
Bryan F. Wright
Examiner (ID: 372, Phone: (571)270-3826 , Office: P/2497 )
| Most Active Art Unit | 2497 |
| Art Unit(s) | 2431, 2131, 2497 |
| Total Applications | 848 |
| Issued Applications | 634 |
| Pending Applications | 52 |
| Abandoned Applications | 180 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 5774075
[patent_doc_number] => 20050268089
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-12-01
[patent_title] => 'Printing system and method that support security function'
[patent_app_type] => utility
[patent_app_number] => 11/108137
[patent_app_country] => US
[patent_app_date] => 2005-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4632
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0268/20050268089.pdf
[firstpage_image] =>[orig_patent_app_number] => 11108137
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/108137 | Printing system and method that support security function | Apr 17, 2005 | Abandoned |
Array
(
[id] => 5852925
[patent_doc_number] => 20060236116
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-10-19
[patent_title] => 'Provisioning root keys'
[patent_app_type] => utility
[patent_app_number] => 11/108609
[patent_app_country] => US
[patent_app_date] => 2005-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3391
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0236/20060236116.pdf
[firstpage_image] =>[orig_patent_app_number] => 11108609
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/108609 | Provisioning root keys | Apr 17, 2005 | Abandoned |
Array
(
[id] => 7217376
[patent_doc_number] => 20050253737
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-11-17
[patent_title] => 'Method and system for confirmation of data'
[patent_app_type] => utility
[patent_app_number] => 11/108000
[patent_app_country] => US
[patent_app_date] => 2005-04-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2804
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0253/20050253737.pdf
[firstpage_image] =>[orig_patent_app_number] => 11108000
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/108000 | Method and system for confirmation of data | Apr 12, 2005 | Abandoned |
Array
(
[id] => 5064730
[patent_doc_number] => 20070226372
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-09-27
[patent_title] => 'Distributed Authorized Domain Management'
[patent_app_type] => utility
[patent_app_number] => 10/599887
[patent_app_country] => US
[patent_app_date] => 2005-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5197
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0226/20070226372.pdf
[firstpage_image] =>[orig_patent_app_number] => 10599887
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/599887 | Distributed Authorized Domain Management | Apr 7, 2005 | Abandoned |
Array
(
[id] => 5761997
[patent_doc_number] => 20060212942
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-09-21
[patent_title] => 'Semantically-aware network intrusion signature generator'
[patent_app_type] => utility
[patent_app_number] => 11/085633
[patent_app_country] => US
[patent_app_date] => 2005-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3804
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0212/20060212942.pdf
[firstpage_image] =>[orig_patent_app_number] => 11085633
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/085633 | Semantically-aware network intrusion signature generator | Mar 20, 2005 | Issued |
Array
(
[id] => 8438447
[patent_doc_number] => 08286233
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-10-09
[patent_title] => 'Apparatus and method for preventing eavesdropping'
[patent_app_type] => utility
[patent_app_number] => 11/084583
[patent_app_country] => US
[patent_app_date] => 2005-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3309
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11084583
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/084583 | Apparatus and method for preventing eavesdropping | Mar 18, 2005 | Issued |
Array
(
[id] => 4555698
[patent_doc_number] => 07890634
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-02-15
[patent_title] => 'Scalable session management'
[patent_app_type] => utility
[patent_app_number] => 11/084051
[patent_app_country] => US
[patent_app_date] => 2005-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6098
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/890/07890634.pdf
[firstpage_image] =>[orig_patent_app_number] => 11084051
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/084051 | Scalable session management | Mar 17, 2005 | Issued |
Array
(
[id] => 4602640
[patent_doc_number] => 07979482
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-07-12
[patent_title] => 'Random number generator configured to combine states of memory cells'
[patent_app_type] => utility
[patent_app_number] => 11/084725
[patent_app_country] => US
[patent_app_date] => 2005-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 15
[patent_no_of_words] => 9969
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/979/07979482.pdf
[firstpage_image] =>[orig_patent_app_number] => 11084725
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/084725 | Random number generator configured to combine states of memory cells | Mar 17, 2005 | Issued |
| 11/084333 | Method and apparatus for providing authorization | Mar 17, 2005 | Abandoned |
Array
(
[id] => 5809604
[patent_doc_number] => 20060095960
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-05-04
[patent_title] => 'Data center topology with transparent layer 4 and layer 7 services'
[patent_app_type] => utility
[patent_app_number] => 11/084311
[patent_app_country] => US
[patent_app_date] => 2005-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4131
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0095/20060095960.pdf
[firstpage_image] =>[orig_patent_app_number] => 11084311
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/084311 | Data center topology with transparent layer 4 and layer 7 services | Mar 16, 2005 | Abandoned |
Array
(
[id] => 5114498
[patent_doc_number] => 20070198414
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-08-23
[patent_title] => 'Method And System For Selectively Providing Access To Content'
[patent_app_type] => utility
[patent_app_number] => 10/592339
[patent_app_country] => US
[patent_app_date] => 2005-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3930
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0198/20070198414.pdf
[firstpage_image] =>[orig_patent_app_number] => 10592339
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/592339 | Method and system for selectively providing access to content | Mar 16, 2005 | Issued |
Array
(
[id] => 8861268
[patent_doc_number] => 08463819
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-06-11
[patent_title] => 'Centralized enterprise security policy framework'
[patent_app_type] => utility
[patent_app_number] => 11/084497
[patent_app_country] => US
[patent_app_date] => 2005-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4128
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11084497
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/084497 | Centralized enterprise security policy framework | Mar 16, 2005 | Issued |
Array
(
[id] => 5759140
[patent_doc_number] => 20060210085
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-09-21
[patent_title] => 'Method and apparatus for expiring encrypted data'
[patent_app_type] => utility
[patent_app_number] => 11/084346
[patent_app_country] => US
[patent_app_date] => 2005-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3137
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0210/20060210085.pdf
[firstpage_image] =>[orig_patent_app_number] => 11084346
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/084346 | Method and apparatus for expiring encrypted data | Mar 16, 2005 | Issued |
Array
(
[id] => 5071506
[patent_doc_number] => 20070192608
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-08-16
[patent_title] => 'Access control system for information services based on a hardware and software signature of a requesting device'
[patent_app_type] => utility
[patent_app_number] => 10/598719
[patent_app_country] => US
[patent_app_date] => 2005-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2433
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0192/20070192608.pdf
[firstpage_image] =>[orig_patent_app_number] => 10598719
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/598719 | Access control system for information services based on a hardware and software signature of a requesting device | Mar 9, 2005 | Issued |
Array
(
[id] => 5200969
[patent_doc_number] => 20070300287
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-12-27
[patent_title] => 'Partition Access Control System And Method For Controlling Partition Access'
[patent_app_type] => utility
[patent_app_number] => 10/591385
[patent_app_country] => US
[patent_app_date] => 2005-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6545
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 14
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0300/20070300287.pdf
[firstpage_image] =>[orig_patent_app_number] => 10591385
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/591385 | Partition access control system and method for controlling partition access | Mar 3, 2005 | Issued |
Array
(
[id] => 7517867
[patent_doc_number] => 08041949
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-10-18
[patent_title] => 'Information processing scheme for realizing contents transfer and copyright protection'
[patent_app_type] => utility
[patent_app_number] => 11/071252
[patent_app_country] => US
[patent_app_date] => 2005-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 34
[patent_no_of_words] => 14526
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 379
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/041/08041949.pdf
[firstpage_image] =>[orig_patent_app_number] => 11071252
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/071252 | Information processing scheme for realizing contents transfer and copyright protection | Mar 3, 2005 | Issued |
Array
(
[id] => 7735049
[patent_doc_number] => 08104086
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-01-24
[patent_title] => 'Heuristically detecting spyware/adware registry activity'
[patent_app_type] => utility
[patent_app_number] => 11/071765
[patent_app_country] => US
[patent_app_date] => 2005-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2341
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/104/08104086.pdf
[firstpage_image] =>[orig_patent_app_number] => 11071765
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/071765 | Heuristically detecting spyware/adware registry activity | Mar 2, 2005 | Issued |
Array
(
[id] => 6968847
[patent_doc_number] => 20050235357
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-20
[patent_title] => 'Preventing cloning of high value software using embedded hardware and software functionality'
[patent_app_type] => utility
[patent_app_number] => 11/071079
[patent_app_country] => US
[patent_app_date] => 2005-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5342
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20050235357.pdf
[firstpage_image] =>[orig_patent_app_number] => 11071079
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/071079 | Preventing cloning of high value software using embedded hardware and software functionality | Mar 2, 2005 | Abandoned |
Array
(
[id] => 6968813
[patent_doc_number] => 20050235347
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-20
[patent_title] => 'Method for eliminating source-based routing by a device disposed between an IP-compliant network and private network elements'
[patent_app_type] => utility
[patent_app_number] => 11/071870
[patent_app_country] => US
[patent_app_date] => 2005-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7901
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20050235347.pdf
[firstpage_image] =>[orig_patent_app_number] => 11071870
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/071870 | Method for eliminating source-based routing by a device disposed between an IP-compliant network and private network elements | Mar 1, 2005 | Abandoned |
Array
(
[id] => 5684586
[patent_doc_number] => 20060200856
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-09-07
[patent_title] => 'Methods and apparatus to validate configuration of computerized devices'
[patent_app_type] => utility
[patent_app_number] => 11/070567
[patent_app_country] => US
[patent_app_date] => 2005-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9405
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0200/20060200856.pdf
[firstpage_image] =>[orig_patent_app_number] => 11070567
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/070567 | Methods and apparatus to validate configuration of computerized devices | Mar 1, 2005 | Issued |