
Michael S. Mcnally
Examiner (ID: 14491, Phone: (571)270-1599 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436, 2432, 2136 |
| Total Applications | 1275 |
| Issued Applications | 1124 |
| Pending Applications | 61 |
| Abandoned Applications | 126 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15825279
[patent_doc_number] => 10637848
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-28
[patent_title] => Apparatus for supporting authentication between devices in resource-constrained environment and method for the same
[patent_app_type] => utility
[patent_app_number] => 15/814193
[patent_app_country] => US
[patent_app_date] => 2017-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6742
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15814193
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/814193 | Apparatus for supporting authentication between devices in resource-constrained environment and method for the same | Nov 14, 2017 | Issued |
Array
(
[id] => 12736384
[patent_doc_number] => 20180137295
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-17
[patent_title] => METHOD AND APPARATUS FOR MULTI-CHANNEL SECURE COMMUNICATION AND DATA TRANSFER
[patent_app_type] => utility
[patent_app_number] => 15/812376
[patent_app_country] => US
[patent_app_date] => 2017-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 22178
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15812376
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/812376 | Method and apparatus for multi-channel secure communication and data transfer | Nov 13, 2017 | Issued |
Array
(
[id] => 14319723
[patent_doc_number] => 20190149565
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-16
[patent_title] => ANOMALY DETECTION USING COGNITIVE COMPUTING
[patent_app_type] => utility
[patent_app_number] => 15/810367
[patent_app_country] => US
[patent_app_date] => 2017-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12824
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15810367
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/810367 | Anomaly detection using cognitive computing | Nov 12, 2017 | Issued |
Array
(
[id] => 15317899
[patent_doc_number] => 10523675
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-31
[patent_title] => Remote direct memory access authorization
[patent_app_type] => utility
[patent_app_number] => 15/806926
[patent_app_country] => US
[patent_app_date] => 2017-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 14746
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 425
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15806926
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/806926 | Remote direct memory access authorization | Nov 7, 2017 | Issued |
Array
(
[id] => 15549713
[patent_doc_number] => 10574654
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-02-25
[patent_title] => Segmentation based network security
[patent_app_type] => utility
[patent_app_number] => 15/805808
[patent_app_country] => US
[patent_app_date] => 2017-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7342
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15805808
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/805808 | Segmentation based network security | Nov 6, 2017 | Issued |
Array
(
[id] => 13864347
[patent_doc_number] => 10193916
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-29
[patent_title] => Configuring the generation of event data based on a triggering search query
[patent_app_type] => utility
[patent_app_number] => 15/799167
[patent_app_country] => US
[patent_app_date] => 2017-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 12935
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15799167
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/799167 | Configuring the generation of event data based on a triggering search query | Oct 30, 2017 | Issued |
Array
(
[id] => 14127497
[patent_doc_number] => 10250628
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-02
[patent_title] => Storyboard displays of information technology investigative events along a timeline
[patent_app_type] => utility
[patent_app_number] => 15/799906
[patent_app_country] => US
[patent_app_date] => 2017-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 49
[patent_figures_cnt] => 49
[patent_no_of_words] => 33368
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15799906
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/799906 | Storyboard displays of information technology investigative events along a timeline | Oct 30, 2017 | Issued |
Array
(
[id] => 13394681
[patent_doc_number] => 20180248883
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-30
[patent_title] => Secure Identity Federation for Non-Federated Systems
[patent_app_type] => utility
[patent_app_number] => 15/790909
[patent_app_country] => US
[patent_app_date] => 2017-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7907
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15790909
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/790909 | Secure identity federation for non-federated systems | Oct 22, 2017 | Issued |
Array
(
[id] => 12189688
[patent_doc_number] => 20180048623
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-15
[patent_title] => 'FIREWALL RULE MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 15/726237
[patent_app_country] => US
[patent_app_date] => 2017-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 21480
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15726237
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/726237 | Firewall rule management | Oct 4, 2017 | Issued |
Array
(
[id] => 14136309
[patent_doc_number] => 20190102544
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-04
[patent_title] => METHOD FOR DEFENDING AGAINST MALWARE
[patent_app_type] => utility
[patent_app_number] => 15/723581
[patent_app_country] => US
[patent_app_date] => 2017-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1959
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 50
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15723581
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/723581 | Method for defending against malware | Oct 2, 2017 | Issued |
Array
(
[id] => 14987091
[patent_doc_number] => 10447473
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-15
[patent_title] => Method and device for generating a cryptographic key
[patent_app_type] => utility
[patent_app_number] => 15/722722
[patent_app_country] => US
[patent_app_date] => 2017-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 4385
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15722722
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/722722 | Method and device for generating a cryptographic key | Oct 1, 2017 | Issued |
Array
(
[id] => 15425909
[patent_doc_number] => 10545883
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-28
[patent_title] => Verification bit for one-way encrypted memory
[patent_app_type] => utility
[patent_app_number] => 15/720799
[patent_app_country] => US
[patent_app_date] => 2017-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 19
[patent_no_of_words] => 10404
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15720799
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/720799 | Verification bit for one-way encrypted memory | Sep 28, 2017 | Issued |
Array
(
[id] => 15891823
[patent_doc_number] => 10652277
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-05-12
[patent_title] => Identifying and blocking overlay phishing
[patent_app_type] => utility
[patent_app_number] => 15/721281
[patent_app_country] => US
[patent_app_date] => 2017-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12911
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15721281
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/721281 | Identifying and blocking overlay phishing | Sep 28, 2017 | Issued |
Array
(
[id] => 13964703
[patent_doc_number] => 20190058696
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-21
[patent_title] => TECHNIQUES FOR SHARED PRIVATE DATA OBJECTS IN A TRUSTED EXECUTION ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 15/721723
[patent_app_country] => US
[patent_app_date] => 2017-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13706
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15721723
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/721723 | Techniques for shared private data objects in a trusted execution environment | Sep 28, 2017 | Issued |
Array
(
[id] => 15477221
[patent_doc_number] => 10554507
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-02-04
[patent_title] => Multi-level control for enhanced resource and object evaluation management of malware detection system
[patent_app_type] => utility
[patent_app_number] => 15/721630
[patent_app_country] => US
[patent_app_date] => 2017-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 22247
[patent_no_of_claims] => 41
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15721630
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/721630 | Multi-level control for enhanced resource and object evaluation management of malware detection system | Sep 28, 2017 | Issued |
Array
(
[id] => 16387413
[patent_doc_number] => 10812266
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-10-20
[patent_title] => Methods for managing security tokens based on security violations and devices thereof
[patent_app_type] => utility
[patent_app_number] => 15/720737
[patent_app_country] => US
[patent_app_date] => 2017-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4644
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15720737
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/720737 | Methods for managing security tokens based on security violations and devices thereof | Sep 28, 2017 | Issued |
Array
(
[id] => 14037899
[patent_doc_number] => 10230716
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-12
[patent_title] => Information processing apparatus and encryption communicating method
[patent_app_type] => utility
[patent_app_number] => 15/717034
[patent_app_country] => US
[patent_app_date] => 2017-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 8553
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15717034
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/717034 | Information processing apparatus and encryption communicating method | Sep 26, 2017 | Issued |
Array
(
[id] => 14957545
[patent_doc_number] => 10440060
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-08
[patent_title] => End-to-end secure cloud computing
[patent_app_type] => utility
[patent_app_number] => 15/712626
[patent_app_country] => US
[patent_app_date] => 2017-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4901
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15712626
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/712626 | End-to-end secure cloud computing | Sep 21, 2017 | Issued |
Array
(
[id] => 14335069
[patent_doc_number] => 10298568
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-05-21
[patent_title] => System integrating an identity selector and user-portable device and method of use in a user-centric identity management system
[patent_app_type] => utility
[patent_app_number] => 15/709050
[patent_app_country] => US
[patent_app_date] => 2017-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 14
[patent_no_of_words] => 9544
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15709050
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/709050 | System integrating an identity selector and user-portable device and method of use in a user-centric identity management system | Sep 18, 2017 | Issued |
Array
(
[id] => 12123472
[patent_doc_number] => 20180007057
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-04
[patent_title] => 'USING MULTIPLE CREDENTIALS FOR ACCESS AND TRAFFIC DIFFERENTIATION'
[patent_app_type] => utility
[patent_app_number] => 15/702546
[patent_app_country] => US
[patent_app_date] => 2017-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 30
[patent_no_of_words] => 25040
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15702546
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/702546 | USING MULTIPLE CREDENTIALS FOR ACCESS AND TRAFFIC DIFFERENTIATION | Sep 11, 2017 | Abandoned |