Providing access control and identity verification for communications when receiving a communication at an entity to be verified | Apr 28, 2020 | Issued |
Array
(
[id] => 16242593
[patent_doc_number] => 20200259827
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-13
[patent_title] => PROVIDING ACCESS CONTROL AND IDENTITY VERIFICATION FOR COMMUNICATIONS WHEN INITIATING A COMMUNICATION FROM AN ENTITY TO BE VERIFIED
[patent_app_type] => utility
[patent_app_number] => 16/861638
[patent_app_country] => US
[patent_app_date] => 2020-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21049
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16861638
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/861638 | Providing access control and identity verification for communications when initiating a communication from an entity to be verified | Apr 28, 2020 | Issued |
Array
(
[id] => 16227277
[patent_doc_number] => 20200252394
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-06
[patent_title] => Multifactor Contextual Authentication and Entropy from Device or Device Input or Gesture Authentication
[patent_app_type] => utility
[patent_app_number] => 16/857750
[patent_app_country] => US
[patent_app_date] => 2020-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 34859
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16857750
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/857750 | Multifactor contextual authentication and entropy from device or device input or gesture authentication | Apr 23, 2020 | Issued |
Array
(
[id] => 17758741
[patent_doc_number] => 11399045
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-26
[patent_title] => Detecting fraudulent logins
[patent_app_type] => utility
[patent_app_number] => 16/845745
[patent_app_country] => US
[patent_app_date] => 2020-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 5024
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16845745
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/845745 | Detecting fraudulent logins | Apr 9, 2020 | Issued |
Array
(
[id] => 17934291
[patent_doc_number] => 20220329417
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-10-13
[patent_title] => Quantum Key Distribution Protocol with Weak Measurements
[patent_app_type] => utility
[patent_app_number] => 16/844404
[patent_app_country] => US
[patent_app_date] => 2020-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17259
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -2
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16844404
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/844404 | Quantum Key Distribution Protocol with Weak Measurements | Apr 8, 2020 | Abandoned |
Array
(
[id] => 17746649
[patent_doc_number] => 11394739
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-19
[patent_title] => Configurable event-based compute instance security assessments
[patent_app_type] => utility
[patent_app_number] => 16/844303
[patent_app_country] => US
[patent_app_date] => 2020-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12242
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16844303
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/844303 | Configurable event-based compute instance security assessments | Apr 8, 2020 | Issued |
Array
(
[id] => 17781377
[patent_doc_number] => 20220247727
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-04
[patent_title] => METHOD AND APPARATUS FOR SENDING AND PROCESSING ACCESS REQUEST
[patent_app_type] => utility
[patent_app_number] => 17/622793
[patent_app_country] => US
[patent_app_date] => 2020-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15253
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17622793
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/622793 | METHOD AND APPARATUS FOR SENDING AND PROCESSING ACCESS REQUEST | Apr 8, 2020 | Abandoned |
Array
(
[id] => 16520953
[patent_doc_number] => 10872168
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-22
[patent_title] => Method and system for providing user notification when personal information is used in voice control device
[patent_app_type] => utility
[patent_app_number] => 16/842834
[patent_app_country] => US
[patent_app_date] => 2020-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10695
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16842834
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/842834 | Method and system for providing user notification when personal information is used in voice control device | Apr 7, 2020 | Issued |