
Michael S. Mcnally
Examiner (ID: 14491, Phone: (571)270-1599 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436, 2432, 2136 |
| Total Applications | 1275 |
| Issued Applications | 1124 |
| Pending Applications | 61 |
| Abandoned Applications | 126 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9688239
[patent_doc_number] => 20140245004
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-28
[patent_title] => 'RULE SETS FOR CLIENT-APPLIED ENCRYPTION IN COMMUNICATIONS NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 14/189120
[patent_app_country] => US
[patent_app_date] => 2014-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5433
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14189120
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/189120 | Rule sets for client-applied encryption in communications networks | Feb 24, 2014 | Issued |
Array
(
[id] => 9688656
[patent_doc_number] => 20140245421
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-28
[patent_title] => 'IP REFLECTION'
[patent_app_type] => utility
[patent_app_number] => 14/189971
[patent_app_country] => US
[patent_app_date] => 2014-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2917
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14189971
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/189971 | IP reflection | Feb 24, 2014 | Issued |
Array
(
[id] => 10144352
[patent_doc_number] => 09177161
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-03
[patent_title] => 'Systems and methods for secure access modules'
[patent_app_type] => utility
[patent_app_number] => 14/189677
[patent_app_country] => US
[patent_app_date] => 2014-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3693
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 58
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14189677
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/189677 | Systems and methods for secure access modules | Feb 24, 2014 | Issued |
Array
(
[id] => 10503510
[patent_doc_number] => 09231913
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-01-05
[patent_title] => 'Techniques for secure browsing'
[patent_app_type] => utility
[patent_app_number] => 14/189372
[patent_app_country] => US
[patent_app_date] => 2014-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4007
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14189372
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/189372 | Techniques for secure browsing | Feb 24, 2014 | Issued |
Array
(
[id] => 9941088
[patent_doc_number] => 08990923
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-03-24
[patent_title] => 'Protection against unauthorized access to automated system for control of technological processes'
[patent_app_type] => utility
[patent_app_number] => 14/179063
[patent_app_country] => US
[patent_app_date] => 2014-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5121
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14179063
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/179063 | Protection against unauthorized access to automated system for control of technological processes | Feb 11, 2014 | Issued |
Array
(
[id] => 10338064
[patent_doc_number] => 20150223069
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-06
[patent_title] => 'TUNE CONTROL FOR SHARED ACCESS SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/174308
[patent_app_country] => US
[patent_app_date] => 2014-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 16463
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14174308
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/174308 | Tune control for shared access system | Feb 5, 2014 | Issued |
Array
(
[id] => 10034646
[patent_doc_number] => 09075966
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-07
[patent_title] => 'System and method for loading application classes'
[patent_app_type] => utility
[patent_app_number] => 14/165293
[patent_app_country] => US
[patent_app_date] => 2014-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 1773
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14165293
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/165293 | System and method for loading application classes | Jan 26, 2014 | Issued |
Array
(
[id] => 10054553
[patent_doc_number] => 09094446
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-28
[patent_title] => 'Image vulnerability repair in a networked computing environment'
[patent_app_type] => utility
[patent_app_number] => 14/156665
[patent_app_country] => US
[patent_app_date] => 2014-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5510
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 69
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14156665
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/156665 | Image vulnerability repair in a networked computing environment | Jan 15, 2014 | Issued |
Array
(
[id] => 9596301
[patent_doc_number] => 20140192982
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-10
[patent_title] => 'TRANSPORT OF PARTIALLY ENCRYPTED MEDIA'
[patent_app_type] => utility
[patent_app_number] => 14/154114
[patent_app_country] => US
[patent_app_date] => 2014-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3952
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14154114
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/154114 | Transport of partially encrypted media | Jan 12, 2014 | Issued |
Array
(
[id] => 10112993
[patent_doc_number] => 09148418
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-29
[patent_title] => 'Systems and methods for remote access to computer data over public and private networks via a software switch'
[patent_app_type] => utility
[patent_app_number] => 14/153532
[patent_app_country] => US
[patent_app_date] => 2014-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8137
[patent_no_of_claims] => 43
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 238
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14153532
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/153532 | Systems and methods for remote access to computer data over public and private networks via a software switch | Jan 12, 2014 | Issued |
Array
(
[id] => 10591575
[patent_doc_number] => 09313201
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-12
[patent_title] => 'System and method of performing electronic transactions'
[patent_app_type] => utility
[patent_app_number] => 14/092556
[patent_app_country] => US
[patent_app_date] => 2013-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 16593
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14092556
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/092556 | System and method of performing electronic transactions | Nov 26, 2013 | Issued |
Array
(
[id] => 10144087
[patent_doc_number] => 09176896
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-03
[patent_title] => 'Method of managing aligned and unaligned data bands in a self encrypting solid state drive'
[patent_app_type] => utility
[patent_app_number] => 14/088143
[patent_app_country] => US
[patent_app_date] => 2013-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4245
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14088143
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/088143 | Method of managing aligned and unaligned data bands in a self encrypting solid state drive | Nov 21, 2013 | Issued |
Array
(
[id] => 10087701
[patent_doc_number] => 09125060
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-01
[patent_title] => 'Methods, systems, and computer program products for intercepting, in a carrier network, data destined for a mobile device to determine patterns in the data'
[patent_app_type] => utility
[patent_app_number] => 14/088114
[patent_app_country] => US
[patent_app_date] => 2013-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4865
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14088114
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/088114 | Methods, systems, and computer program products for intercepting, in a carrier network, data destined for a mobile device to determine patterns in the data | Nov 21, 2013 | Issued |
Array
(
[id] => 10265103
[patent_doc_number] => 20150150100
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-28
[patent_title] => 'INTEGRATED PROFILE CREATION FOR A SOCIAL NETWORK ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/088151
[patent_app_country] => US
[patent_app_date] => 2013-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 11166
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14088151
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/088151 | Integrated profile creation for a social network environment | Nov 21, 2013 | Issued |
Array
(
[id] => 10171359
[patent_doc_number] => 09202069
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-01
[patent_title] => 'Role based search'
[patent_app_type] => utility
[patent_app_number] => 14/087564
[patent_app_country] => US
[patent_app_date] => 2013-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3519
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14087564
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/087564 | Role based search | Nov 21, 2013 | Issued |
Array
(
[id] => 10264776
[patent_doc_number] => 20150149773
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-28
[patent_title] => 'AVERAGE-COMPLEXITY IDEAL-SECURITY ORDER-PRESERVING ENCRYPTION'
[patent_app_type] => utility
[patent_app_number] => 14/088123
[patent_app_country] => US
[patent_app_date] => 2013-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5776
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14088123
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/088123 | Average-complexity ideal-security order-preserving encryption | Nov 21, 2013 | Issued |
Array
(
[id] => 10258520
[patent_doc_number] => 20150143517
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-21
[patent_title] => 'SECURITY ARCHITECTURE FOR MALICIOUS INPUT'
[patent_app_type] => utility
[patent_app_number] => 14/085910
[patent_app_country] => US
[patent_app_date] => 2013-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 5499
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14085910
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/085910 | Security architecture for malicious input | Nov 20, 2013 | Issued |
Array
(
[id] => 10099139
[patent_doc_number] => 09135452
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-15
[patent_title] => 'Method and system for anonymization in continuous location-based services'
[patent_app_type] => utility
[patent_app_number] => 14/086039
[patent_app_country] => US
[patent_app_date] => 2013-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5671
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14086039
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/086039 | Method and system for anonymization in continuous location-based services | Nov 20, 2013 | Issued |
Array
(
[id] => 10059352
[patent_doc_number] => 09098714
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-04
[patent_title] => 'Policy-based techniques for managing access control'
[patent_app_type] => utility
[patent_app_number] => 14/085951
[patent_app_country] => US
[patent_app_date] => 2013-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 16989
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14085951
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/085951 | Policy-based techniques for managing access control | Nov 20, 2013 | Issued |
Array
(
[id] => 9992645
[patent_doc_number] => 09037866
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-05-19
[patent_title] => 'System and method for enrolling in a biometric system'
[patent_app_type] => utility
[patent_app_number] => 14/082812
[patent_app_country] => US
[patent_app_date] => 2013-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5975
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14082812
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/082812 | System and method for enrolling in a biometric system | Nov 17, 2013 | Issued |