
Bryan F. Wright
Examiner (ID: 5299)
| Most Active Art Unit | 2497 |
| Art Unit(s) | 2431, 2131, 2497 |
| Total Applications | 852 |
| Issued Applications | 638 |
| Pending Applications | 48 |
| Abandoned Applications | 180 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12956734
[patent_doc_number] => 09838421
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-12-05
[patent_title] => Systems and methods utilizing peer measurements to detect and defend against distributed denial of service attacks
[patent_app_type] => utility
[patent_app_number] => 14/503746
[patent_app_country] => US
[patent_app_date] => 2014-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 7316
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 284
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503746
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/503746 | Systems and methods utilizing peer measurements to detect and defend against distributed denial of service attacks | Sep 30, 2014 | Issued |
Array
(
[id] => 12103099
[patent_doc_number] => 09860208
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-01-02
[patent_title] => 'Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network'
[patent_app_type] => utility
[patent_app_number] => 14/503143
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 27165
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 404
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503143
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/503143 | Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network | Sep 29, 2014 | Issued |
Array
(
[id] => 12114487
[patent_doc_number] => 09870481
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-01-16
[patent_title] => 'Associating a data encryption keystore backup with a computer system'
[patent_app_type] => utility
[patent_app_number] => 14/503331
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10279
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503331
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/503331 | Associating a data encryption keystore backup with a computer system | Sep 29, 2014 | Issued |
Array
(
[id] => 14395889
[patent_doc_number] => 10311228
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-04
[patent_title] => Using a fine-grained address space layout randomization to mitigate potential security exploits
[patent_app_type] => utility
[patent_app_number] => 14/503212
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 18
[patent_no_of_words] => 10241
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503212
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/503212 | Using a fine-grained address space layout randomization to mitigate potential security exploits | Sep 29, 2014 | Issued |
Array
(
[id] => 11411057
[patent_doc_number] => 09558363
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-31
[patent_title] => 'Systems and methods of context based data access control of encrypted files'
[patent_app_type] => utility
[patent_app_number] => 14/503244
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6618
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503244
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/503244 | Systems and methods of context based data access control of encrypted files | Sep 29, 2014 | Issued |
Array
(
[id] => 10748236
[patent_doc_number] => 20160094387
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-31
[patent_title] => 'DISCOVERY OF CLOUD-BASED ACCESS-POINT CONTROLLERS'
[patent_app_type] => utility
[patent_app_number] => 14/503133
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6122
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503133
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/503133 | DISCOVERY OF CLOUD-BASED ACCESS-POINT CONTROLLERS | Sep 29, 2014 | Abandoned |
Array
(
[id] => 12556347
[patent_doc_number] => 10015015
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-07-03
[patent_title] => Method and apparatus for verifying system log integrity
[patent_app_type] => utility
[patent_app_number] => 14/503319
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10422
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503319
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/503319 | Method and apparatus for verifying system log integrity | Sep 29, 2014 | Issued |
Array
(
[id] => 12148657
[patent_doc_number] => 09882929
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-01-30
[patent_title] => 'Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network'
[patent_app_type] => utility
[patent_app_number] => 14/503129
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 24372
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 385
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503129
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/503129 | Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network | Sep 29, 2014 | Issued |
Array
(
[id] => 10746519
[patent_doc_number] => 20160092670
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-31
[patent_title] => 'Answer Question User Authentication Process'
[patent_app_type] => utility
[patent_app_number] => 14/503375
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 3091
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503375
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/503375 | Answer Question User Authentication Process | Sep 29, 2014 | Abandoned |
Array
(
[id] => 14395887
[patent_doc_number] => 10311227
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-04
[patent_title] => Obfuscation of an address space layout randomization mapping in a data processing system
[patent_app_type] => utility
[patent_app_number] => 14/503195
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 18
[patent_no_of_words] => 10363
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503195
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/503195 | Obfuscation of an address space layout randomization mapping in a data processing system | Sep 29, 2014 | Issued |
Array
(
[id] => 14618427
[patent_doc_number] => 10361927
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-23
[patent_title] => Managing risk in multi-node automation of endpoint management
[patent_app_type] => utility
[patent_app_number] => 14/503254
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6590
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14503254
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/503254 | Managing risk in multi-node automation of endpoint management | Sep 29, 2014 | Issued |
Array
(
[id] => 10969717
[patent_doc_number] => 20140372749
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-18
[patent_title] => 'NETWORK WITH PROTOCOL, PRIVACY PRESERVING SOURCE ATTRIBUTION AND ADMISSION CONTROL AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/470671
[patent_app_country] => US
[patent_app_date] => 2014-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9577
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14470671
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/470671 | Network, network node with privacy preserving source attribution and admission control and device implemented method therfor | Aug 26, 2014 | Issued |
Array
(
[id] => 9934190
[patent_doc_number] => 20150082383
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-19
[patent_title] => 'System and Method for Controlling Access to an Electronic Message Recipient'
[patent_app_type] => utility
[patent_app_number] => 14/465506
[patent_app_country] => US
[patent_app_date] => 2014-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6730
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14465506
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/465506 | System and Method for Controlling Access to an Electronic Message Recipient | Aug 20, 2014 | Abandoned |
Array
(
[id] => 10962747
[patent_doc_number] => 20140365777
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-11
[patent_title] => 'SYSTEMS AND METHODS FOR SECURING NETWORK COMMUNICATIONS'
[patent_app_type] => utility
[patent_app_number] => 14/465491
[patent_app_country] => US
[patent_app_date] => 2014-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 23742
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14465491
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/465491 | SYSTEMS AND METHODS FOR SECURING NETWORK COMMUNICATIONS | Aug 20, 2014 | Abandoned |
Array
(
[id] => 10653187
[patent_doc_number] => 09369462
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-14
[patent_title] => 'Secure data entry via audio tones'
[patent_app_type] => utility
[patent_app_number] => 14/451753
[patent_app_country] => US
[patent_app_date] => 2014-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 10983
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 333
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14451753
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/451753 | Secure data entry via audio tones | Aug 4, 2014 | Issued |
Array
(
[id] => 10697853
[patent_doc_number] => 20160044000
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-11
[patent_title] => 'SYSTEM AND METHOD TO COMMUNICATE SENSITIVE INFORMATION VIA ONE OR MORE UNTRUSTED INTERMEDIATE NODES WITH RESILIENCE TO DISCONNECTED NETWORK TOPOLOGY'
[patent_app_type] => utility
[patent_app_number] => 14/452147
[patent_app_country] => US
[patent_app_date] => 2014-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9508
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14452147
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/452147 | System and method to communicate sensitive information via one or more untrusted intermediate nodes with resilience to disconnected network topology | Aug 4, 2014 | Issued |
Array
(
[id] => 9859863
[patent_doc_number] => 20150039881
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-05
[patent_title] => 'Triggering an Internet Packet Protocol Against Malware'
[patent_app_type] => utility
[patent_app_number] => 14/452100
[patent_app_country] => US
[patent_app_date] => 2014-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6178
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14452100
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/452100 | Triggering an Internet Packet Protocol Against Malware | Aug 4, 2014 | Abandoned |
Array
(
[id] => 9903420
[patent_doc_number] => 20150058620
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-26
[patent_title] => 'Proximity Authentication System'
[patent_app_type] => utility
[patent_app_number] => 14/447131
[patent_app_country] => US
[patent_app_date] => 2014-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8643
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14447131
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/447131 | Proximity Authentication System | Jul 29, 2014 | Abandoned |
Array
(
[id] => 9867002
[patent_doc_number] => 20150047021
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-12
[patent_title] => 'Systems and Methods for Providing Real Time Access Monitoring of a Removable Media Device'
[patent_app_type] => utility
[patent_app_number] => 14/337101
[patent_app_country] => US
[patent_app_date] => 2014-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 16365
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14337101
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/337101 | Systems and methods for providing real time security and access monitoring of a removable media device | Jul 20, 2014 | Issued |
Array
(
[id] => 11223103
[patent_doc_number] => 09451458
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-20
[patent_title] => 'Indirect authorization techniques for accessing restricted content'
[patent_app_type] => utility
[patent_app_number] => 14/285378
[patent_app_country] => US
[patent_app_date] => 2014-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7602
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14285378
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/285378 | Indirect authorization techniques for accessing restricted content | May 21, 2014 | Issued |