
Bryan F. Wright
Examiner (ID: 5299)
| Most Active Art Unit | 2497 |
| Art Unit(s) | 2431, 2131, 2497 |
| Total Applications | 852 |
| Issued Applications | 638 |
| Pending Applications | 48 |
| Abandoned Applications | 180 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9520503
[patent_doc_number] => 20140156995
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-05
[patent_title] => 'METHOD AND SYSTEM FOR ESTABLISHING REAL-TIME TRUST IN A PUBLIC NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/176284
[patent_app_country] => US
[patent_app_date] => 2014-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3637
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14176284
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/176284 | Method and system for authentication over a public network using multiple out-of-band communications channels to send keys | Feb 9, 2014 | Issued |
Array
(
[id] => 10080794
[patent_doc_number] => 09118657
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-08-25
[patent_title] => 'Extending secure single sign on to legacy applications'
[patent_app_type] => utility
[patent_app_number] => 14/160553
[patent_app_country] => US
[patent_app_date] => 2014-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2727
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 341
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14160553
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/160553 | Extending secure single sign on to legacy applications | Jan 21, 2014 | Issued |
Array
(
[id] => 10303661
[patent_doc_number] => 20150188661
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-02
[patent_title] => 'Encrypted Digital Circuit Description Allowing Circuit Simulation'
[patent_app_type] => utility
[patent_app_number] => 14/143300
[patent_app_country] => US
[patent_app_date] => 2013-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5931
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14143300
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/143300 | Encrypted digital circuit description allowing circuit simulation | Dec 29, 2013 | Issued |
Array
(
[id] => 9571657
[patent_doc_number] => 20140189370
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-03
[patent_title] => 'MEMORY DEVICES, AND SYSTEMS AND METHODS FOR VERIFYING SECURE DATA STORAGE'
[patent_app_type] => utility
[patent_app_number] => 14/143574
[patent_app_country] => US
[patent_app_date] => 2013-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 7423
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14143574
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/143574 | MEMORY DEVICES, AND SYSTEMS AND METHODS FOR VERIFYING SECURE DATA STORAGE | Dec 29, 2013 | Abandoned |
Array
(
[id] => 9673376
[patent_doc_number] => 20140237239
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-21
[patent_title] => 'TECHNIQUES FOR VALIDATING CRYPTOGRAPHIC APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 14/143248
[patent_app_country] => US
[patent_app_date] => 2013-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9079
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14143248
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/143248 | TECHNIQUES FOR VALIDATING CRYPTOGRAPHIC APPLICATIONS | Dec 29, 2013 | Abandoned |
Array
(
[id] => 10509274
[patent_doc_number] => 09237153
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-12
[patent_title] => 'Method for automatically configuration at least one endpoint'
[patent_app_type] => utility
[patent_app_number] => 14/143511
[patent_app_country] => US
[patent_app_date] => 2013-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 3565
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14143511
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/143511 | Method for automatically configuration at least one endpoint | Dec 29, 2013 | Issued |
Array
(
[id] => 9637116
[patent_doc_number] => 20140215225
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-31
[patent_title] => 'METHOD FOR INCREASING THE SECURITY OF SOFTWARE'
[patent_app_type] => utility
[patent_app_number] => 14/143551
[patent_app_country] => US
[patent_app_date] => 2013-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5948
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14143551
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/143551 | METHOD FOR INCREASING THE SECURITY OF SOFTWARE | Dec 29, 2013 | Abandoned |
Array
(
[id] => 9599448
[patent_doc_number] => 20140196129
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-10
[patent_title] => 'USER CREDENTIAL MANAGEMENT SYSTEM AND METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/143320
[patent_app_country] => US
[patent_app_date] => 2013-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9872
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14143320
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/143320 | USER CREDENTIAL MANAGEMENT SYSTEM AND METHOD THEREOF | Dec 29, 2013 | Abandoned |
Array
(
[id] => 10271017
[patent_doc_number] => 20150156014
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-04
[patent_title] => 'Method And Apparatus For ONU Authentication'
[patent_app_type] => utility
[patent_app_number] => 14/143434
[patent_app_country] => US
[patent_app_date] => 2013-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4024
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14143434
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/143434 | Method And Apparatus For ONU Authentication | Dec 29, 2013 | Abandoned |
Array
(
[id] => 9572133
[patent_doc_number] => 20140189847
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-03
[patent_title] => 'REMOTE VPN PROVISIONING OF AN ENDPOINT'
[patent_app_type] => utility
[patent_app_number] => 14/143409
[patent_app_country] => US
[patent_app_date] => 2013-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2697
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14143409
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/143409 | REMOTE VPN PROVISIONING OF AN ENDPOINT | Dec 29, 2013 | Abandoned |
Array
(
[id] => 9572144
[patent_doc_number] => 20140189857
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-03
[patent_title] => 'METHOD, SYSTEM, AND APPARATUS FOR SECURELY OPERATING COMPUTER'
[patent_app_type] => utility
[patent_app_number] => 14/143295
[patent_app_country] => US
[patent_app_date] => 2013-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5623
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14143295
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/143295 | METHOD, SYSTEM, AND APPARATUS FOR SECURELY OPERATING COMPUTER | Dec 29, 2013 | Abandoned |
Array
(
[id] => 10578013
[patent_doc_number] => 09300671
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-29
[patent_title] => 'Shared access with account restriction and promotion utilizing virtual accounts'
[patent_app_type] => utility
[patent_app_number] => 14/143403
[patent_app_country] => US
[patent_app_date] => 2013-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7119
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 321
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14143403
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/143403 | Shared access with account restriction and promotion utilizing virtual accounts | Dec 29, 2013 | Issued |
Array
(
[id] => 12196409
[patent_doc_number] => 09900154
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-20
[patent_title] => 'Optimized hardward architecture and method for ECC point addition using mixed affine-jacobian coordinates over short weierstrass curves'
[patent_app_type] => utility
[patent_app_number] => 14/139831
[patent_app_country] => US
[patent_app_date] => 2013-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 3748
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14139831
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/139831 | Optimized hardward architecture and method for ECC point addition using mixed affine-jacobian coordinates over short weierstrass curves | Dec 22, 2013 | Issued |
Array
(
[id] => 10293504
[patent_doc_number] => 20150178503
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-25
[patent_title] => 'OPTIMIZED HARDWARE ARCHITECTURE AND METHOD FOR ECC POINT DOUBLING USING JACOBIAN COORDINATES OVER SHORT WEIERSTRASS CURVES'
[patent_app_type] => utility
[patent_app_number] => 14/139849
[patent_app_country] => US
[patent_app_date] => 2013-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3364
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14139849
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/139849 | Optimized hardware architecture and method for ECC point doubling using jacobian coordinates over short weierstrass curves | Dec 22, 2013 | Issued |
Array
(
[id] => 12257704
[patent_doc_number] => 09929862
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-27
[patent_title] => 'Optimized hardware architecture and method for ECC point doubling using Jacobian coordinates over short Weierstrass curves'
[patent_app_type] => utility
[patent_app_number] => 14/139847
[patent_app_country] => US
[patent_app_date] => 2013-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 3909
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14139847
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/139847 | Optimized hardware architecture and method for ECC point doubling using Jacobian coordinates over short Weierstrass curves | Dec 22, 2013 | Issued |
Array
(
[id] => 9548634
[patent_doc_number] => 20140173282
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-19
[patent_title] => 'METHOD TO ACCESS DATA IN AN ELECTRONIC APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 14/103086
[patent_app_country] => US
[patent_app_date] => 2013-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6151
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14103086
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/103086 | Method for different users to securely access their respective partitioned data in an electronic apparatus | Dec 10, 2013 | Issued |
Array
(
[id] => 9570835
[patent_doc_number] => 20140188548
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-03
[patent_title] => 'SYSTEM AND METHOD OF FRAUD AND MISUSE DETECTION USING EVENT LOGS'
[patent_app_type] => utility
[patent_app_number] => 14/102017
[patent_app_country] => US
[patent_app_date] => 2013-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9326
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14102017
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/102017 | System and method of fraud and misuse detection using event logs | Dec 9, 2013 | Issued |
Array
(
[id] => 10146031
[patent_doc_number] => 09178853
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-11-03
[patent_title] => 'Securely determining internet connectivity'
[patent_app_type] => utility
[patent_app_number] => 14/076997
[patent_app_country] => US
[patent_app_date] => 2013-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7540
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14076997
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/076997 | Securely determining internet connectivity | Nov 10, 2013 | Issued |
Array
(
[id] => 11660965
[patent_doc_number] => 09673984
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-06
[patent_title] => 'Session key cache to maintain session keys'
[patent_app_type] => utility
[patent_app_number] => 14/069006
[patent_app_country] => US
[patent_app_date] => 2013-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6186
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14069006
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/069006 | Session key cache to maintain session keys | Oct 30, 2013 | Issued |
Array
(
[id] => 10054523
[patent_doc_number] => 09094414
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-28
[patent_title] => 'Arrangement and method for anonymous user profiling and targeted content provision'
[patent_app_type] => utility
[patent_app_number] => 13/974438
[patent_app_country] => US
[patent_app_date] => 2013-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 13
[patent_no_of_words] => 11134
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 243
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13974438
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/974438 | Arrangement and method for anonymous user profiling and targeted content provision | Aug 22, 2013 | Issued |