Search

Bryan F. Wright

Examiner (ID: 5299)

Most Active Art Unit
2497
Art Unit(s)
2431, 2131, 2497
Total Applications
852
Issued Applications
638
Pending Applications
48
Abandoned Applications
180

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 12956734 [patent_doc_number] => 09838421 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-12-05 [patent_title] => Systems and methods utilizing peer measurements to detect and defend against distributed denial of service attacks [patent_app_type] => utility [patent_app_number] => 14/503746 [patent_app_country] => US [patent_app_date] => 2014-10-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 7316 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 284 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503746 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/503746
Systems and methods utilizing peer measurements to detect and defend against distributed denial of service attacks Sep 30, 2014 Issued
Array ( [id] => 12103099 [patent_doc_number] => 09860208 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-01-02 [patent_title] => 'Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network' [patent_app_type] => utility [patent_app_number] => 14/503143 [patent_app_country] => US [patent_app_date] => 2014-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 27165 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 404 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503143 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/503143
Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network Sep 29, 2014 Issued
Array ( [id] => 12114487 [patent_doc_number] => 09870481 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-01-16 [patent_title] => 'Associating a data encryption keystore backup with a computer system' [patent_app_type] => utility [patent_app_number] => 14/503331 [patent_app_country] => US [patent_app_date] => 2014-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 10279 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 211 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503331 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/503331
Associating a data encryption keystore backup with a computer system Sep 29, 2014 Issued
Array ( [id] => 14395889 [patent_doc_number] => 10311228 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-06-04 [patent_title] => Using a fine-grained address space layout randomization to mitigate potential security exploits [patent_app_type] => utility [patent_app_number] => 14/503212 [patent_app_country] => US [patent_app_date] => 2014-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 18 [patent_no_of_words] => 10241 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 196 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503212 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/503212
Using a fine-grained address space layout randomization to mitigate potential security exploits Sep 29, 2014 Issued
Array ( [id] => 11411057 [patent_doc_number] => 09558363 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-01-31 [patent_title] => 'Systems and methods of context based data access control of encrypted files' [patent_app_type] => utility [patent_app_number] => 14/503244 [patent_app_country] => US [patent_app_date] => 2014-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6618 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 169 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503244 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/503244
Systems and methods of context based data access control of encrypted files Sep 29, 2014 Issued
Array ( [id] => 10748236 [patent_doc_number] => 20160094387 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-31 [patent_title] => 'DISCOVERY OF CLOUD-BASED ACCESS-POINT CONTROLLERS' [patent_app_type] => utility [patent_app_number] => 14/503133 [patent_app_country] => US [patent_app_date] => 2014-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6122 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503133 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/503133
DISCOVERY OF CLOUD-BASED ACCESS-POINT CONTROLLERS Sep 29, 2014 Abandoned
Array ( [id] => 12556347 [patent_doc_number] => 10015015 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-07-03 [patent_title] => Method and apparatus for verifying system log integrity [patent_app_type] => utility [patent_app_number] => 14/503319 [patent_app_country] => US [patent_app_date] => 2014-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 10422 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 236 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503319 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/503319
Method and apparatus for verifying system log integrity Sep 29, 2014 Issued
Array ( [id] => 12148657 [patent_doc_number] => 09882929 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-01-30 [patent_title] => 'Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network' [patent_app_type] => utility [patent_app_number] => 14/503129 [patent_app_country] => US [patent_app_date] => 2014-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 24372 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 385 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503129 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/503129
Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network Sep 29, 2014 Issued
Array ( [id] => 10746519 [patent_doc_number] => 20160092670 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-31 [patent_title] => 'Answer Question User Authentication Process' [patent_app_type] => utility [patent_app_number] => 14/503375 [patent_app_country] => US [patent_app_date] => 2014-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 3091 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503375 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/503375
Answer Question User Authentication Process Sep 29, 2014 Abandoned
Array ( [id] => 14395887 [patent_doc_number] => 10311227 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-06-04 [patent_title] => Obfuscation of an address space layout randomization mapping in a data processing system [patent_app_type] => utility [patent_app_number] => 14/503195 [patent_app_country] => US [patent_app_date] => 2014-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 18 [patent_no_of_words] => 10363 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 231 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503195 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/503195
Obfuscation of an address space layout randomization mapping in a data processing system Sep 29, 2014 Issued
Array ( [id] => 14618427 [patent_doc_number] => 10361927 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-23 [patent_title] => Managing risk in multi-node automation of endpoint management [patent_app_type] => utility [patent_app_number] => 14/503254 [patent_app_country] => US [patent_app_date] => 2014-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 6590 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 203 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503254 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/503254
Managing risk in multi-node automation of endpoint management Sep 29, 2014 Issued
Array ( [id] => 10969717 [patent_doc_number] => 20140372749 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-18 [patent_title] => 'NETWORK WITH PROTOCOL, PRIVACY PRESERVING SOURCE ATTRIBUTION AND ADMISSION CONTROL AND METHOD' [patent_app_type] => utility [patent_app_number] => 14/470671 [patent_app_country] => US [patent_app_date] => 2014-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9577 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14470671 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/470671
Network, network node with privacy preserving source attribution and admission control and device implemented method therfor Aug 26, 2014 Issued
Array ( [id] => 9934190 [patent_doc_number] => 20150082383 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-19 [patent_title] => 'System and Method for Controlling Access to an Electronic Message Recipient' [patent_app_type] => utility [patent_app_number] => 14/465506 [patent_app_country] => US [patent_app_date] => 2014-08-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 6730 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14465506 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/465506
System and Method for Controlling Access to an Electronic Message Recipient Aug 20, 2014 Abandoned
Array ( [id] => 10962747 [patent_doc_number] => 20140365777 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-11 [patent_title] => 'SYSTEMS AND METHODS FOR SECURING NETWORK COMMUNICATIONS' [patent_app_type] => utility [patent_app_number] => 14/465491 [patent_app_country] => US [patent_app_date] => 2014-08-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 23742 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14465491 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/465491
SYSTEMS AND METHODS FOR SECURING NETWORK COMMUNICATIONS Aug 20, 2014 Abandoned
Array ( [id] => 10653187 [patent_doc_number] => 09369462 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-06-14 [patent_title] => 'Secure data entry via audio tones' [patent_app_type] => utility [patent_app_number] => 14/451753 [patent_app_country] => US [patent_app_date] => 2014-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 8 [patent_no_of_words] => 10983 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 333 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14451753 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/451753
Secure data entry via audio tones Aug 4, 2014 Issued
Array ( [id] => 10697853 [patent_doc_number] => 20160044000 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-11 [patent_title] => 'SYSTEM AND METHOD TO COMMUNICATE SENSITIVE INFORMATION VIA ONE OR MORE UNTRUSTED INTERMEDIATE NODES WITH RESILIENCE TO DISCONNECTED NETWORK TOPOLOGY' [patent_app_type] => utility [patent_app_number] => 14/452147 [patent_app_country] => US [patent_app_date] => 2014-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 9508 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14452147 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/452147
System and method to communicate sensitive information via one or more untrusted intermediate nodes with resilience to disconnected network topology Aug 4, 2014 Issued
Array ( [id] => 9859863 [patent_doc_number] => 20150039881 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-05 [patent_title] => 'Triggering an Internet Packet Protocol Against Malware' [patent_app_type] => utility [patent_app_number] => 14/452100 [patent_app_country] => US [patent_app_date] => 2014-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6178 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14452100 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/452100
Triggering an Internet Packet Protocol Against Malware Aug 4, 2014 Abandoned
Array ( [id] => 9903420 [patent_doc_number] => 20150058620 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-26 [patent_title] => 'Proximity Authentication System' [patent_app_type] => utility [patent_app_number] => 14/447131 [patent_app_country] => US [patent_app_date] => 2014-07-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 8643 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14447131 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/447131
Proximity Authentication System Jul 29, 2014 Abandoned
Array ( [id] => 9867002 [patent_doc_number] => 20150047021 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-12 [patent_title] => 'Systems and Methods for Providing Real Time Access Monitoring of a Removable Media Device' [patent_app_type] => utility [patent_app_number] => 14/337101 [patent_app_country] => US [patent_app_date] => 2014-07-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 25 [patent_figures_cnt] => 25 [patent_no_of_words] => 16365 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14337101 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/337101
Systems and methods for providing real time security and access monitoring of a removable media device Jul 20, 2014 Issued
Array ( [id] => 11223103 [patent_doc_number] => 09451458 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-09-20 [patent_title] => 'Indirect authorization techniques for accessing restricted content' [patent_app_type] => utility [patent_app_number] => 14/285378 [patent_app_country] => US [patent_app_date] => 2014-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 7602 [patent_no_of_claims] => 33 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 221 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14285378 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/285378
Indirect authorization techniques for accessing restricted content May 21, 2014 Issued
Menu