
Michael S. Mcnally
Examiner (ID: 14491, Phone: (571)270-1599 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436, 2432, 2136 |
| Total Applications | 1275 |
| Issued Applications | 1124 |
| Pending Applications | 61 |
| Abandoned Applications | 126 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13541437
[patent_doc_number] => 20180322265
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-08
[patent_title] => USING BIOMETRIC USER-SPECIFIC ATTRIBUTES
[patent_app_type] => utility
[patent_app_number] => 16/022035
[patent_app_country] => US
[patent_app_date] => 2018-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10402
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16022035
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/022035 | Using biometric user-specific attributes | Jun 27, 2018 | Issued |
Array
(
[id] => 15329241
[patent_doc_number] => 20200004950
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-02
[patent_title] => TAMPER MITIGATION SCHEME FOR LOCALLY POWERED SMART DEVICES
[patent_app_type] => utility
[patent_app_number] => 16/021244
[patent_app_country] => US
[patent_app_date] => 2018-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7672
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16021244
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/021244 | Tamper mitigation scheme for locally powered smart devices | Jun 27, 2018 | Issued |
Array
(
[id] => 15902975
[patent_doc_number] => 20200151007
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-14
[patent_title] => LIGHTWEIGHT DISPATCHER FOR PROGRAM CONTROL FLOW FLATTENING
[patent_app_type] => utility
[patent_app_number] => 16/618273
[patent_app_country] => US
[patent_app_date] => 2018-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8172
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16618273
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/618273 | Lightweight dispatcher for program control flow flattening | May 28, 2018 | Issued |
Array
(
[id] => 13421945
[patent_doc_number] => 20180262515
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-13
[patent_title] => Trust Relationships in a Computerized System
[patent_app_type] => utility
[patent_app_number] => 15/977297
[patent_app_country] => US
[patent_app_date] => 2018-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9383
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15977297
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/977297 | Trust relationships in a computerized system | May 10, 2018 | Issued |
Array
(
[id] => 16250503
[patent_doc_number] => 10749889
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-18
[patent_title] => Rule-based remediation of vulnerabilities in a managed network
[patent_app_type] => utility
[patent_app_number] => 15/972404
[patent_app_country] => US
[patent_app_date] => 2018-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 17203
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 258
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15972404
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/972404 | Rule-based remediation of vulnerabilities in a managed network | May 6, 2018 | Issued |
Array
(
[id] => 16203075
[patent_doc_number] => 10728269
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-28
[patent_title] => Method for conditionally hooking endpoint processes with a security agent
[patent_app_type] => utility
[patent_app_number] => 15/970825
[patent_app_country] => US
[patent_app_date] => 2018-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 15574
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15970825
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/970825 | Method for conditionally hooking endpoint processes with a security agent | May 2, 2018 | Issued |
Array
(
[id] => 13526329
[patent_doc_number] => 20180314707
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-01
[patent_title] => GEOGRAPHIC USER INTERACTION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/964630
[patent_app_country] => US
[patent_app_date] => 2018-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4662
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15964630
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/964630 | GEOGRAPHIC USER INTERACTION SYSTEM | Apr 26, 2018 | Abandoned |
Array
(
[id] => 15032173
[patent_doc_number] => 20190327091
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-24
[patent_title] => Validation of Short Authentication Data with a Zero Knowledge Proof
[patent_app_type] => utility
[patent_app_number] => 15/959189
[patent_app_country] => US
[patent_app_date] => 2018-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6534
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15959189
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/959189 | Validation of short authentication data with a zero knowledge proof | Apr 20, 2018 | Issued |
Array
(
[id] => 13497907
[patent_doc_number] => 20180300496
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-18
[patent_title] => SYSTEM AND METHOD FOR IMPLEMENTING DATA SOVEREIGNTY SAFEGUARDS IN A DISTRIBUTED SERVICES NETWORK ARCHITECTURE
[patent_app_type] => utility
[patent_app_number] => 15/956045
[patent_app_country] => US
[patent_app_date] => 2018-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7414
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 208
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15956045
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/956045 | System and method for implementing data sovereignty safeguards in a distributed services network architecture | Apr 17, 2018 | Issued |
Array
(
[id] => 13365321
[patent_doc_number] => 20180234201
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-16
[patent_title] => FIBER OPTIC LIGHT INTENSITY ENCRYPTION
[patent_app_type] => utility
[patent_app_number] => 15/955074
[patent_app_country] => US
[patent_app_date] => 2018-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7050
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15955074
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/955074 | Fiber optic light intensity encryption | Apr 16, 2018 | Issued |
Array
(
[id] => 14335163
[patent_doc_number] => 10298615
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-21
[patent_title] => Splicing into an active TLS session without a certificate or private key
[patent_app_type] => utility
[patent_app_number] => 15/955382
[patent_app_country] => US
[patent_app_date] => 2018-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 5000
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15955382
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/955382 | Splicing into an active TLS session without a certificate or private key | Apr 16, 2018 | Issued |
Array
(
[id] => 17380121
[patent_doc_number] => 11238137
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-02-01
[patent_title] => Enabling program code on target data processing devices
[patent_app_type] => utility
[patent_app_number] => 16/495328
[patent_app_country] => US
[patent_app_date] => 2018-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 4503
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16495328
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/495328 | Enabling program code on target data processing devices | Apr 10, 2018 | Issued |
Array
(
[id] => 13361991
[patent_doc_number] => 20180232535
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-16
[patent_title] => DATA PRIVACY MANAGEMENT SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 15/949994
[patent_app_country] => US
[patent_app_date] => 2018-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10826
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -3
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15949994
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/949994 | Data privacy management system and method | Apr 9, 2018 | Issued |
Array
(
[id] => 16411150
[patent_doc_number] => 10819724
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-27
[patent_title] => Systems and methods for cyberbot network detection
[patent_app_type] => utility
[patent_app_number] => 15/944718
[patent_app_country] => US
[patent_app_date] => 2018-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 33
[patent_no_of_words] => 15722
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15944718
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/944718 | Systems and methods for cyberbot network detection | Apr 2, 2018 | Issued |
Array
(
[id] => 16945419
[patent_doc_number] => 11057685
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-06
[patent_title] => Media content proof of play over optical medium
[patent_app_type] => utility
[patent_app_number] => 15/940754
[patent_app_country] => US
[patent_app_date] => 2018-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3976
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15940754
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/940754 | Media content proof of play over optical medium | Mar 28, 2018 | Issued |
Array
(
[id] => 13757035
[patent_doc_number] => 10171480
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-01
[patent_title] => Cloud-based surveillance with intelligent tamper protection
[patent_app_type] => utility
[patent_app_number] => 15/939610
[patent_app_country] => US
[patent_app_date] => 2018-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7547
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15939610
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/939610 | Cloud-based surveillance with intelligent tamper protection | Mar 28, 2018 | Issued |
Array
(
[id] => 16292719
[patent_doc_number] => 10769571
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-08
[patent_title] => Security and content protection by test environment analysis
[patent_app_type] => utility
[patent_app_number] => 15/939052
[patent_app_country] => US
[patent_app_date] => 2018-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 23875
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15939052
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/939052 | Security and content protection by test environment analysis | Mar 27, 2018 | Issued |
Array
(
[id] => 14065887
[patent_doc_number] => 10237264
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-19
[patent_title] => Computer readable storage media for legacy integration and methods and systems for utilizing same
[patent_app_type] => utility
[patent_app_number] => 15/936016
[patent_app_country] => US
[patent_app_date] => 2018-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7182
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15936016
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/936016 | Computer readable storage media for legacy integration and methods and systems for utilizing same | Mar 25, 2018 | Issued |
Array
(
[id] => 16449374
[patent_doc_number] => 10841309
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-17
[patent_title] => Controlling accesses to networks based on IT systems having embedded systems or distributed systems
[patent_app_type] => utility
[patent_app_number] => 15/933431
[patent_app_country] => US
[patent_app_date] => 2018-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3696
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15933431
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/933431 | Controlling accesses to networks based on IT systems having embedded systems or distributed systems | Mar 22, 2018 | Issued |
Array
(
[id] => 16449168
[patent_doc_number] => 10841103
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-17
[patent_title] => Relying party certificate validation when client uses relying party's IP address
[patent_app_type] => utility
[patent_app_number] => 15/923197
[patent_app_country] => US
[patent_app_date] => 2018-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7356
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15923197
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/923197 | Relying party certificate validation when client uses relying party's IP address | Mar 15, 2018 | Issued |