Search

Bryan F. Wright

Examiner (ID: 5299)

Most Active Art Unit
2497
Art Unit(s)
2431, 2131, 2497
Total Applications
852
Issued Applications
638
Pending Applications
48
Abandoned Applications
180

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 6968847 [patent_doc_number] => 20050235357 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-10-20 [patent_title] => 'Preventing cloning of high value software using embedded hardware and software functionality' [patent_app_type] => utility [patent_app_number] => 11/071079 [patent_app_country] => US [patent_app_date] => 2005-03-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5342 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0235/20050235357.pdf [firstpage_image] =>[orig_patent_app_number] => 11071079 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/071079
Preventing cloning of high value software using embedded hardware and software functionality Mar 2, 2005 Abandoned
Array ( [id] => 7735049 [patent_doc_number] => 08104086 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-01-24 [patent_title] => 'Heuristically detecting spyware/adware registry activity' [patent_app_type] => utility [patent_app_number] => 11/071765 [patent_app_country] => US [patent_app_date] => 2005-03-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2341 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 9 [patent_words_short_claim] => 89 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/104/08104086.pdf [firstpage_image] =>[orig_patent_app_number] => 11071765 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/071765
Heuristically detecting spyware/adware registry activity Mar 2, 2005 Issued
Array ( [id] => 6968813 [patent_doc_number] => 20050235347 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-10-20 [patent_title] => 'Method for eliminating source-based routing by a device disposed between an IP-compliant network and private network elements' [patent_app_type] => utility [patent_app_number] => 11/071870 [patent_app_country] => US [patent_app_date] => 2005-03-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7901 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0235/20050235347.pdf [firstpage_image] =>[orig_patent_app_number] => 11071870 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/071870
Method for eliminating source-based routing by a device disposed between an IP-compliant network and private network elements Mar 1, 2005 Abandoned
Array ( [id] => 5684586 [patent_doc_number] => 20060200856 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-09-07 [patent_title] => 'Methods and apparatus to validate configuration of computerized devices' [patent_app_type] => utility [patent_app_number] => 11/070567 [patent_app_country] => US [patent_app_date] => 2005-03-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9405 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0200/20060200856.pdf [firstpage_image] =>[orig_patent_app_number] => 11070567 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/070567
Methods and apparatus to validate configuration of computerized devices Mar 1, 2005 Issued
Array ( [id] => 8195189 [patent_doc_number] => 08185945 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-05-22 [patent_title] => 'Systems and methods for selectively requesting certificates during initiation of secure communication sessions' [patent_app_type] => utility [patent_app_number] => 11/070475 [patent_app_country] => US [patent_app_date] => 2005-03-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6509 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 239 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/185/08185945.pdf [firstpage_image] =>[orig_patent_app_number] => 11070475 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/070475
Systems and methods for selectively requesting certificates during initiation of secure communication sessions Mar 1, 2005 Issued
Array ( [id] => 9417123 [patent_doc_number] => 08701175 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-04-15 [patent_title] => 'Methods, devices, systems and computer program products for providing secure communications between managed devices in firewall protected areas and networks segregated therefrom' [patent_app_type] => utility [patent_app_number] => 11/069484 [patent_app_country] => US [patent_app_date] => 2005-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 14 [patent_no_of_words] => 10673 [patent_no_of_claims] => 49 [patent_no_of_ind_claims] => 11 [patent_words_short_claim] => 119 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11069484 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/069484
Methods, devices, systems and computer program products for providing secure communications between managed devices in firewall protected areas and networks segregated therefrom Feb 28, 2005 Issued
Array ( [id] => 7193334 [patent_doc_number] => 20050193222 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-09-01 [patent_title] => 'Providing secure data and policy exchange between domains in a multi-domain grid by use of a service ecosystem facilitating uses such as supply-chain integration with RIFD tagged items and barcodes' [patent_app_type] => utility [patent_app_number] => 11/069479 [patent_app_country] => US [patent_app_date] => 2005-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 16074 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0193/20050193222.pdf [firstpage_image] =>[orig_patent_app_number] => 11069479 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/069479
Providing secure data and policy exchange between domains in a multi-domain grid by use of a service ecosystem facilitating uses such as supply-chain integration with RIFD tagged items and barcodes Feb 28, 2005 Abandoned
Array ( [id] => 5033617 [patent_doc_number] => 20070098156 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-05-03 [patent_title] => 'Digital rights management' [patent_app_type] => utility [patent_app_number] => 10/559942 [patent_app_country] => US [patent_app_date] => 2005-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4118 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0098/20070098156.pdf [firstpage_image] =>[orig_patent_app_number] => 10559942 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/559942
Digital rights management Feb 28, 2005 Abandoned
Array ( [id] => 5684396 [patent_doc_number] => 20060200666 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-09-07 [patent_title] => 'Methods, communication networks, and computer program products for monitoring communications of a network device using a secure digital certificate' [patent_app_type] => utility [patent_app_number] => 11/069077 [patent_app_country] => US [patent_app_date] => 2005-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3725 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0200/20060200666.pdf [firstpage_image] =>[orig_patent_app_number] => 11069077 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/069077
Methods, communication networks, and computer program products for monitoring communications of a network device using a secure digital certificate Feb 28, 2005 Abandoned
Array ( [id] => 5684593 [patent_doc_number] => 20060200863 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-09-07 [patent_title] => 'On-access scan of memory for malware' [patent_app_type] => utility [patent_app_number] => 11/070468 [patent_app_country] => US [patent_app_date] => 2005-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 11008 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0200/20060200863.pdf [firstpage_image] =>[orig_patent_app_number] => 11070468 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/070468
On-access scan of memory for malware Feb 28, 2005 Issued
Array ( [id] => 5071505 [patent_doc_number] => 20070192607 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-08-16 [patent_title] => 'Electronic voting process using fair blind signatures' [patent_app_type] => utility [patent_app_number] => 10/591786 [patent_app_country] => US [patent_app_date] => 2005-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5638 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0192/20070192607.pdf [firstpage_image] =>[orig_patent_app_number] => 10591786 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/591786
Electronic voting process using fair blind signatures Feb 27, 2005 Abandoned
Array ( [id] => 8438372 [patent_doc_number] => 08286157 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-10-09 [patent_title] => 'Method, system and program product for managing applications in a shared computer infrastructure' [patent_app_type] => utility [patent_app_number] => 11/068368 [patent_app_country] => US [patent_app_date] => 2005-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4561 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 273 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11068368 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/068368
Method, system and program product for managing applications in a shared computer infrastructure Feb 27, 2005 Issued
Array ( [id] => 6945918 [patent_doc_number] => 20050197967 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-09-08 [patent_title] => 'Secure printing' [patent_app_type] => utility [patent_app_number] => 11/067081 [patent_app_country] => US [patent_app_date] => 2005-02-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6181 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0197/20050197967.pdf [firstpage_image] =>[orig_patent_app_number] => 11067081 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/067081
Secure printing Feb 24, 2005 Abandoned
Array ( [id] => 5706652 [patent_doc_number] => 20060195700 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-08-31 [patent_title] => 'Token signature' [patent_app_type] => utility [patent_app_number] => 11/067370 [patent_app_country] => US [patent_app_date] => 2005-02-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7167 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0195/20060195700.pdf [firstpage_image] =>[orig_patent_app_number] => 11067370 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/067370
Token signature Feb 24, 2005 Abandoned
Array ( [id] => 7242763 [patent_doc_number] => 20050257246 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-11-17 [patent_title] => 'System and method for configuring devices for secure operations' [patent_app_type] => utility [patent_app_number] => 11/065901 [patent_app_country] => US [patent_app_date] => 2005-02-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 6168 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0257/20050257246.pdf [firstpage_image] =>[orig_patent_app_number] => 11065901 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/065901
System and method for configuring devices for secure operations Feb 24, 2005 Issued
Array ( [id] => 5621457 [patent_doc_number] => 20060190992 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-08-24 [patent_title] => 'Facilitating Bi-directional communications between clients in heterogeneous network environments' [patent_app_type] => utility [patent_app_number] => 11/064928 [patent_app_country] => US [patent_app_date] => 2005-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4184 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0190/20060190992.pdf [firstpage_image] =>[orig_patent_app_number] => 11064928 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/064928
Facilitating Bi-directional communications between clients in heterogeneous network environments Feb 23, 2005 Abandoned
Array ( [id] => 107762 [patent_doc_number] => 07725715 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-05-25 [patent_title] => 'System and method for three-phase data encryption' [patent_app_type] => utility [patent_app_number] => 11/064912 [patent_app_country] => US [patent_app_date] => 2005-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 12 [patent_no_of_words] => 5237 [patent_no_of_claims] => 36 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/725/07725715.pdf [firstpage_image] =>[orig_patent_app_number] => 11064912 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/064912
System and method for three-phase data encryption Feb 23, 2005 Issued
Array ( [id] => 7982621 [patent_doc_number] => 08074069 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-12-06 [patent_title] => 'Reading a locked windows NFTS EFS encrypted computer file' [patent_app_type] => utility [patent_app_number] => 11/067570 [patent_app_country] => US [patent_app_date] => 2005-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 21 [patent_no_of_words] => 4873 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 209 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/074/08074069.pdf [firstpage_image] =>[orig_patent_app_number] => 11067570 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/067570
Reading a locked windows NFTS EFS encrypted computer file Feb 23, 2005 Issued
Array ( [id] => 4542150 [patent_doc_number] => 07873046 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2011-01-18 [patent_title] => 'Detecting anomalous network activity through transformation of terrain' [patent_app_type] => utility [patent_app_number] => 11/067583 [patent_app_country] => US [patent_app_date] => 2005-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4806 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 160 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/873/07873046.pdf [firstpage_image] =>[orig_patent_app_number] => 11067583 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/067583
Detecting anomalous network activity through transformation of terrain Feb 23, 2005 Issued
Array ( [id] => 6953899 [patent_doc_number] => 20050228994 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-10-13 [patent_title] => 'Method for encryption backup and method for decryption restoration' [patent_app_type] => utility [patent_app_number] => 11/064911 [patent_app_country] => US [patent_app_date] => 2005-02-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 22 [patent_figures_cnt] => 22 [patent_no_of_words] => 12802 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 13 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0228/20050228994.pdf [firstpage_image] =>[orig_patent_app_number] => 11064911 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/064911
Method for encryption backup and method for decryption restoration Feb 21, 2005 Abandoned
Menu