
Michael S. Mcnally
Examiner (ID: 14491, Phone: (571)270-1599 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436, 2432, 2136 |
| Total Applications | 1275 |
| Issued Applications | 1124 |
| Pending Applications | 61 |
| Abandoned Applications | 126 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10646389
[patent_doc_number] => 09363276
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-07
[patent_title] => 'Method and system for testing and validation of cryptographic algorithms'
[patent_app_type] => utility
[patent_app_number] => 14/509106
[patent_app_country] => US
[patent_app_date] => 2014-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7633
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 242
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14509106
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/509106 | Method and system for testing and validation of cryptographic algorithms | Oct 7, 2014 | Issued |
Array
(
[id] => 11239306
[patent_doc_number] => 09465951
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-10-11
[patent_title] => 'Systems and methods for resource management and certification'
[patent_app_type] => utility
[patent_app_number] => 14/508781
[patent_app_country] => US
[patent_app_date] => 2014-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6744
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14508781
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/508781 | Systems and methods for resource management and certification | Oct 6, 2014 | Issued |
Array
(
[id] => 10571299
[patent_doc_number] => 09294490
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-22
[patent_title] => 'Apparatus and method for identifying a domain name system resource exhaustion attack'
[patent_app_type] => utility
[patent_app_number] => 14/508953
[patent_app_country] => US
[patent_app_date] => 2014-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1973
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 54
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14508953
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/508953 | Apparatus and method for identifying a domain name system resource exhaustion attack | Oct 6, 2014 | Issued |
Array
(
[id] => 11782795
[patent_doc_number] => 09392023
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'End-to-end secure cloud computing'
[patent_app_type] => utility
[patent_app_number] => 14/508663
[patent_app_country] => US
[patent_app_date] => 2014-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4949
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14508663
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/508663 | End-to-end secure cloud computing | Oct 6, 2014 | Issued |
Array
(
[id] => 11287579
[patent_doc_number] => 09503448
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-22
[patent_title] => 'Authenticated session establishment'
[patent_app_type] => utility
[patent_app_number] => 14/508933
[patent_app_country] => US
[patent_app_date] => 2014-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 16
[patent_no_of_words] => 19563
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14508933
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/508933 | Authenticated session establishment | Oct 6, 2014 | Issued |
Array
(
[id] => 10509133
[patent_doc_number] => 09237011
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-12
[patent_title] => 'Unique surrogate key generation using cryptographic hashing'
[patent_app_type] => utility
[patent_app_number] => 14/507085
[patent_app_country] => US
[patent_app_date] => 2014-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3312
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14507085
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/507085 | Unique surrogate key generation using cryptographic hashing | Oct 5, 2014 | Issued |
Array
(
[id] => 9814525
[patent_doc_number] => 20150026470
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-22
[patent_title] => 'SECURED EMBEDDED DATA ENCRYPTION SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 14/506320
[patent_app_country] => US
[patent_app_date] => 2014-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7210
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14506320
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/506320 | Secured embedded data encryption systems | Oct 2, 2014 | Issued |
Array
(
[id] => 10970095
[patent_doc_number] => 20140373128
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-18
[patent_title] => 'SECURE MECHANISM TO DELIVER MOBILE TRAFFIC MANAGEMENT CONFIGURATION UPON STUB ACTIVATION ON A MOBILE DEVICE OF A GLOBAL SERVICE DISCOVERY SERVER'
[patent_app_type] => utility
[patent_app_number] => 14/474326
[patent_app_country] => US
[patent_app_date] => 2014-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5917
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14474326
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/474326 | Secure mechanism to deliver mobile traffic management configuration upon stub activation on a mobile device of a global service discovery server | Sep 1, 2014 | Issued |
Array
(
[id] => 10717118
[patent_doc_number] => 20160063265
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'PHOTOGRAPHIC COPY PREVENTION OF A SCREEN IMAGE'
[patent_app_type] => utility
[patent_app_number] => 14/474583
[patent_app_country] => US
[patent_app_date] => 2014-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5941
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14474583
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/474583 | Photographic copy prevention of a screen image | Sep 1, 2014 | Issued |
Array
(
[id] => 10538808
[patent_doc_number] => 09264451
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-16
[patent_title] => 'Generation of attribute based access control policy from existing authorization system'
[patent_app_type] => utility
[patent_app_number] => 14/474747
[patent_app_country] => US
[patent_app_date] => 2014-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 4710
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14474747
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/474747 | Generation of attribute based access control policy from existing authorization system | Sep 1, 2014 | Issued |
Array
(
[id] => 10719470
[patent_doc_number] => 20160065617
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'IMAGE MONITORING FRAMEWORK'
[patent_app_type] => utility
[patent_app_number] => 14/474442
[patent_app_country] => US
[patent_app_date] => 2014-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5436
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14474442
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/474442 | Image monitoring framework | Sep 1, 2014 | Issued |
Array
(
[id] => 10496545
[patent_doc_number] => 20150381568
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'SECURE INTEGRATION OF HYBRID CLOUDS WITH ENTERPRISE NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 14/474459
[patent_app_country] => US
[patent_app_date] => 2014-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9438
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14474459
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/474459 | Secure integration of hybrid clouds with enterprise networks | Sep 1, 2014 | Issued |
Array
(
[id] => 10719468
[patent_doc_number] => 20160065615
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'CLOUD-BASED SURVEILLANCE WITH INTELLIGENT TAMPER PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 14/471500
[patent_app_country] => US
[patent_app_date] => 2014-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7566
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14471500
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/471500 | Cloud-based surveillance with intelligent tamper protection | Aug 27, 2014 | Issued |
Array
(
[id] => 11222572
[patent_doc_number] => 09450924
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-20
[patent_title] => 'Privacy protected interactions with third parties'
[patent_app_type] => utility
[patent_app_number] => 14/467793
[patent_app_country] => US
[patent_app_date] => 2014-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9274
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14467793
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/467793 | Privacy protected interactions with third parties | Aug 24, 2014 | Issued |
Array
(
[id] => 9866539
[patent_doc_number] => 20150046557
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-12
[patent_title] => 'SYSTEM, METHOD AND APPARATUS FOR USING A VIRTUAL BUCKET TO TRANSFER ELECTRONIC DATA'
[patent_app_type] => utility
[patent_app_number] => 14/466837
[patent_app_country] => US
[patent_app_date] => 2014-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 42
[patent_figures_cnt] => 42
[patent_no_of_words] => 32216
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14466837
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/466837 | SYSTEM, METHOD AND APPARATUS FOR USING A VIRTUAL BUCKET TO TRANSFER ELECTRONIC DATA | Aug 21, 2014 | Abandoned |
Array
(
[id] => 9866971
[patent_doc_number] => 20150046990
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-12
[patent_title] => 'SYSTEM AND METHOD FOR VERIFYING STATUS OF AN AUTHENTICATION DEVICE THROUGH A BIOMETRIC PROFILE'
[patent_app_type] => utility
[patent_app_number] => 14/455640
[patent_app_country] => US
[patent_app_date] => 2014-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 8893
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14455640
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/455640 | System and method for verifying status of an authentication device through a biometric profile | Aug 7, 2014 | Issued |
Array
(
[id] => 10948343
[patent_doc_number] => 20140351364
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-27
[patent_title] => 'SYSTEM, METHOD, AND APPARATUS FOR USING A VIRTUAL BUCKET TO TRANSFER ELECTRONIC DATA'
[patent_app_type] => utility
[patent_app_number] => 14/455553
[patent_app_country] => US
[patent_app_date] => 2014-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 17055
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14455553
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/455553 | SYSTEM, METHOD, AND APPARATUS FOR USING A VIRTUAL BUCKET TO TRANSFER ELECTRONIC DATA | Aug 7, 2014 | Abandoned |
Array
(
[id] => 10196780
[patent_doc_number] => 09225697
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-29
[patent_title] => 'Storage gateway activation process'
[patent_app_type] => utility
[patent_app_number] => 14/455525
[patent_app_country] => US
[patent_app_date] => 2014-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 33
[patent_no_of_words] => 27433
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14455525
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/455525 | Storage gateway activation process | Aug 7, 2014 | Issued |
Array
(
[id] => 10159661
[patent_doc_number] => 09191447
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-17
[patent_title] => 'System and method for applying authentication and security policies in a SIP environment'
[patent_app_type] => utility
[patent_app_number] => 14/454004
[patent_app_country] => US
[patent_app_date] => 2014-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 16597
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14454004
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/454004 | System and method for applying authentication and security policies in a SIP environment | Aug 6, 2014 | Issued |
Array
(
[id] => 12229219
[patent_doc_number] => 09916463
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-13
[patent_title] => 'Camouflaged communication device'
[patent_app_type] => utility
[patent_app_number] => 14/908398
[patent_app_country] => US
[patent_app_date] => 2014-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 24
[patent_no_of_words] => 13386
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14908398
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/908398 | Camouflaged communication device | Jul 30, 2014 | Issued |