
Michael S. Mcnally
Examiner (ID: 2602, Phone: (571)270-1599 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436, 2136, 2432 |
| Total Applications | 1272 |
| Issued Applications | 1122 |
| Pending Applications | 64 |
| Abandoned Applications | 126 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 18703545
[patent_doc_number] => 11790058
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-10-17
[patent_title] => Automated role management for resource accessing code
[patent_app_type] => utility
[patent_app_number] => 17/814366
[patent_app_country] => US
[patent_app_date] => 2022-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 15955
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17814366
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/814366 | Automated role management for resource accessing code | Jul 21, 2022 | Issued |
Array
(
[id] => 19199827
[patent_doc_number] => 11997086
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-05-28
[patent_title] => Systems and methods for identity verification and authentication
[patent_app_type] => utility
[patent_app_number] => 17/868431
[patent_app_country] => US
[patent_app_date] => 2022-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6389
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 447
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17868431
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/868431 | Systems and methods for identity verification and authentication | Jul 18, 2022 | Issued |
Array
(
[id] => 19152719
[patent_doc_number] => 11977630
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-05-07
[patent_title] => Detecting ransomware
[patent_app_type] => utility
[patent_app_number] => 17/867259
[patent_app_country] => US
[patent_app_date] => 2022-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 18842
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17867259
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/867259 | Detecting ransomware | Jul 17, 2022 | Issued |
Array
(
[id] => 17984827
[patent_doc_number] => 20220350864
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-11-03
[patent_title] => REMOTE SOFTWARE USAGE MONITORING AND ENTITLEMENT ANALYSIS
[patent_app_type] => utility
[patent_app_number] => 17/809711
[patent_app_country] => US
[patent_app_date] => 2022-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16302
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17809711
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/809711 | Remote software usage monitoring and entitlement analysis | Jun 28, 2022 | Issued |
Array
(
[id] => 18506610
[patent_doc_number] => 11704428
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-18
[patent_title] => System and method for implementing data sovereignty safeguards in a distributed services network architecture
[patent_app_type] => utility
[patent_app_number] => 17/850613
[patent_app_country] => US
[patent_app_date] => 2022-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7502
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17850613
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/850613 | System and method for implementing data sovereignty safeguards in a distributed services network architecture | Jun 26, 2022 | Issued |
Array
(
[id] => 19625804
[patent_doc_number] => 12164636
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-12-10
[patent_title] => Techniques for protecting a computer-based classifier
[patent_app_type] => utility
[patent_app_number] => 17/848633
[patent_app_country] => US
[patent_app_date] => 2022-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7214
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17848633
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/848633 | Techniques for protecting a computer-based classifier | Jun 23, 2022 | Issued |
Array
(
[id] => 18082233
[patent_doc_number] => 20220407845
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-12-22
[patent_title] => System and Method for Performing Secure Key Exchange
[patent_app_type] => utility
[patent_app_number] => 17/842440
[patent_app_country] => US
[patent_app_date] => 2022-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8523
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17842440
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/842440 | System and method for performing secure key exchange | Jun 15, 2022 | Issued |
Array
(
[id] => 18644733
[patent_doc_number] => 11768802
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-09-26
[patent_title] => Method and system for applying data retention policies in a computing platform
[patent_app_type] => utility
[patent_app_number] => 17/806877
[patent_app_country] => US
[patent_app_date] => 2022-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10454
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17806877
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/806877 | Method and system for applying data retention policies in a computing platform | Jun 13, 2022 | Issued |
Array
(
[id] => 18227724
[patent_doc_number] => 20230066718
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-03-02
[patent_title] => PROCESSOR WITH A HASH CRYPTOGRAPHIC ALGORITHM AND DATA PROCESSING THEREOF
[patent_app_type] => utility
[patent_app_number] => 17/837695
[patent_app_country] => US
[patent_app_date] => 2022-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18557
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -28
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17837695
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/837695 | Processor with a hash cryptographic algorithm and data processing thereof | Jun 9, 2022 | Issued |
Array
(
[id] => 19583486
[patent_doc_number] => 12149623
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-11-19
[patent_title] => Security privilege escalation exploit detection and mitigation
[patent_app_type] => utility
[patent_app_number] => 17/836714
[patent_app_country] => US
[patent_app_date] => 2022-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4470
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17836714
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/836714 | Security privilege escalation exploit detection and mitigation | Jun 8, 2022 | Issued |
Array
(
[id] => 18343885
[patent_doc_number] => 11641372
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-05-02
[patent_title] => Generating investigation timeline displays including user-selected screenshots
[patent_app_type] => utility
[patent_app_number] => 17/827137
[patent_app_country] => US
[patent_app_date] => 2022-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 49
[patent_figures_cnt] => 49
[patent_no_of_words] => 33436
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17827137
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/827137 | Generating investigation timeline displays including user-selected screenshots | May 26, 2022 | Issued |
Array
(
[id] => 18114602
[patent_doc_number] => 20230007482
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-01-05
[patent_title] => METHOD FOR PROVISIONING KEYS IN A NETWORK OF CONNECTED OBJECTS
[patent_app_type] => utility
[patent_app_number] => 17/826429
[patent_app_country] => US
[patent_app_date] => 2022-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5475
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17826429
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/826429 | Method for provisioning keys in a network of connected objects | May 26, 2022 | Issued |
Array
(
[id] => 18788468
[patent_doc_number] => 20230376947
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-11-23
[patent_title] => DE-CENTRALIZED AUTHENTICATION IN A NETWORK SYSTEM
[patent_app_type] => utility
[patent_app_number] => 17/750614
[patent_app_country] => US
[patent_app_date] => 2022-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11181
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17750614
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/750614 | De-centralized authentication in a network system | May 22, 2022 | Issued |
Array
(
[id] => 18007255
[patent_doc_number] => 20220366021
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-11-17
[patent_title] => VERIFYING, MONITORING, AND TOKENIZING DIGITAL ASSETS AS PROOF OF OWNERSHIP AND VALUATION OF THE DIGITAL ASSETS
[patent_app_type] => utility
[patent_app_number] => 17/745777
[patent_app_country] => US
[patent_app_date] => 2022-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13302
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17745777
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/745777 | Verifying, monitoring, and tokenizing digital assets as proof of ownership and valuation of the digital assets | May 15, 2022 | Issued |
Array
(
[id] => 17828739
[patent_doc_number] => 20220266043
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-25
[patent_title] => PERMISSION-BASED CONTROL OF INTERFACING COMPONENTS WITH A MEDICAL DEVICE
[patent_app_type] => utility
[patent_app_number] => 17/738385
[patent_app_country] => US
[patent_app_date] => 2022-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7139
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17738385
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/738385 | Permission-based control of interfacing components with a medical device | May 5, 2022 | Issued |
Array
(
[id] => 17962432
[patent_doc_number] => 20220343013
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-10-27
[patent_title] => ACCESS CONTROLLED GRAPH QUERY SPANNING
[patent_app_type] => utility
[patent_app_number] => 17/661636
[patent_app_country] => US
[patent_app_date] => 2022-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7905
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17661636
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/661636 | Access controlled graph query spanning | May 1, 2022 | Issued |
Array
(
[id] => 18730510
[patent_doc_number] => 20230344810
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-10-26
[patent_title] => SYSTEMS AND METHODS FOR SOFTWARE TELEMETRY PIPELINE AGENT
[patent_app_type] => utility
[patent_app_number] => 17/729065
[patent_app_country] => US
[patent_app_date] => 2022-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6791
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17729065
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/729065 | Systems and methods for software telemetry pipeline agent | Apr 25, 2022 | Issued |
Array
(
[id] => 17796827
[patent_doc_number] => 20220255919
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-11
[patent_title] => COMPUTER READABLE STORAGE MEDIA FOR LEGACY INTEGRATION AND METHODS AND SYSTEMS FOR UTILIZING SAME
[patent_app_type] => utility
[patent_app_number] => 17/727998
[patent_app_country] => US
[patent_app_date] => 2022-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7245
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17727998
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/727998 | Computer readable storage media for legacy integration and methods and systems for utilizing same | Apr 24, 2022 | Issued |
Array
(
[id] => 19261767
[patent_doc_number] => 12021844
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-06-25
[patent_title] => Method and system for privacy protection and user interaction
[patent_app_type] => utility
[patent_app_number] => 17/727801
[patent_app_country] => US
[patent_app_date] => 2022-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 8634
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17727801
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/727801 | Method and system for privacy protection and user interaction | Apr 23, 2022 | Issued |
Array
(
[id] => 17778740
[patent_doc_number] => 20220245090
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-04
[patent_title] => METHOD AND SYSTEM FOR APPLYING DATA RETENTION POLICIES IN A COMPUTING PLATFORM
[patent_app_type] => utility
[patent_app_number] => 17/660287
[patent_app_country] => US
[patent_app_date] => 2022-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10439
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 79
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17660287
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/660287 | Method and system for applying data retention policies in a computing platform | Apr 21, 2022 | Issued |