
Suzanne E. Mcdowell
Examiner (ID: 18761)
| Most Active Art Unit | 1732 |
| Art Unit(s) | 1732, 1791, 1307 |
| Total Applications | 702 |
| Issued Applications | 527 |
| Pending Applications | 59 |
| Abandoned Applications | 116 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16857194
[patent_doc_number] => 20210157939
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-27
[patent_title] => SECURE STORAGE OF PASSWORDS
[patent_app_type] => utility
[patent_app_number] => 16/691157
[patent_app_country] => US
[patent_app_date] => 2019-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6418
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16691157
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/691157 | Secure storage of passwords | Nov 20, 2019 | Issued |
Array
(
[id] => 15627675
[patent_doc_number] => 20200084242
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-12
[patent_title] => SYSTEMS AND METHODS FOR BLOCKCHAIN SECURITY DATA INTELLIGENCE
[patent_app_type] => utility
[patent_app_number] => 16/686438
[patent_app_country] => US
[patent_app_date] => 2019-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14352
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16686438
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/686438 | SYSTEMS AND METHODS FOR BLOCKCHAIN SECURITY DATA INTELLIGENCE | Nov 17, 2019 | Abandoned |
Array
(
[id] => 18131963
[patent_doc_number] => 11558182
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-17
[patent_title] => Method and system to facilitate assessment, authorization, and monitoring of policy documents related to an organization
[patent_app_type] => utility
[patent_app_number] => 16/685887
[patent_app_country] => US
[patent_app_date] => 2019-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 6556
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 303
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16685887
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/685887 | Method and system to facilitate assessment, authorization, and monitoring of policy documents related to an organization | Nov 14, 2019 | Issued |
Array
(
[id] => 17276791
[patent_doc_number] => 20210382989
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-09
[patent_title] => MULTILEVEL CONSISTENCY CHECK FOR A CYBER ATTACK DETECTION IN AN AUTOMATION AND CONTROL SYSTEM
[patent_app_type] => utility
[patent_app_number] => 17/284539
[patent_app_country] => US
[patent_app_date] => 2019-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11696
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17284539
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/284539 | MULTILEVEL CONSISTENCY CHECK FOR A CYBER ATTACK DETECTION IN AN AUTOMATION AND CONTROL SYSTEM | Nov 7, 2019 | Abandoned |
Array
(
[id] => 15715493
[patent_doc_number] => 20200104513
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-02
[patent_title] => SECURE PROCESSING SYSTEMS AND METHODS
[patent_app_type] => utility
[patent_app_number] => 16/676587
[patent_app_country] => US
[patent_app_date] => 2019-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6706
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16676587
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/676587 | Secure processing systems and methods | Nov 6, 2019 | Issued |
Array
(
[id] => 18041436
[patent_doc_number] => 20220385653
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-12-01
[patent_title] => METHODS AND DEVICES FOR GRANTING TEMPORARY REMOTE ACCESS VIA BIOMETRIC DATA
[patent_app_type] => utility
[patent_app_number] => 17/773691
[patent_app_country] => US
[patent_app_date] => 2019-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8445
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17773691
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/773691 | Methods and devices for granting temporary remote access via biometric data | Nov 3, 2019 | Issued |
Array
(
[id] => 17622223
[patent_doc_number] => 11341280
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-24
[patent_title] => Executing entity-specific cryptographic code in a cryptographic coprocessor
[patent_app_type] => utility
[patent_app_number] => 16/668973
[patent_app_country] => US
[patent_app_date] => 2019-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10806
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16668973
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/668973 | Executing entity-specific cryptographic code in a cryptographic coprocessor | Oct 29, 2019 | Issued |
Array
(
[id] => 15566957
[patent_doc_number] => 20200067890
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-27
[patent_title] => Communication Network With Rolling Encryption Keys and Data Exfiltration Control
[patent_app_type] => utility
[patent_app_number] => 16/666103
[patent_app_country] => US
[patent_app_date] => 2019-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7342
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16666103
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/666103 | Communication network with rolling encryption keys and data exfiltration control | Oct 27, 2019 | Issued |
Array
(
[id] => 15903697
[patent_doc_number] => 20200151368
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-14
[patent_title] => DEFENSIVE ROUTING AND RELATED TECHNIQUES
[patent_app_type] => utility
[patent_app_number] => 16/598293
[patent_app_country] => US
[patent_app_date] => 2019-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9128
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 49
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16598293
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/598293 | Defensive routing and related techniques | Oct 9, 2019 | Issued |
Array
(
[id] => 16301983
[patent_doc_number] => 20200287706
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-10
[patent_title] => SOFTWARE INTERFACE FOR SMART CONTRACTS
[patent_app_type] => utility
[patent_app_number] => 16/587371
[patent_app_country] => US
[patent_app_date] => 2019-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9104
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16587371
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/587371 | Software interface for smart contracts | Sep 29, 2019 | Issued |
Array
(
[id] => 17296306
[patent_doc_number] => 20210392145
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-16
[patent_title] => SEARCH DEVICE, SEARCH METHOD, AND SEARCH PROGRAM
[patent_app_type] => utility
[patent_app_number] => 17/282778
[patent_app_country] => US
[patent_app_date] => 2019-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5570
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17282778
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/282778 | Search device, search method, and search program | Sep 25, 2019 | Issued |
Array
(
[id] => 17153473
[patent_doc_number] => 11146576
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-10-12
[patent_title] => Method and system for detecting credential stealing attacks
[patent_app_type] => utility
[patent_app_number] => 16/580530
[patent_app_country] => US
[patent_app_date] => 2019-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 16451
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16580530
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/580530 | Method and system for detecting credential stealing attacks | Sep 23, 2019 | Issued |
Array
(
[id] => 16693134
[patent_doc_number] => 20210075613
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-11
[patent_title] => SYSTEM AND METHOD FOR IMPLEMENTING A TWO-SIDED TOKEN FOR OPEN AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 16/563851
[patent_app_country] => US
[patent_app_date] => 2019-09-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6623
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16563851
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/563851 | System and method for implementing a two-sided token for open authentication | Sep 6, 2019 | Issued |
Array
(
[id] => 16980143
[patent_doc_number] => 20210224380
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-22
[patent_title] => VERIFYING STACK POINTER
[patent_app_type] => utility
[patent_app_number] => 17/269205
[patent_app_country] => US
[patent_app_date] => 2019-09-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18034
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17269205
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/269205 | Verifying stack pointer | Sep 2, 2019 | Issued |
Array
(
[id] => 18687355
[patent_doc_number] => 11783094
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-10-10
[patent_title] => System and method for providing protected data storage in data memory
[patent_app_type] => utility
[patent_app_number] => 17/270967
[patent_app_country] => US
[patent_app_date] => 2019-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 12100
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 419
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17270967
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/270967 | System and method for providing protected data storage in data memory | Aug 29, 2019 | Issued |
Array
(
[id] => 16130939
[patent_doc_number] => 10699234
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-06-30
[patent_title] => Computer systems and methods to protect user credential against phishing
[patent_app_type] => utility
[patent_app_number] => 16/556923
[patent_app_country] => US
[patent_app_date] => 2019-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 16497
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 335
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16556923
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/556923 | Computer systems and methods to protect user credential against phishing | Aug 29, 2019 | Issued |
Array
(
[id] => 19092784
[patent_doc_number] => 11954236
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-04-09
[patent_title] => Authenticity verification
[patent_app_type] => utility
[patent_app_number] => 17/415189
[patent_app_country] => US
[patent_app_date] => 2019-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3370
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17415189
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/415189 | Authenticity verification | Aug 19, 2019 | Issued |
Array
(
[id] => 15220631
[patent_doc_number] => 20190373002
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-05
[patent_title] => METHOD AND SYSTEM FOR DETECTING CREDENTIAL STEALING ATTACKS
[patent_app_type] => utility
[patent_app_number] => 16/528356
[patent_app_country] => US
[patent_app_date] => 2019-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13598
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16528356
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/528356 | Method and system for detecting credential stealing attacks | Jul 30, 2019 | Issued |
Array
(
[id] => 17542875
[patent_doc_number] => 11307998
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-19
[patent_title] => Storage efficiency of encrypted host system data
[patent_app_type] => utility
[patent_app_number] => 16/514831
[patent_app_country] => US
[patent_app_date] => 2019-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 20
[patent_no_of_words] => 37453
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16514831
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/514831 | Storage efficiency of encrypted host system data | Jul 16, 2019 | Issued |
Array
(
[id] => 17535667
[patent_doc_number] => 20220114276
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-04-14
[patent_title] => CONTROLLING A DATA NETWORK WITH RESPECT TO A USE OF A DISTRIBUTED DATABASE
[patent_app_type] => utility
[patent_app_number] => 17/261978
[patent_app_country] => US
[patent_app_date] => 2019-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9228
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17261978
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/261978 | CONTROLLING A DATA NETWORK WITH RESPECT TO A USE OF A DISTRIBUTED DATABASE | Jul 8, 2019 | Abandoned |