
Michael S. Mcnally
Examiner (ID: 14491, Phone: (571)270-1599 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436, 2432, 2136 |
| Total Applications | 1275 |
| Issued Applications | 1124 |
| Pending Applications | 61 |
| Abandoned Applications | 126 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14127495
[patent_doc_number] => 10250627
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-02
[patent_title] => Remediating a security threat to a network
[patent_app_type] => utility
[patent_app_number] => 15/500863
[patent_app_country] => US
[patent_app_date] => 2014-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 10903
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15500863
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/500863 | Remediating a security threat to a network | Jul 30, 2014 | Issued |
Array
(
[id] => 10173147
[patent_doc_number] => 09203867
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-12-01
[patent_title] => 'User-directed privacy control in a user-centric identity management system'
[patent_app_type] => utility
[patent_app_number] => 14/444267
[patent_app_country] => US
[patent_app_date] => 2014-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 22
[patent_no_of_words] => 11972
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14444267
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/444267 | User-directed privacy control in a user-centric identity management system | Jul 27, 2014 | Issued |
Array
(
[id] => 9808206
[patent_doc_number] => 20150020151
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-15
[patent_title] => 'SYSTEMS AND METHODS FOR TRUSTED SHARING'
[patent_app_type] => utility
[patent_app_number] => 14/325839
[patent_app_country] => US
[patent_app_date] => 2014-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 25907
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14325839
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/325839 | SYSTEMS AND METHODS FOR TRUSTED SHARING | Jul 7, 2014 | Abandoned |
Array
(
[id] => 10166433
[patent_doc_number] => 09197672
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-24
[patent_title] => 'Method and system for selective application of device policies'
[patent_app_type] => utility
[patent_app_number] => 14/325943
[patent_app_country] => US
[patent_app_date] => 2014-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5941
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14325943
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/325943 | Method and system for selective application of device policies | Jul 7, 2014 | Issued |
Array
(
[id] => 9808245
[patent_doc_number] => 20150020190
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-15
[patent_title] => 'METHOD FOR DISPLAYING CONTENTS AND ELECTRONIC DEVICE THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/324625
[patent_app_country] => US
[patent_app_date] => 2014-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 11753
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14324625
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/324625 | Method for displaying contents and electronic device thereof | Jul 6, 2014 | Issued |
Array
(
[id] => 11240773
[patent_doc_number] => 09467434
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-11
[patent_title] => 'Document rendering service'
[patent_app_type] => utility
[patent_app_number] => 14/324827
[patent_app_country] => US
[patent_app_date] => 2014-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 13587
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14324827
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/324827 | Document rendering service | Jul 6, 2014 | Issued |
Array
(
[id] => 9801055
[patent_doc_number] => 20150013000
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-08
[patent_title] => 'TRUST RELATIONSHIPS IN A COMPUTERIZED SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/324298
[patent_app_country] => US
[patent_app_date] => 2014-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9438
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14324298
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/324298 | Trust relationships in a computerized system | Jul 6, 2014 | Issued |
Array
(
[id] => 10646373
[patent_doc_number] => 09363260
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-07
[patent_title] => 'Detecting sharing of passwords for password protected user accounts'
[patent_app_type] => utility
[patent_app_number] => 14/325011
[patent_app_country] => US
[patent_app_date] => 2014-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13270
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14325011
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/325011 | Detecting sharing of passwords for password protected user accounts | Jul 6, 2014 | Issued |
Array
(
[id] => 11416941
[patent_doc_number] => 09563770
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-07
[patent_title] => 'Spammer group extraction apparatus and method'
[patent_app_type] => utility
[patent_app_number] => 14/324374
[patent_app_country] => US
[patent_app_date] => 2014-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 3025
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14324374
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/324374 | Spammer group extraction apparatus and method | Jul 6, 2014 | Issued |
Array
(
[id] => 10166398
[patent_doc_number] => 09197637
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-24
[patent_title] => 'Method of comparing private data without revealing the data'
[patent_app_type] => utility
[patent_app_number] => 14/324601
[patent_app_country] => US
[patent_app_date] => 2014-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12689
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 373
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14324601
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/324601 | Method of comparing private data without revealing the data | Jul 6, 2014 | Issued |
Array
(
[id] => 10611966
[patent_doc_number] => 09332022
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-05-03
[patent_title] => 'Systems and methods for detecting suspicious internet addresses'
[patent_app_type] => utility
[patent_app_number] => 14/324824
[patent_app_country] => US
[patent_app_date] => 2014-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11434
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14324824
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/324824 | Systems and methods for detecting suspicious internet addresses | Jul 6, 2014 | Issued |
Array
(
[id] => 14399657
[patent_doc_number] => 10313125
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-04
[patent_title] => Generating cryptographic checksums
[patent_app_type] => utility
[patent_app_number] => 15/319465
[patent_app_country] => US
[patent_app_date] => 2014-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 12
[patent_no_of_words] => 12566
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 68
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15319465
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/319465 | Generating cryptographic checksums | Jun 26, 2014 | Issued |
Array
(
[id] => 10180344
[patent_doc_number] => 09210571
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-12-08
[patent_title] => 'Secure wireless communication'
[patent_app_type] => utility
[patent_app_number] => 14/311889
[patent_app_country] => US
[patent_app_date] => 2014-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5017
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14311889
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/311889 | Secure wireless communication | Jun 22, 2014 | Issued |
Array
(
[id] => 9700612
[patent_doc_number] => 20140250297
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-04
[patent_title] => 'CERTIFICATE RENEWAL'
[patent_app_type] => utility
[patent_app_number] => 14/274464
[patent_app_country] => US
[patent_app_date] => 2014-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8033
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14274464
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/274464 | Certificate renewal | May 8, 2014 | Issued |
Array
(
[id] => 9700840
[patent_doc_number] => 20140250525
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-04
[patent_title] => 'SYSTEMS AND METHODS FOR PREVENTING DATA REMANENCE IN MEMORY'
[patent_app_type] => utility
[patent_app_number] => 14/274232
[patent_app_country] => US
[patent_app_date] => 2014-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13030
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14274232
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/274232 | Systems and methods for preventing data remanence in memory | May 8, 2014 | Issued |
Array
(
[id] => 10228625
[patent_doc_number] => 20150113619
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-23
[patent_title] => 'METHODS FOR MONITORING AND CONTROLLING A STORAGE ENVIRONMENT AND DEVICES THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/268584
[patent_app_country] => US
[patent_app_date] => 2014-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5786
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14268584
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/268584 | Monitoring and controlling a storage environment and devices thereof | May 1, 2014 | Issued |
Array
(
[id] => 10164606
[patent_doc_number] => 09195831
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-11-24
[patent_title] => 'Verified boot'
[patent_app_type] => utility
[patent_app_number] => 14/268486
[patent_app_country] => US
[patent_app_date] => 2014-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 5562
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14268486
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/268486 | Verified boot | May 1, 2014 | Issued |
Array
(
[id] => 10384379
[patent_doc_number] => 20150269386
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-24
[patent_title] => 'SYSTEMS AND METHODS FOR INCREASING COMPLIANCE WITH DATA LOSS PREVENTION POLICIES'
[patent_app_type] => utility
[patent_app_number] => 14/268157
[patent_app_country] => US
[patent_app_date] => 2014-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9915
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14268157
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/268157 | Systems and methods for increasing compliance with data loss prevention policies | May 1, 2014 | Issued |
Array
(
[id] => 10119608
[patent_doc_number] => 09154506
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-10-06
[patent_title] => 'System and method for secure data generation and transmission'
[patent_app_type] => utility
[patent_app_number] => 14/267973
[patent_app_country] => US
[patent_app_date] => 2014-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9219
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14267973
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/267973 | System and method for secure data generation and transmission | May 1, 2014 | Issued |
Array
(
[id] => 10100892
[patent_doc_number] => 09137218
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-15
[patent_title] => 'Splicing into an active TLS session without a certificate or private key'
[patent_app_type] => utility
[patent_app_number] => 14/268657
[patent_app_country] => US
[patent_app_date] => 2014-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 5147
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 75
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14268657
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/268657 | Splicing into an active TLS session without a certificate or private key | May 1, 2014 | Issued |