
Bryan F. Wright
Examiner (ID: 5299)
| Most Active Art Unit | 2497 |
| Art Unit(s) | 2431, 2131, 2497 |
| Total Applications | 852 |
| Issued Applications | 638 |
| Pending Applications | 48 |
| Abandoned Applications | 180 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 6968847
[patent_doc_number] => 20050235357
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-20
[patent_title] => 'Preventing cloning of high value software using embedded hardware and software functionality'
[patent_app_type] => utility
[patent_app_number] => 11/071079
[patent_app_country] => US
[patent_app_date] => 2005-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5342
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20050235357.pdf
[firstpage_image] =>[orig_patent_app_number] => 11071079
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/071079 | Preventing cloning of high value software using embedded hardware and software functionality | Mar 2, 2005 | Abandoned |
Array
(
[id] => 7735049
[patent_doc_number] => 08104086
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-01-24
[patent_title] => 'Heuristically detecting spyware/adware registry activity'
[patent_app_type] => utility
[patent_app_number] => 11/071765
[patent_app_country] => US
[patent_app_date] => 2005-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2341
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/104/08104086.pdf
[firstpage_image] =>[orig_patent_app_number] => 11071765
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/071765 | Heuristically detecting spyware/adware registry activity | Mar 2, 2005 | Issued |
Array
(
[id] => 6968813
[patent_doc_number] => 20050235347
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-20
[patent_title] => 'Method for eliminating source-based routing by a device disposed between an IP-compliant network and private network elements'
[patent_app_type] => utility
[patent_app_number] => 11/071870
[patent_app_country] => US
[patent_app_date] => 2005-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7901
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20050235347.pdf
[firstpage_image] =>[orig_patent_app_number] => 11071870
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/071870 | Method for eliminating source-based routing by a device disposed between an IP-compliant network and private network elements | Mar 1, 2005 | Abandoned |
Array
(
[id] => 5684586
[patent_doc_number] => 20060200856
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-09-07
[patent_title] => 'Methods and apparatus to validate configuration of computerized devices'
[patent_app_type] => utility
[patent_app_number] => 11/070567
[patent_app_country] => US
[patent_app_date] => 2005-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9405
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0200/20060200856.pdf
[firstpage_image] =>[orig_patent_app_number] => 11070567
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/070567 | Methods and apparatus to validate configuration of computerized devices | Mar 1, 2005 | Issued |
Array
(
[id] => 8195189
[patent_doc_number] => 08185945
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-05-22
[patent_title] => 'Systems and methods for selectively requesting certificates during initiation of secure communication sessions'
[patent_app_type] => utility
[patent_app_number] => 11/070475
[patent_app_country] => US
[patent_app_date] => 2005-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6509
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/185/08185945.pdf
[firstpage_image] =>[orig_patent_app_number] => 11070475
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/070475 | Systems and methods for selectively requesting certificates during initiation of secure communication sessions | Mar 1, 2005 | Issued |
Array
(
[id] => 9417123
[patent_doc_number] => 08701175
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-04-15
[patent_title] => 'Methods, devices, systems and computer program products for providing secure communications between managed devices in firewall protected areas and networks segregated therefrom'
[patent_app_type] => utility
[patent_app_number] => 11/069484
[patent_app_country] => US
[patent_app_date] => 2005-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 14
[patent_no_of_words] => 10673
[patent_no_of_claims] => 49
[patent_no_of_ind_claims] => 11
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11069484
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/069484 | Methods, devices, systems and computer program products for providing secure communications between managed devices in firewall protected areas and networks segregated therefrom | Feb 28, 2005 | Issued |
Array
(
[id] => 7193334
[patent_doc_number] => 20050193222
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-09-01
[patent_title] => 'Providing secure data and policy exchange between domains in a multi-domain grid by use of a service ecosystem facilitating uses such as supply-chain integration with RIFD tagged items and barcodes'
[patent_app_type] => utility
[patent_app_number] => 11/069479
[patent_app_country] => US
[patent_app_date] => 2005-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 16074
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0193/20050193222.pdf
[firstpage_image] =>[orig_patent_app_number] => 11069479
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/069479 | Providing secure data and policy exchange between domains in a multi-domain grid by use of a service ecosystem facilitating uses such as supply-chain integration with RIFD tagged items and barcodes | Feb 28, 2005 | Abandoned |
Array
(
[id] => 5033617
[patent_doc_number] => 20070098156
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-05-03
[patent_title] => 'Digital rights management'
[patent_app_type] => utility
[patent_app_number] => 10/559942
[patent_app_country] => US
[patent_app_date] => 2005-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4118
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0098/20070098156.pdf
[firstpage_image] =>[orig_patent_app_number] => 10559942
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/559942 | Digital rights management | Feb 28, 2005 | Abandoned |
Array
(
[id] => 5684396
[patent_doc_number] => 20060200666
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-09-07
[patent_title] => 'Methods, communication networks, and computer program products for monitoring communications of a network device using a secure digital certificate'
[patent_app_type] => utility
[patent_app_number] => 11/069077
[patent_app_country] => US
[patent_app_date] => 2005-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3725
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0200/20060200666.pdf
[firstpage_image] =>[orig_patent_app_number] => 11069077
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/069077 | Methods, communication networks, and computer program products for monitoring communications of a network device using a secure digital certificate | Feb 28, 2005 | Abandoned |
Array
(
[id] => 5684593
[patent_doc_number] => 20060200863
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-09-07
[patent_title] => 'On-access scan of memory for malware'
[patent_app_type] => utility
[patent_app_number] => 11/070468
[patent_app_country] => US
[patent_app_date] => 2005-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11008
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0200/20060200863.pdf
[firstpage_image] =>[orig_patent_app_number] => 11070468
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/070468 | On-access scan of memory for malware | Feb 28, 2005 | Issued |
Array
(
[id] => 5071505
[patent_doc_number] => 20070192607
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-08-16
[patent_title] => 'Electronic voting process using fair blind signatures'
[patent_app_type] => utility
[patent_app_number] => 10/591786
[patent_app_country] => US
[patent_app_date] => 2005-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5638
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0192/20070192607.pdf
[firstpage_image] =>[orig_patent_app_number] => 10591786
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/591786 | Electronic voting process using fair blind signatures | Feb 27, 2005 | Abandoned |
Array
(
[id] => 8438372
[patent_doc_number] => 08286157
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-10-09
[patent_title] => 'Method, system and program product for managing applications in a shared computer infrastructure'
[patent_app_type] => utility
[patent_app_number] => 11/068368
[patent_app_country] => US
[patent_app_date] => 2005-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4561
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11068368
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/068368 | Method, system and program product for managing applications in a shared computer infrastructure | Feb 27, 2005 | Issued |
Array
(
[id] => 6945918
[patent_doc_number] => 20050197967
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-09-08
[patent_title] => 'Secure printing'
[patent_app_type] => utility
[patent_app_number] => 11/067081
[patent_app_country] => US
[patent_app_date] => 2005-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6181
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0197/20050197967.pdf
[firstpage_image] =>[orig_patent_app_number] => 11067081
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/067081 | Secure printing | Feb 24, 2005 | Abandoned |
Array
(
[id] => 5706652
[patent_doc_number] => 20060195700
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-08-31
[patent_title] => 'Token signature'
[patent_app_type] => utility
[patent_app_number] => 11/067370
[patent_app_country] => US
[patent_app_date] => 2005-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7167
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0195/20060195700.pdf
[firstpage_image] =>[orig_patent_app_number] => 11067370
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/067370 | Token signature | Feb 24, 2005 | Abandoned |
Array
(
[id] => 7242763
[patent_doc_number] => 20050257246
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-11-17
[patent_title] => 'System and method for configuring devices for secure operations'
[patent_app_type] => utility
[patent_app_number] => 11/065901
[patent_app_country] => US
[patent_app_date] => 2005-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6168
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0257/20050257246.pdf
[firstpage_image] =>[orig_patent_app_number] => 11065901
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/065901 | System and method for configuring devices for secure operations | Feb 24, 2005 | Issued |
Array
(
[id] => 5621457
[patent_doc_number] => 20060190992
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-08-24
[patent_title] => 'Facilitating Bi-directional communications between clients in heterogeneous network environments'
[patent_app_type] => utility
[patent_app_number] => 11/064928
[patent_app_country] => US
[patent_app_date] => 2005-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4184
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0190/20060190992.pdf
[firstpage_image] =>[orig_patent_app_number] => 11064928
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/064928 | Facilitating Bi-directional communications between clients in heterogeneous network environments | Feb 23, 2005 | Abandoned |
Array
(
[id] => 107762
[patent_doc_number] => 07725715
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-05-25
[patent_title] => 'System and method for three-phase data encryption'
[patent_app_type] => utility
[patent_app_number] => 11/064912
[patent_app_country] => US
[patent_app_date] => 2005-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 12
[patent_no_of_words] => 5237
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/725/07725715.pdf
[firstpage_image] =>[orig_patent_app_number] => 11064912
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/064912 | System and method for three-phase data encryption | Feb 23, 2005 | Issued |
Array
(
[id] => 7982621
[patent_doc_number] => 08074069
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-12-06
[patent_title] => 'Reading a locked windows NFTS EFS encrypted computer file'
[patent_app_type] => utility
[patent_app_number] => 11/067570
[patent_app_country] => US
[patent_app_date] => 2005-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 4873
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/074/08074069.pdf
[firstpage_image] =>[orig_patent_app_number] => 11067570
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/067570 | Reading a locked windows NFTS EFS encrypted computer file | Feb 23, 2005 | Issued |
Array
(
[id] => 4542150
[patent_doc_number] => 07873046
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2011-01-18
[patent_title] => 'Detecting anomalous network activity through transformation of terrain'
[patent_app_type] => utility
[patent_app_number] => 11/067583
[patent_app_country] => US
[patent_app_date] => 2005-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4806
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/873/07873046.pdf
[firstpage_image] =>[orig_patent_app_number] => 11067583
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/067583 | Detecting anomalous network activity through transformation of terrain | Feb 23, 2005 | Issued |
Array
(
[id] => 6953899
[patent_doc_number] => 20050228994
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-13
[patent_title] => 'Method for encryption backup and method for decryption restoration'
[patent_app_type] => utility
[patent_app_number] => 11/064911
[patent_app_country] => US
[patent_app_date] => 2005-02-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 12802
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 13
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0228/20050228994.pdf
[firstpage_image] =>[orig_patent_app_number] => 11064911
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/064911 | Method for encryption backup and method for decryption restoration | Feb 21, 2005 | Abandoned |