
Bryan F. Wright
Examiner (ID: 5299)
| Most Active Art Unit | 2497 |
| Art Unit(s) | 2431, 2131, 2497 |
| Total Applications | 852 |
| Issued Applications | 638 |
| Pending Applications | 48 |
| Abandoned Applications | 180 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11015206
[patent_doc_number] => 20160212160
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-21
[patent_title] => 'METHOD, DEVICE AND SYSTEM FOR ALERTING AGAINST UNKNOWN MALICIOUS CODES'
[patent_app_type] => utility
[patent_app_number] => 15/081018
[patent_app_country] => US
[patent_app_date] => 2016-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3742
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15081018
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/081018 | Method, device and system for alerting against unknown malicious codes within a network environment | Mar 24, 2016 | Issued |
Array
(
[id] => 11975690
[patent_doc_number] => 20170279844
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-28
[patent_title] => 'IDENTIFYING AND REMEDIATING AT-RISK RESOURCES IN A COMPUTING ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 15/079160
[patent_app_country] => US
[patent_app_date] => 2016-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6240
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15079160
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/079160 | Identifying and remediating at-risk resources in a computing environment | Mar 23, 2016 | Issued |
Array
(
[id] => 11008171
[patent_doc_number] => 20160205122
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-14
[patent_title] => 'System and Method for Cyber Security Analysis and Human Behavior Prediction'
[patent_app_type] => utility
[patent_app_number] => 15/076089
[patent_app_country] => US
[patent_app_date] => 2016-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10364
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15076089
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/076089 | System and method for cyber security analysis and human behavior prediction | Mar 20, 2016 | Issued |
Array
(
[id] => 14254819
[patent_doc_number] => 10277623
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-30
[patent_title] => Method of detection of comptromised accounts
[patent_app_type] => utility
[patent_app_number] => 15/075077
[patent_app_country] => US
[patent_app_date] => 2016-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4699
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 282
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15075077
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/075077 | Method of detection of comptromised accounts | Mar 17, 2016 | Issued |
Array
(
[id] => 11316655
[patent_doc_number] => 20160352765
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-01
[patent_title] => 'FINGERPRINT MERGING AND RISK LEVEL EVALUATION FOR NETWORK ANOMALY DETECTION'
[patent_app_type] => utility
[patent_app_number] => 15/072526
[patent_app_country] => US
[patent_app_date] => 2016-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11895
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15072526
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/072526 | Fingerprint merging and risk level evaluation for network anomaly detection | Mar 16, 2016 | Issued |
Array
(
[id] => 16804282
[patent_doc_number] => 10999245
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-04
[patent_title] => Communication path control method, communication path control device, and communication path control program that divide a path leading to a network that accommodates a specific device into a path that passes through a filter device and a path that does not pass through a filter device
[patent_app_type] => utility
[patent_app_number] => 15/578095
[patent_app_country] => US
[patent_app_date] => 2016-02-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13085
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15578095
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/578095 | Communication path control method, communication path control device, and communication path control program that divide a path leading to a network that accommodates a specific device into a path that passes through a filter device and a path that does not pass through a filter device | Feb 28, 2016 | Issued |
Array
(
[id] => 15017495
[patent_doc_number] => 10454922
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => System and method for recognizing malicious credential guessing attacks
[patent_app_type] => utility
[patent_app_number] => 15/052789
[patent_app_country] => US
[patent_app_date] => 2016-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 17281
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15052789
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/052789 | System and method for recognizing malicious credential guessing attacks | Feb 23, 2016 | Issued |
Array
(
[id] => 12551448
[patent_doc_number] => 10013365
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-03
[patent_title] => Method for programming a control unit of a motor vehicle
[patent_app_type] => utility
[patent_app_number] => 15/052750
[patent_app_country] => US
[patent_app_date] => 2016-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4065
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15052750
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/052750 | Method for programming a control unit of a motor vehicle | Feb 23, 2016 | Issued |
Array
(
[id] => 11940541
[patent_doc_number] => 20170244692
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-24
[patent_title] => 'AUTHENTICATION OF A USER USING A SECURITY DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/052700
[patent_app_country] => US
[patent_app_date] => 2016-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6480
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15052700
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/052700 | AUTHENTICATION OF A USER USING A SECURITY DEVICE | Feb 23, 2016 | Abandoned |
Array
(
[id] => 11854048
[patent_doc_number] => 20170228540
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-10
[patent_title] => 'Method and a system for detecting malicious code activity by generating software traps per application'
[patent_app_type] => utility
[patent_app_number] => 15/018930
[patent_app_country] => US
[patent_app_date] => 2016-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 966
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15018930
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/018930 | Method and a system for detecting malicious code activity by generating software traps per application | Feb 8, 2016 | Abandoned |
Array
(
[id] => 14092591
[patent_doc_number] => 10242203
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-26
[patent_title] => Format preservation based masking system and method
[patent_app_type] => utility
[patent_app_number] => 15/019743
[patent_app_country] => US
[patent_app_date] => 2016-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7361
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15019743
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/019743 | Format preservation based masking system and method | Feb 8, 2016 | Issued |
Array
(
[id] => 10803555
[patent_doc_number] => 20160149712
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'APPLYING CIRCUIT DELAY-BASED PHYSICALLY UNCLONABLE FUNCTIONS (PUFS) FOR MASKING OPERATION OF MEMORY-BASED PUFS TO RESIST INVASIVE AND CLONE ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 15/011255
[patent_app_country] => US
[patent_app_date] => 2016-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8951
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15011255
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/011255 | Applying circuit delay-based physically unclonable functions (PUFs) for masking operation of memory-based PUFs to resist invasive and clone attacks | Jan 28, 2016 | Issued |
Array
(
[id] => 15317427
[patent_doc_number] => 10523436
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-31
[patent_title] => Security locking device of computers
[patent_app_type] => utility
[patent_app_number] => 15/520838
[patent_app_country] => US
[patent_app_date] => 2015-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7652
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 612
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15520838
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/520838 | Security locking device of computers | Dec 17, 2015 | Issued |
Array
(
[id] => 10752404
[patent_doc_number] => 20160098556
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-07
[patent_title] => 'Preventing stack buffer overflow attacks'
[patent_app_type] => utility
[patent_app_number] => 14/970397
[patent_app_country] => US
[patent_app_date] => 2015-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4884
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14970397
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/970397 | Preventing stack buffer overflow attacks | Dec 14, 2015 | Abandoned |
Array
(
[id] => 10741824
[patent_doc_number] => 20160087975
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'METHOD AND APPARATUS OF CONSTRUCTING SECURE INFRA-STRUCTURE FOR USING EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD'
[patent_app_type] => utility
[patent_app_number] => 14/958194
[patent_app_country] => US
[patent_app_date] => 2015-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8338
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14958194
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/958194 | METHOD AND APPARATUS OF CONSTRUCTING SECURE INFRA-STRUCTURE FOR USING EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD | Dec 2, 2015 | Abandoned |
Array
(
[id] => 12229223
[patent_doc_number] => 09916468
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-13
[patent_title] => 'System and method for detecting fraud and misuse of protected data by an authorized user using event logs'
[patent_app_type] => utility
[patent_app_number] => 14/954470
[patent_app_country] => US
[patent_app_date] => 2015-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 9328
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 359
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14954470
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/954470 | System and method for detecting fraud and misuse of protected data by an authorized user using event logs | Nov 29, 2015 | Issued |
Array
(
[id] => 14605721
[patent_doc_number] => 10356062
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-16
[patent_title] => Data access control utilizing key restriction
[patent_app_type] => utility
[patent_app_number] => 14/938403
[patent_app_country] => US
[patent_app_date] => 2015-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 34
[patent_no_of_words] => 26890
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14938403
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/938403 | Data access control utilizing key restriction | Nov 10, 2015 | Issued |
Array
(
[id] => 10766362
[patent_doc_number] => 20160112518
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-21
[patent_title] => 'SYSTEMS AND METHODS FOR SMART DEVICE NETWORKING'
[patent_app_type] => utility
[patent_app_number] => 14/919664
[patent_app_country] => US
[patent_app_date] => 2015-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8791
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14919664
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/919664 | Systems and methods for smart device networking with an endpoint and a bridge | Oct 20, 2015 | Issued |
Array
(
[id] => 12026099
[patent_doc_number] => 20170316198
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-02
[patent_title] => 'METHOD FOR AUTHENTICATING A USER DEVICE DURING THE PROCESS OF LOGGING INTO A SERVER'
[patent_app_type] => utility
[patent_app_number] => 15/520778
[patent_app_country] => US
[patent_app_date] => 2015-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3202
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15520778
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/520778 | Method for authenticating a user device during the process of logging into a server | Oct 14, 2015 | Issued |
Array
(
[id] => 15063555
[patent_doc_number] => 10462102
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-29
[patent_title] => Electronic message address aliasing
[patent_app_type] => utility
[patent_app_number] => 14/866968
[patent_app_country] => US
[patent_app_date] => 2015-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 7412
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14866968
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/866968 | Electronic message address aliasing | Sep 26, 2015 | Issued |