
Michael S. Mcnally
Examiner (ID: 14491, Phone: (571)270-1599 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436, 2432, 2136 |
| Total Applications | 1275 |
| Issued Applications | 1124 |
| Pending Applications | 61 |
| Abandoned Applications | 126 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11367830
[patent_doc_number] => 20170005811
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'SYSTEMS AND METHODS FOR AUTHENTICATION BASED ON PHYSICALLY UNCLONABLE FUNCTIONS'
[patent_app_type] => utility
[patent_app_number] => 14/842661
[patent_app_country] => US
[patent_app_date] => 2015-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3088
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14842661
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/842661 | Systems and methods for authentication based on physically unclonable functions | Aug 31, 2015 | Issued |
Array
(
[id] => 11065052
[patent_doc_number] => 20160262016
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-08
[patent_title] => 'Communicating Messages with Intermittently Available Encryption Credentials'
[patent_app_type] => utility
[patent_app_number] => 14/841226
[patent_app_country] => US
[patent_app_date] => 2015-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7100
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14841226
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/841226 | Communicating messages with intermittently available encryption credentials | Aug 30, 2015 | Issued |
Array
(
[id] => 11579716
[patent_doc_number] => 09634990
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-25
[patent_title] => 'Distributed firewall security system for cloud computing environments'
[patent_app_type] => utility
[patent_app_number] => 14/817874
[patent_app_country] => US
[patent_app_date] => 2015-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 17404
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14817874
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/817874 | Distributed firewall security system for cloud computing environments | Aug 3, 2015 | Issued |
Array
(
[id] => 10465216
[patent_doc_number] => 20150350231
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'METHOD AND AN APPARATUS TO PERFORM MULTIPLE PACKET PAYLOADS ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 14/818215
[patent_app_country] => US
[patent_app_date] => 2015-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5210
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14818215
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/818215 | Method and an apparatus to perform multiple packet payloads analysis | Aug 3, 2015 | Issued |
Array
(
[id] => 11308636
[patent_doc_number] => 09516052
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-12-06
[patent_title] => 'Timeline displays of network security investigation events'
[patent_app_type] => utility
[patent_app_number] => 14/815981
[patent_app_country] => US
[patent_app_date] => 2015-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 49
[patent_figures_cnt] => 49
[patent_no_of_words] => 33916
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14815981
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/815981 | Timeline displays of network security investigation events | Jul 31, 2015 | Issued |
Array
(
[id] => 10717113
[patent_doc_number] => 20160063260
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'POLICY-BASED TECHNIQUES FOR MANAGING ACCESS CONTROL'
[patent_app_type] => utility
[patent_app_number] => 14/815391
[patent_app_country] => US
[patent_app_date] => 2015-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 16984
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14815391
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/815391 | Policy based techniques for managing access control | Jul 30, 2015 | Issued |
Array
(
[id] => 11540388
[patent_doc_number] => 09614818
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-04
[patent_title] => 'Key generation and broadcasting'
[patent_app_type] => utility
[patent_app_number] => 14/810340
[patent_app_country] => US
[patent_app_date] => 2015-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6452
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14810340
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/810340 | Key generation and broadcasting | Jul 26, 2015 | Issued |
Array
(
[id] => 11418336
[patent_doc_number] => 09565177
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-07
[patent_title] => 'Network application security utilizing network-provided identities'
[patent_app_type] => utility
[patent_app_number] => 14/809042
[patent_app_country] => US
[patent_app_date] => 2015-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 8239
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14809042
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/809042 | Network application security utilizing network-provided identities | Jul 23, 2015 | Issued |
Array
(
[id] => 11202132
[patent_doc_number] => 09432359
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-30
[patent_title] => 'Registration and network access control'
[patent_app_type] => utility
[patent_app_number] => 14/802362
[patent_app_country] => US
[patent_app_date] => 2015-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10795
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14802362
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/802362 | Registration and network access control | Jul 16, 2015 | Issued |
Array
(
[id] => 10524856
[patent_doc_number] => 09251371
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-02
[patent_title] => 'Method and system for applying data retention policies in a computing platform'
[patent_app_type] => utility
[patent_app_number] => 14/793435
[patent_app_country] => US
[patent_app_date] => 2015-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10745
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14793435
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/793435 | Method and system for applying data retention policies in a computing platform | Jul 6, 2015 | Issued |
Array
(
[id] => 11367824
[patent_doc_number] => 20170005805
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'Detecting Compromised Certificate Authority'
[patent_app_type] => utility
[patent_app_number] => 14/788862
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4806
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14788862
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/788862 | Detecting compromised certificate authority | Jun 30, 2015 | Issued |
Array
(
[id] => 12013751
[patent_doc_number] => 09807084
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-31
[patent_title] => 'Information processing apparatus and encryption communicating method'
[patent_app_type] => utility
[patent_app_number] => 14/789091
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 8795
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14789091
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/789091 | Information processing apparatus and encryption communicating method | Jun 30, 2015 | Issued |
Array
(
[id] => 11552675
[patent_doc_number] => 09621544
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-11
[patent_title] => 'Computer implemented method of analyzing X.509 certificates in SSL/TLS communications and the data-processing system'
[patent_app_type] => utility
[patent_app_number] => 14/789231
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4407
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14789231
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/789231 | Computer implemented method of analyzing X.509 certificates in SSL/TLS communications and the data-processing system | Jun 30, 2015 | Issued |
Array
(
[id] => 11368005
[patent_doc_number] => 20170005986
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'Firewall Rule Management'
[patent_app_type] => utility
[patent_app_number] => 14/788689
[patent_app_country] => US
[patent_app_date] => 2015-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 21480
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14788689
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/788689 | Firewall rule management | Jun 29, 2015 | Issued |
Array
(
[id] => 11600661
[patent_doc_number] => 09647846
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-05-09
[patent_title] => 'Systems and methods for verifying the authenticity of graphical images'
[patent_app_type] => utility
[patent_app_number] => 14/788641
[patent_app_country] => US
[patent_app_date] => 2015-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11405
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14788641
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/788641 | Systems and methods for verifying the authenticity of graphical images | Jun 29, 2015 | Issued |
Array
(
[id] => 11688233
[patent_doc_number] => 09686289
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-20
[patent_title] => 'Access enforcement at a wireless access point'
[patent_app_type] => utility
[patent_app_number] => 14/788496
[patent_app_country] => US
[patent_app_date] => 2015-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7550
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14788496
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/788496 | Access enforcement at a wireless access point | Jun 29, 2015 | Issued |
Array
(
[id] => 11586824
[patent_doc_number] => 09641485
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-05-02
[patent_title] => 'System and method for out-of-band network firewall'
[patent_app_type] => utility
[patent_app_number] => 14/788560
[patent_app_country] => US
[patent_app_date] => 2015-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3350
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14788560
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/788560 | System and method for out-of-band network firewall | Jun 29, 2015 | Issued |
Array
(
[id] => 11488851
[patent_doc_number] => 09594922
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-03-14
[patent_title] => 'Non-persistent shared authentication tokens in a cluster of nodes'
[patent_app_type] => utility
[patent_app_number] => 14/788755
[patent_app_country] => US
[patent_app_date] => 2015-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6091
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14788755
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/788755 | Non-persistent shared authentication tokens in a cluster of nodes | Jun 29, 2015 | Issued |
Array
(
[id] => 10419296
[patent_doc_number] => 20150304308
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-22
[patent_title] => 'SECURE IDENTITY FEDERATION FOR NON-FEDERATED SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 14/754653
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7948
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14754653
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/754653 | Secure identity federation for non-federated systems | Jun 28, 2015 | Issued |
Array
(
[id] => 11454323
[patent_doc_number] => 09577983
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-21
[patent_title] => 'Method and apparatus to perform multiple packet payloads analysis'
[patent_app_type] => utility
[patent_app_number] => 14/747860
[patent_app_country] => US
[patent_app_date] => 2015-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 16
[patent_no_of_words] => 10322
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 280
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14747860
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/747860 | Method and apparatus to perform multiple packet payloads analysis | Jun 22, 2015 | Issued |