Search

Suzanne E. Mcdowell

Examiner (ID: 18761)

Most Active Art Unit
1732
Art Unit(s)
1732, 1791, 1307
Total Applications
702
Issued Applications
527
Pending Applications
59
Abandoned Applications
116

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 16857194 [patent_doc_number] => 20210157939 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-05-27 [patent_title] => SECURE STORAGE OF PASSWORDS [patent_app_type] => utility [patent_app_number] => 16/691157 [patent_app_country] => US [patent_app_date] => 2019-11-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6418 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 123 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16691157 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/691157
Secure storage of passwords Nov 20, 2019 Issued
Array ( [id] => 15627675 [patent_doc_number] => 20200084242 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-03-12 [patent_title] => SYSTEMS AND METHODS FOR BLOCKCHAIN SECURITY DATA INTELLIGENCE [patent_app_type] => utility [patent_app_number] => 16/686438 [patent_app_country] => US [patent_app_date] => 2019-11-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14352 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -8 [patent_words_short_claim] => 152 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16686438 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/686438
SYSTEMS AND METHODS FOR BLOCKCHAIN SECURITY DATA INTELLIGENCE Nov 17, 2019 Abandoned
Array ( [id] => 18131963 [patent_doc_number] => 11558182 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-01-17 [patent_title] => Method and system to facilitate assessment, authorization, and monitoring of policy documents related to an organization [patent_app_type] => utility [patent_app_number] => 16/685887 [patent_app_country] => US [patent_app_date] => 2019-11-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 28 [patent_figures_cnt] => 28 [patent_no_of_words] => 6556 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 303 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16685887 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/685887
Method and system to facilitate assessment, authorization, and monitoring of policy documents related to an organization Nov 14, 2019 Issued
Array ( [id] => 17276791 [patent_doc_number] => 20210382989 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-12-09 [patent_title] => MULTILEVEL CONSISTENCY CHECK FOR A CYBER ATTACK DETECTION IN AN AUTOMATION AND CONTROL SYSTEM [patent_app_type] => utility [patent_app_number] => 17/284539 [patent_app_country] => US [patent_app_date] => 2019-11-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11696 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 253 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17284539 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/284539
MULTILEVEL CONSISTENCY CHECK FOR A CYBER ATTACK DETECTION IN AN AUTOMATION AND CONTROL SYSTEM Nov 7, 2019 Abandoned
Array ( [id] => 15715493 [patent_doc_number] => 20200104513 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-04-02 [patent_title] => SECURE PROCESSING SYSTEMS AND METHODS [patent_app_type] => utility [patent_app_number] => 16/676587 [patent_app_country] => US [patent_app_date] => 2019-11-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6706 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 197 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16676587 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/676587
Secure processing systems and methods Nov 6, 2019 Issued
Array ( [id] => 18041436 [patent_doc_number] => 20220385653 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-12-01 [patent_title] => METHODS AND DEVICES FOR GRANTING TEMPORARY REMOTE ACCESS VIA BIOMETRIC DATA [patent_app_type] => utility [patent_app_number] => 17/773691 [patent_app_country] => US [patent_app_date] => 2019-11-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8445 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17773691 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/773691
Methods and devices for granting temporary remote access via biometric data Nov 3, 2019 Issued
Array ( [id] => 17622223 [patent_doc_number] => 11341280 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-05-24 [patent_title] => Executing entity-specific cryptographic code in a cryptographic coprocessor [patent_app_type] => utility [patent_app_number] => 16/668973 [patent_app_country] => US [patent_app_date] => 2019-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10806 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 147 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16668973 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/668973
Executing entity-specific cryptographic code in a cryptographic coprocessor Oct 29, 2019 Issued
Array ( [id] => 15566957 [patent_doc_number] => 20200067890 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-02-27 [patent_title] => Communication Network With Rolling Encryption Keys and Data Exfiltration Control [patent_app_type] => utility [patent_app_number] => 16/666103 [patent_app_country] => US [patent_app_date] => 2019-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7342 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -14 [patent_words_short_claim] => 209 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16666103 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/666103
Communication network with rolling encryption keys and data exfiltration control Oct 27, 2019 Issued
Array ( [id] => 15903697 [patent_doc_number] => 20200151368 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-05-14 [patent_title] => DEFENSIVE ROUTING AND RELATED TECHNIQUES [patent_app_type] => utility [patent_app_number] => 16/598293 [patent_app_country] => US [patent_app_date] => 2019-10-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9128 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 49 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16598293 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/598293
Defensive routing and related techniques Oct 9, 2019 Issued
Array ( [id] => 16301983 [patent_doc_number] => 20200287706 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-09-10 [patent_title] => SOFTWARE INTERFACE FOR SMART CONTRACTS [patent_app_type] => utility [patent_app_number] => 16/587371 [patent_app_country] => US [patent_app_date] => 2019-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9104 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -20 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16587371 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/587371
Software interface for smart contracts Sep 29, 2019 Issued
Array ( [id] => 17296306 [patent_doc_number] => 20210392145 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-12-16 [patent_title] => SEARCH DEVICE, SEARCH METHOD, AND SEARCH PROGRAM [patent_app_type] => utility [patent_app_number] => 17/282778 [patent_app_country] => US [patent_app_date] => 2019-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5570 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -5 [patent_words_short_claim] => 144 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17282778 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/282778
Search device, search method, and search program Sep 25, 2019 Issued
Array ( [id] => 17153473 [patent_doc_number] => 11146576 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-10-12 [patent_title] => Method and system for detecting credential stealing attacks [patent_app_type] => utility [patent_app_number] => 16/580530 [patent_app_country] => US [patent_app_date] => 2019-09-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 16451 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 232 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16580530 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/580530
Method and system for detecting credential stealing attacks Sep 23, 2019 Issued
Array ( [id] => 16693134 [patent_doc_number] => 20210075613 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-03-11 [patent_title] => SYSTEM AND METHOD FOR IMPLEMENTING A TWO-SIDED TOKEN FOR OPEN AUTHENTICATION [patent_app_type] => utility [patent_app_number] => 16/563851 [patent_app_country] => US [patent_app_date] => 2019-09-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6623 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 131 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16563851 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/563851
System and method for implementing a two-sided token for open authentication Sep 6, 2019 Issued
Array ( [id] => 16980143 [patent_doc_number] => 20210224380 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-07-22 [patent_title] => VERIFYING STACK POINTER [patent_app_type] => utility [patent_app_number] => 17/269205 [patent_app_country] => US [patent_app_date] => 2019-09-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 18034 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -20 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17269205 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/269205
Verifying stack pointer Sep 2, 2019 Issued
Array ( [id] => 18687355 [patent_doc_number] => 11783094 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-10-10 [patent_title] => System and method for providing protected data storage in data memory [patent_app_type] => utility [patent_app_number] => 17/270967 [patent_app_country] => US [patent_app_date] => 2019-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 12100 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 419 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17270967 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/270967
System and method for providing protected data storage in data memory Aug 29, 2019 Issued
Array ( [id] => 16130939 [patent_doc_number] => 10699234 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-06-30 [patent_title] => Computer systems and methods to protect user credential against phishing [patent_app_type] => utility [patent_app_number] => 16/556923 [patent_app_country] => US [patent_app_date] => 2019-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 10 [patent_no_of_words] => 16497 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 335 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16556923 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/556923
Computer systems and methods to protect user credential against phishing Aug 29, 2019 Issued
Array ( [id] => 19092784 [patent_doc_number] => 11954236 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-04-09 [patent_title] => Authenticity verification [patent_app_type] => utility [patent_app_number] => 17/415189 [patent_app_country] => US [patent_app_date] => 2019-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3370 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 124 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17415189 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/415189
Authenticity verification Aug 19, 2019 Issued
Array ( [id] => 15220631 [patent_doc_number] => 20190373002 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-12-05 [patent_title] => METHOD AND SYSTEM FOR DETECTING CREDENTIAL STEALING ATTACKS [patent_app_type] => utility [patent_app_number] => 16/528356 [patent_app_country] => US [patent_app_date] => 2019-07-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13598 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 162 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16528356 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/528356
Method and system for detecting credential stealing attacks Jul 30, 2019 Issued
Array ( [id] => 17542875 [patent_doc_number] => 11307998 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-04-19 [patent_title] => Storage efficiency of encrypted host system data [patent_app_type] => utility [patent_app_number] => 16/514831 [patent_app_country] => US [patent_app_date] => 2019-07-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 20 [patent_no_of_words] => 37453 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 172 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16514831 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/514831
Storage efficiency of encrypted host system data Jul 16, 2019 Issued
Array ( [id] => 17535667 [patent_doc_number] => 20220114276 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-04-14 [patent_title] => CONTROLLING A DATA NETWORK WITH RESPECT TO A USE OF A DISTRIBUTED DATABASE [patent_app_type] => utility [patent_app_number] => 17/261978 [patent_app_country] => US [patent_app_date] => 2019-07-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9228 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -14 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17261978 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/261978
CONTROLLING A DATA NETWORK WITH RESPECT TO A USE OF A DISTRIBUTED DATABASE Jul 8, 2019 Abandoned
Menu