Search

Michael S. Mcnally

Examiner (ID: 14491, Phone: (571)270-1599 , Office: P/2436 )

Most Active Art Unit
2436
Art Unit(s)
2436, 2432, 2136
Total Applications
1275
Issued Applications
1124
Pending Applications
61
Abandoned Applications
126

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9555998 [patent_doc_number] => 08763071 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-06-24 [patent_title] => 'Systems and methods for mobile application security classification and enforcement' [patent_app_type] => utility [patent_app_number] => 13/051519 [patent_app_country] => US [patent_app_date] => 2011-03-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 12 [patent_no_of_words] => 15970 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 181 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13051519 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/051519
Systems and methods for mobile application security classification and enforcement Mar 17, 2011 Issued
Array ( [id] => 8799506 [patent_doc_number] => 08438393 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-05-07 [patent_title] => 'Quadratic residue based password authenticated key exchange method and system' [patent_app_type] => utility [patent_app_number] => 13/040937 [patent_app_country] => US [patent_app_date] => 2011-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 3790 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 124 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13040937 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/040937
Quadratic residue based password authenticated key exchange method and system Mar 3, 2011 Issued
Array ( [id] => 9966746 [patent_doc_number] => 09014371 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-04-21 [patent_title] => 'Encryption device and method for defending a physical attack' [patent_app_type] => utility [patent_app_number] => 13/985765 [patent_app_country] => US [patent_app_date] => 2011-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 8125 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 81 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13985765 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/985765
Encryption device and method for defending a physical attack Feb 27, 2011 Issued
Array ( [id] => 9444453 [patent_doc_number] => 08713589 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-04-29 [patent_title] => 'Registration and network access control' [patent_app_type] => utility [patent_app_number] => 12/978158 [patent_app_country] => US [patent_app_date] => 2010-12-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 10706 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 230 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12978158 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/978158
Registration and network access control Dec 22, 2010 Issued
Array ( [id] => 7793291 [patent_doc_number] => 20120054847 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-03-01 [patent_title] => 'END POINT CONTEXT AND TRUST LEVEL DETERMINATION' [patent_app_type] => utility [patent_app_number] => 12/975764 [patent_app_country] => US [patent_app_date] => 2010-12-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 11592 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0054/20120054847.pdf [firstpage_image] =>[orig_patent_app_number] => 12975764 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/975764
End point context and trust level determination Dec 21, 2010 Issued
Array ( [id] => 5977391 [patent_doc_number] => 20110154466 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-06-23 [patent_title] => 'TOKENIZED DATA SECURITY' [patent_app_type] => utility [patent_app_number] => 12/973725 [patent_app_country] => US [patent_app_date] => 2010-12-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 18250 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0154/20110154466.pdf [firstpage_image] =>[orig_patent_app_number] => 12973725 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/973725
Tokenized data security Dec 19, 2010 Issued
Array ( [id] => 9229993 [patent_doc_number] => 08635676 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-01-21 [patent_title] => 'Visual or touchscreen password entry' [patent_app_type] => utility [patent_app_number] => 12/969878 [patent_app_country] => US [patent_app_date] => 2010-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 11 [patent_no_of_words] => 10259 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 179 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12969878 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/969878
Visual or touchscreen password entry Dec 15, 2010 Issued
Array ( [id] => 8255266 [patent_doc_number] => 20120159590 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-21 [patent_title] => 'METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR AUTHENTICATING AN IDENTITY OF A USER BY GENERATING A CONFIDENCE INDICATOR OF THE IDENTITY OF THE USER BASED ON A COMBINATION OF MULTIPLE AUTHENTICATION TECHNIQUES' [patent_app_type] => utility [patent_app_number] => 12/968964 [patent_app_country] => US [patent_app_date] => 2010-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5188 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0159/20120159590.pdf [firstpage_image] =>[orig_patent_app_number] => 12968964 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/968964
Methods, systems, and computer program products for authenticating an identity of a user by generating a confidence indicator of the identity of the user based on a combination of multiple authentication techniques Dec 14, 2010 Issued
Array ( [id] => 8242856 [patent_doc_number] => 20120151589 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-14 [patent_title] => 'INTELLIGENT SYSTEM AND METHOD FOR MITIGATING CYBER ATTACKS IN CRITICAL SYSTEMS THROUGH CONTROLLING LATENCY OF MESSAGES IN A COMMUNICATIONS NETWORK' [patent_app_type] => utility [patent_app_number] => 12/967818 [patent_app_country] => US [patent_app_date] => 2010-12-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 6953 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12967818 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/967818
Intelligent system and method for mitigating cyber attacks in critical systems through controlling latency of messages in a communications network Dec 13, 2010 Issued
Array ( [id] => 8935991 [patent_doc_number] => 08495713 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-07-23 [patent_title] => 'Systems and methods for host authentication' [patent_app_type] => utility [patent_app_number] => 12/965552 [patent_app_country] => US [patent_app_date] => 2010-12-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5378 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12965552 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/965552
Systems and methods for host authentication Dec 9, 2010 Issued
Array ( [id] => 9073611 [patent_doc_number] => 08551186 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-10-08 [patent_title] => 'Audible alert for stolen user devices' [patent_app_type] => utility [patent_app_number] => 12/961303 [patent_app_country] => US [patent_app_date] => 2010-12-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 10 [patent_no_of_words] => 8661 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 124 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12961303 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/961303
Audible alert for stolen user devices Dec 5, 2010 Issued
Array ( [id] => 8230279 [patent_doc_number] => 20120144481 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-07 [patent_title] => 'HOST IP REPUTATION' [patent_app_type] => utility [patent_app_number] => 12/961142 [patent_app_country] => US [patent_app_date] => 2010-12-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4294 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12961142 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/961142
Host IP reputation Dec 5, 2010 Issued
Array ( [id] => 8230275 [patent_doc_number] => 20120144480 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-07 [patent_title] => 'Using Virtual Table Protections to Prevent the Exploitation of Object Corruption Vulnerabilities' [patent_app_type] => utility [patent_app_number] => 12/958668 [patent_app_country] => US [patent_app_date] => 2010-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5407 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12958668 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/958668
Using virtual table protections to prevent the exploitation of object corruption vulnerabilities Dec 1, 2010 Issued
Array ( [id] => 8805151 [patent_doc_number] => 08443435 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-05-14 [patent_title] => 'VPN resource connectivity in large-scale enterprise networks' [patent_app_type] => utility [patent_app_number] => 12/959143 [patent_app_country] => US [patent_app_date] => 2010-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6041 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 115 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12959143 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/959143
VPN resource connectivity in large-scale enterprise networks Dec 1, 2010 Issued
Array ( [id] => 8223167 [patent_doc_number] => 20120137373 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-05-31 [patent_title] => 'Role-based Access Control over Instructions in Software Code' [patent_app_type] => utility [patent_app_number] => 12/955735 [patent_app_country] => US [patent_app_date] => 2010-11-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 4922 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12955735 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/955735
Role-based access control over instructions in software code Nov 28, 2010 Issued
Array ( [id] => 8983943 [patent_doc_number] => 08515067 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-08-20 [patent_title] => 'Account aggregation system, information processing apparatus and encryption key management method of the account aggregation system' [patent_app_type] => utility [patent_app_number] => 12/954428 [patent_app_country] => US [patent_app_date] => 2010-11-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3696 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 244 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12954428 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/954428
Account aggregation system, information processing apparatus and encryption key management method of the account aggregation system Nov 23, 2010 Issued
Array ( [id] => 9289728 [patent_doc_number] => 08646086 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-02-04 [patent_title] => 'Image vulnerability repair in a networked computing environment' [patent_app_type] => utility [patent_app_number] => 12/951373 [patent_app_country] => US [patent_app_date] => 2010-11-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5466 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 66 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12951373 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/951373
Image vulnerability repair in a networked computing environment Nov 21, 2010 Issued
Array ( [id] => 8214531 [patent_doc_number] => 20120131663 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-05-24 [patent_title] => 'TRANSMITTING KEEP-ALIVE PACKETS ON BEHALF OF A MOBILE COMMUNICATIONS DEVICE WITHIN A WIRELESS COMMUNICATIONS SYSTEM' [patent_app_type] => utility [patent_app_number] => 12/949777 [patent_app_country] => US [patent_app_date] => 2010-11-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 13634 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 16 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0131/20120131663.pdf [firstpage_image] =>[orig_patent_app_number] => 12949777 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/949777
Transmitting keep-alive packets on behalf of a mobile communications device within a wireless communications system Nov 17, 2010 Issued
Array ( [id] => 8201799 [patent_doc_number] => 20120124365 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-05-17 [patent_title] => 'ACCESSING A SECURE TERMINAL' [patent_app_type] => utility [patent_app_number] => 12/947512 [patent_app_country] => US [patent_app_date] => 2010-11-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4008 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0124/20120124365.pdf [firstpage_image] =>[orig_patent_app_number] => 12947512 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/947512
Accessing a secure terminal Nov 15, 2010 Issued
Array ( [id] => 9077757 [patent_doc_number] => 08555349 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-10-08 [patent_title] => 'Method and apparatus for small footprint clients for operator-specific service interfaces' [patent_app_type] => utility [patent_app_number] => 12/944307 [patent_app_country] => US [patent_app_date] => 2010-11-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 16388 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 187 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12944307 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/944307
Method and apparatus for small footprint clients for operator-specific service interfaces Nov 10, 2010 Issued
Menu