
Suzanne E. Mcdowell
Examiner (ID: 18761)
| Most Active Art Unit | 1732 |
| Art Unit(s) | 1732, 1791, 1307 |
| Total Applications | 702 |
| Issued Applications | 527 |
| Pending Applications | 59 |
| Abandoned Applications | 116 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12696622
[patent_doc_number] => 20180124040
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-03
[patent_title] => METHODS AND SYSTEMS FOR REMOTE ACCESS TO A TRANSPORATION VEHICLE SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/680132
[patent_app_country] => US
[patent_app_date] => 2017-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6365
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15680132
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/680132 | Methods and systems for remote access to a transporation vehicle system | Aug 16, 2017 | Issued |
Array
(
[id] => 15609961
[patent_doc_number] => 10586046
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-10
[patent_title] => Automated security feed analysis for threat assessment
[patent_app_type] => utility
[patent_app_number] => 15/660599
[patent_app_country] => US
[patent_app_date] => 2017-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 6011
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15660599
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/660599 | Automated security feed analysis for threat assessment | Jul 25, 2017 | Issued |
Array
(
[id] => 12027930
[patent_doc_number] => 20170318029
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-02
[patent_title] => 'CONFIGURATION MANAGEMENT FOR VIRTUAL MACHINE ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 15/653831
[patent_app_country] => US
[patent_app_date] => 2017-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12818
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15653831
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/653831 | Configuration management for virtual machine environment | Jul 18, 2017 | Issued |
Array
(
[id] => 13572803
[patent_doc_number] => 20180337950
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-22
[patent_title] => ORIGINATOR-BASED NETWORK RESTRAINT SYSTEM FOR IDENTITY-ORIENTED NETWORKS
[patent_app_type] => utility
[patent_app_number] => 15/639976
[patent_app_country] => US
[patent_app_date] => 2017-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7414
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15639976
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/639976 | Originator-based network restraint system for identity-oriented networks | Jun 29, 2017 | Issued |
Array
(
[id] => 15793835
[patent_doc_number] => 10630654
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-21
[patent_title] => Hardware-accelerated secure communication management
[patent_app_type] => utility
[patent_app_number] => 15/630476
[patent_app_country] => US
[patent_app_date] => 2017-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 17
[patent_no_of_words] => 10013
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15630476
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/630476 | Hardware-accelerated secure communication management | Jun 21, 2017 | Issued |
Array
(
[id] => 11989603
[patent_doc_number] => 20170293759
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-12
[patent_title] => 'METHOD, APPARATUS AND COMPUTER DEVICE FOR SCANNING INFORMATION TO BE SCANNED'
[patent_app_type] => utility
[patent_app_number] => 15/630228
[patent_app_country] => US
[patent_app_date] => 2017-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8242
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15630228
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/630228 | Method, apparatus and computer device for scanning information to be scanned | Jun 21, 2017 | Issued |
Array
(
[id] => 13693697
[patent_doc_number] => 20170357803
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => USB-C USAGE INDICATION
[patent_app_type] => utility
[patent_app_number] => 15/622302
[patent_app_country] => US
[patent_app_date] => 2017-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9712
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 49
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15622302
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/622302 | USB-C usage indication | Jun 13, 2017 | Issued |
Array
(
[id] => 14803415
[patent_doc_number] => 10404723
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-09-03
[patent_title] => Method and system for detecting credential stealing attacks
[patent_app_type] => utility
[patent_app_number] => 15/616061
[patent_app_country] => US
[patent_app_date] => 2017-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13573
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 299
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15616061
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/616061 | Method and system for detecting credential stealing attacks | Jun 6, 2017 | Issued |
Array
(
[id] => 16150409
[patent_doc_number] => 10708295
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-07-07
[patent_title] => Network route hijack protection
[patent_app_type] => utility
[patent_app_number] => 15/611074
[patent_app_country] => US
[patent_app_date] => 2017-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6812
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15611074
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/611074 | Network route hijack protection | May 31, 2017 | Issued |
Array
(
[id] => 11973732
[patent_doc_number] => 20170277886
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-28
[patent_title] => 'SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE BASED ON AT LEAST ONE INSTALLED PROFILE'
[patent_app_type] => utility
[patent_app_number] => 15/611690
[patent_app_country] => US
[patent_app_date] => 2017-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9315
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15611690
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/611690 | SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE BASED ON AT LEAST ONE INSTALLED PROFILE | May 31, 2017 | Abandoned |
Array
(
[id] => 13726287
[patent_doc_number] => 20170374099
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-28
[patent_title] => ATTACK CONTENT ANALYSIS PROGRAM, ATTACK CONTENT ANALYSIS METHOD, AND ATTACK CONTENT ANALYSIS APPARATUS
[patent_app_type] => utility
[patent_app_number] => 15/607808
[patent_app_country] => US
[patent_app_date] => 2017-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9340
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15607808
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/607808 | Attack content analysis program, attack content analysis method, and attack content analysis apparatus | May 29, 2017 | Issued |
Array
(
[id] => 16187712
[patent_doc_number] => 10721059
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-21
[patent_title] => Apparatus and method for data encryption, apparatus and method for data decryption
[patent_app_type] => utility
[patent_app_number] => 15/606742
[patent_app_country] => US
[patent_app_date] => 2017-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 30
[patent_no_of_words] => 9663
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15606742
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/606742 | Apparatus and method for data encryption, apparatus and method for data decryption | May 25, 2017 | Issued |
Array
(
[id] => 12062612
[patent_doc_number] => 20170338956
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-23
[patent_title] => 'METHOD FOR GENERATING A SECRET KEY FOR ENCRYPTED WIRELESS COMMUNICATIONS'
[patent_app_type] => utility
[patent_app_number] => 15/600680
[patent_app_country] => US
[patent_app_date] => 2017-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4643
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15600680
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/600680 | Method for generating a secret key for encrypted wireless communications | May 18, 2017 | Issued |
Array
(
[id] => 13572695
[patent_doc_number] => 20180337896
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-22
[patent_title] => Communication Network With Rolling Encryption Keys and Data Exfiltration Control
[patent_app_type] => utility
[patent_app_number] => 15/599278
[patent_app_country] => US
[patent_app_date] => 2017-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7299
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15599278
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/599278 | Communication network with rolling encryption keys and data exfiltration control | May 17, 2017 | Issued |
Array
(
[id] => 12123440
[patent_doc_number] => 20180007026
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-04
[patent_title] => 'NETWORK MONITORING METHOD AND DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/594926
[patent_app_country] => US
[patent_app_date] => 2017-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 40
[patent_figures_cnt] => 40
[patent_no_of_words] => 15733
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15594926
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/594926 | Network monitoring method and device | May 14, 2017 | Issued |
Array
(
[id] => 11868648
[patent_doc_number] => 20170235934
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-17
[patent_title] => 'METHOD AND APPARATUS FOR IDENTITY AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 15/581752
[patent_app_country] => US
[patent_app_date] => 2017-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6486
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15581752
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/581752 | Method and apparatus for identity authentication | Apr 27, 2017 | Issued |
Array
(
[id] => 13468011
[patent_doc_number] => 20180285548
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-04
[patent_title] => Information Handling System Display Security Access Through Totem Interactions
[patent_app_type] => utility
[patent_app_number] => 15/478315
[patent_app_country] => US
[patent_app_date] => 2017-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2993
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15478315
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/478315 | Information handling system display security access through totem interactions | Apr 3, 2017 | Issued |
Array
(
[id] => 13473079
[patent_doc_number] => 20180288082
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-04
[patent_title] => CAPTURING DATA
[patent_app_type] => utility
[patent_app_number] => 15/476456
[patent_app_country] => US
[patent_app_date] => 2017-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14163
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 28
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15476456
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/476456 | Capturing data | Mar 30, 2017 | Issued |
Array
(
[id] => 13472975
[patent_doc_number] => 20180288030
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-04
[patent_title] => SECURE IDENTITY SHARING USING A WEARABLE DEVICE
[patent_app_type] => utility
[patent_app_number] => 15/473473
[patent_app_country] => US
[patent_app_date] => 2017-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5358
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15473473
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/473473 | Secure identity sharing using a wearable device | Mar 28, 2017 | Issued |
Array
(
[id] => 13472927
[patent_doc_number] => 20180288006
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-04
[patent_title] => METHODS AND APPARATUS TO ESTABLISH A CONNECTION BETWEEN A SUPPLICANT AND A SECURED NETWORK
[patent_app_type] => utility
[patent_app_number] => 15/473009
[patent_app_country] => US
[patent_app_date] => 2017-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8371
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15473009
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/473009 | Methods and apparatus to establish a connection between a supplicant and a secured network | Mar 28, 2017 | Issued |