
Michael S. Mcnally
Examiner (ID: 14491, Phone: (571)270-1599 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436, 2432, 2136 |
| Total Applications | 1275 |
| Issued Applications | 1124 |
| Pending Applications | 61 |
| Abandoned Applications | 126 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9555998
[patent_doc_number] => 08763071
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-06-24
[patent_title] => 'Systems and methods for mobile application security classification and enforcement'
[patent_app_type] => utility
[patent_app_number] => 13/051519
[patent_app_country] => US
[patent_app_date] => 2011-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 15970
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13051519
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/051519 | Systems and methods for mobile application security classification and enforcement | Mar 17, 2011 | Issued |
Array
(
[id] => 8799506
[patent_doc_number] => 08438393
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-05-07
[patent_title] => 'Quadratic residue based password authenticated key exchange method and system'
[patent_app_type] => utility
[patent_app_number] => 13/040937
[patent_app_country] => US
[patent_app_date] => 2011-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 3790
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13040937
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/040937 | Quadratic residue based password authenticated key exchange method and system | Mar 3, 2011 | Issued |
Array
(
[id] => 9966746
[patent_doc_number] => 09014371
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-21
[patent_title] => 'Encryption device and method for defending a physical attack'
[patent_app_type] => utility
[patent_app_number] => 13/985765
[patent_app_country] => US
[patent_app_date] => 2011-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8125
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13985765
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/985765 | Encryption device and method for defending a physical attack | Feb 27, 2011 | Issued |
Array
(
[id] => 9444453
[patent_doc_number] => 08713589
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-04-29
[patent_title] => 'Registration and network access control'
[patent_app_type] => utility
[patent_app_number] => 12/978158
[patent_app_country] => US
[patent_app_date] => 2010-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10706
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12978158
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/978158 | Registration and network access control | Dec 22, 2010 | Issued |
Array
(
[id] => 7793291
[patent_doc_number] => 20120054847
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-03-01
[patent_title] => 'END POINT CONTEXT AND TRUST LEVEL DETERMINATION'
[patent_app_type] => utility
[patent_app_number] => 12/975764
[patent_app_country] => US
[patent_app_date] => 2010-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11592
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0054/20120054847.pdf
[firstpage_image] =>[orig_patent_app_number] => 12975764
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/975764 | End point context and trust level determination | Dec 21, 2010 | Issued |
Array
(
[id] => 5977391
[patent_doc_number] => 20110154466
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-23
[patent_title] => 'TOKENIZED DATA SECURITY'
[patent_app_type] => utility
[patent_app_number] => 12/973725
[patent_app_country] => US
[patent_app_date] => 2010-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 18250
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0154/20110154466.pdf
[firstpage_image] =>[orig_patent_app_number] => 12973725
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/973725 | Tokenized data security | Dec 19, 2010 | Issued |
Array
(
[id] => 9229993
[patent_doc_number] => 08635676
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-01-21
[patent_title] => 'Visual or touchscreen password entry'
[patent_app_type] => utility
[patent_app_number] => 12/969878
[patent_app_country] => US
[patent_app_date] => 2010-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 10259
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12969878
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/969878 | Visual or touchscreen password entry | Dec 15, 2010 | Issued |
Array
(
[id] => 8255266
[patent_doc_number] => 20120159590
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-21
[patent_title] => 'METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR AUTHENTICATING AN IDENTITY OF A USER BY GENERATING A CONFIDENCE INDICATOR OF THE IDENTITY OF THE USER BASED ON A COMBINATION OF MULTIPLE AUTHENTICATION TECHNIQUES'
[patent_app_type] => utility
[patent_app_number] => 12/968964
[patent_app_country] => US
[patent_app_date] => 2010-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5188
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0159/20120159590.pdf
[firstpage_image] =>[orig_patent_app_number] => 12968964
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/968964 | Methods, systems, and computer program products for authenticating an identity of a user by generating a confidence indicator of the identity of the user based on a combination of multiple authentication techniques | Dec 14, 2010 | Issued |
Array
(
[id] => 8242856
[patent_doc_number] => 20120151589
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-14
[patent_title] => 'INTELLIGENT SYSTEM AND METHOD FOR MITIGATING CYBER ATTACKS IN CRITICAL SYSTEMS THROUGH CONTROLLING LATENCY OF MESSAGES IN A COMMUNICATIONS NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/967818
[patent_app_country] => US
[patent_app_date] => 2010-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6953
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12967818
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/967818 | Intelligent system and method for mitigating cyber attacks in critical systems through controlling latency of messages in a communications network | Dec 13, 2010 | Issued |
Array
(
[id] => 8935991
[patent_doc_number] => 08495713
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-23
[patent_title] => 'Systems and methods for host authentication'
[patent_app_type] => utility
[patent_app_number] => 12/965552
[patent_app_country] => US
[patent_app_date] => 2010-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5378
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12965552
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/965552 | Systems and methods for host authentication | Dec 9, 2010 | Issued |
Array
(
[id] => 9073611
[patent_doc_number] => 08551186
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-10-08
[patent_title] => 'Audible alert for stolen user devices'
[patent_app_type] => utility
[patent_app_number] => 12/961303
[patent_app_country] => US
[patent_app_date] => 2010-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 8661
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12961303
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/961303 | Audible alert for stolen user devices | Dec 5, 2010 | Issued |
Array
(
[id] => 8230279
[patent_doc_number] => 20120144481
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-07
[patent_title] => 'HOST IP REPUTATION'
[patent_app_type] => utility
[patent_app_number] => 12/961142
[patent_app_country] => US
[patent_app_date] => 2010-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4294
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12961142
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/961142 | Host IP reputation | Dec 5, 2010 | Issued |
Array
(
[id] => 8230275
[patent_doc_number] => 20120144480
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-07
[patent_title] => 'Using Virtual Table Protections to Prevent the Exploitation of Object Corruption Vulnerabilities'
[patent_app_type] => utility
[patent_app_number] => 12/958668
[patent_app_country] => US
[patent_app_date] => 2010-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5407
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12958668
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/958668 | Using virtual table protections to prevent the exploitation of object corruption vulnerabilities | Dec 1, 2010 | Issued |
Array
(
[id] => 8805151
[patent_doc_number] => 08443435
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-05-14
[patent_title] => 'VPN resource connectivity in large-scale enterprise networks'
[patent_app_type] => utility
[patent_app_number] => 12/959143
[patent_app_country] => US
[patent_app_date] => 2010-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6041
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12959143
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/959143 | VPN resource connectivity in large-scale enterprise networks | Dec 1, 2010 | Issued |
Array
(
[id] => 8223167
[patent_doc_number] => 20120137373
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-31
[patent_title] => 'Role-based Access Control over Instructions in Software Code'
[patent_app_type] => utility
[patent_app_number] => 12/955735
[patent_app_country] => US
[patent_app_date] => 2010-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 4922
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12955735
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/955735 | Role-based access control over instructions in software code | Nov 28, 2010 | Issued |
Array
(
[id] => 8983943
[patent_doc_number] => 08515067
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-20
[patent_title] => 'Account aggregation system, information processing apparatus and encryption key management method of the account aggregation system'
[patent_app_type] => utility
[patent_app_number] => 12/954428
[patent_app_country] => US
[patent_app_date] => 2010-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3696
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 244
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12954428
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/954428 | Account aggregation system, information processing apparatus and encryption key management method of the account aggregation system | Nov 23, 2010 | Issued |
Array
(
[id] => 9289728
[patent_doc_number] => 08646086
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-04
[patent_title] => 'Image vulnerability repair in a networked computing environment'
[patent_app_type] => utility
[patent_app_number] => 12/951373
[patent_app_country] => US
[patent_app_date] => 2010-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5466
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12951373
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/951373 | Image vulnerability repair in a networked computing environment | Nov 21, 2010 | Issued |
Array
(
[id] => 8214531
[patent_doc_number] => 20120131663
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-24
[patent_title] => 'TRANSMITTING KEEP-ALIVE PACKETS ON BEHALF OF A MOBILE COMMUNICATIONS DEVICE WITHIN A WIRELESS COMMUNICATIONS SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 12/949777
[patent_app_country] => US
[patent_app_date] => 2010-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 13634
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 16
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0131/20120131663.pdf
[firstpage_image] =>[orig_patent_app_number] => 12949777
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/949777 | Transmitting keep-alive packets on behalf of a mobile communications device within a wireless communications system | Nov 17, 2010 | Issued |
Array
(
[id] => 8201799
[patent_doc_number] => 20120124365
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-17
[patent_title] => 'ACCESSING A SECURE TERMINAL'
[patent_app_type] => utility
[patent_app_number] => 12/947512
[patent_app_country] => US
[patent_app_date] => 2010-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4008
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0124/20120124365.pdf
[firstpage_image] =>[orig_patent_app_number] => 12947512
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/947512 | Accessing a secure terminal | Nov 15, 2010 | Issued |
Array
(
[id] => 9077757
[patent_doc_number] => 08555349
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-10-08
[patent_title] => 'Method and apparatus for small footprint clients for operator-specific service interfaces'
[patent_app_type] => utility
[patent_app_number] => 12/944307
[patent_app_country] => US
[patent_app_date] => 2010-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 16388
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12944307
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/944307 | Method and apparatus for small footprint clients for operator-specific service interfaces | Nov 10, 2010 | Issued |