Search

David Armand Wiley

Director (ID: 13300, Phone: (571)272-4150 , Office: P/2100 )

Most Active Art Unit
2781
Art Unit(s)
2155, 2143, 2174, 2305, 2781, 3781, 2855, 2100, 2158
Total Applications
523
Issued Applications
399
Pending Applications
75
Abandoned Applications
54

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9719096 [patent_doc_number] => 20140254794 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-09-11 [patent_title] => 'SESSION KEY GENERATION AND DISTRIBUTION WITH MULTIPLE SECURITY ASSOCIATIONS PER PROTOCOL INSTANCE' [patent_app_type] => utility [patent_app_number] => 14/285917 [patent_app_country] => US [patent_app_date] => 2014-05-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9595 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14285917 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/285917
Session key generation and distribution with multiple security associations per protocol instance May 22, 2014 Issued
Array ( [id] => 9493129 [patent_doc_number] => 20140143535 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-05-22 [patent_title] => 'AUTHENTICATED FILE HANDLES FOR NETWORK FILE SYSTEMS' [patent_app_type] => utility [patent_app_number] => 14/164420 [patent_app_country] => US [patent_app_date] => 2014-01-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7287 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14164420 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/164420
Authenticated file handles for network file systems Jan 26, 2014 Issued
Array ( [id] => 9886334 [patent_doc_number] => 08973120 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-03-03 [patent_title] => 'System and method for receiving requests for tasks from unregistered devices' [patent_app_type] => utility [patent_app_number] => 14/095570 [patent_app_country] => US [patent_app_date] => 2013-12-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 11 [patent_no_of_words] => 11102 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 163 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14095570 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/095570
System and method for receiving requests for tasks from unregistered devices Dec 2, 2013 Issued
Array ( [id] => 9871851 [patent_doc_number] => 08959643 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-02-17 [patent_title] => 'Detecting malware infestations in large-scale networks' [patent_app_type] => utility [patent_app_number] => 13/963958 [patent_app_country] => US [patent_app_date] => 2013-08-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8433 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 453 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13963958 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/963958
Detecting malware infestations in large-scale networks Aug 8, 2013 Issued
Array ( [id] => 10895264 [patent_doc_number] => 08918895 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-12-23 [patent_title] => 'Prevention of information leakage from a document based on dynamic database label based access control (LBAC) policies' [patent_app_type] => utility [patent_app_number] => 13/890329 [patent_app_country] => US [patent_app_date] => 2013-05-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 8069 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 204 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13890329 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/890329
Prevention of information leakage from a document based on dynamic database label based access control (LBAC) policies May 8, 2013 Issued
Array ( [id] => 10900282 [patent_doc_number] => 08923512 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-12-30 [patent_title] => 'Circumvention of dynamic, robust, embedded-signal detection' [patent_app_type] => utility [patent_app_number] => 13/843345 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6510 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 84 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13843345 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/843345
Circumvention of dynamic, robust, embedded-signal detection Mar 14, 2013 Issued
Array ( [id] => 9659040 [patent_doc_number] => 20140230045 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-08-14 [patent_title] => 'GRAPHICAL OBJECT-BASED USER AUTHENTICATION FOR COMPUTERIZED DEVICES' [patent_app_type] => utility [patent_app_number] => 13/767032 [patent_app_country] => US [patent_app_date] => 2013-02-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4778 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13767032 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/767032
GRAPHICAL OBJECT-BASED USER AUTHENTICATION FOR COMPUTERIZED DEVICES Feb 13, 2013 Abandoned
Array ( [id] => 10901473 [patent_doc_number] => 08924716 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-12-30 [patent_title] => 'Communication device and communication method' [patent_app_type] => utility [patent_app_number] => 13/738544 [patent_app_country] => US [patent_app_date] => 2013-01-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 28 [patent_figures_cnt] => 30 [patent_no_of_words] => 25506 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 131 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13738544 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/738544
Communication device and communication method Jan 9, 2013 Issued
Array ( [id] => 9622460 [patent_doc_number] => 08792641 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-07-29 [patent_title] => 'Secure wireless communication' [patent_app_type] => utility [patent_app_number] => 13/738385 [patent_app_country] => US [patent_app_date] => 2013-01-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 5050 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 154 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13738385 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/738385
Secure wireless communication Jan 9, 2013 Issued
Array ( [id] => 10835079 [patent_doc_number] => 08863280 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-10-14 [patent_title] => 'Automatic response culling for web application security scan spidering process' [patent_app_type] => utility [patent_app_number] => 13/732554 [patent_app_country] => US [patent_app_date] => 2013-01-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2855 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 121 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13732554 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/732554
Automatic response culling for web application security scan spidering process Jan 1, 2013 Issued
Array ( [id] => 8608605 [patent_doc_number] => 20130013917 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-01-10 [patent_title] => 'SYSTEM AND METHOD FOR ENABLING BULK RETRIEVAL OF CERTIFICATES' [patent_app_type] => utility [patent_app_number] => 13/613069 [patent_app_country] => US [patent_app_date] => 2012-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10929 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13613069 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/613069
System and method for enabling bulk retrieval of certificates Sep 12, 2012 Issued
Array ( [id] => 9341927 [patent_doc_number] => 20140068711 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-03-06 [patent_title] => 'Network Access Management via a Secondary Communication Channel' [patent_app_type] => utility [patent_app_number] => 13/599927 [patent_app_country] => US [patent_app_date] => 2012-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4386 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13599927 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/599927
Network access management via a secondary communication channel Aug 29, 2012 Issued
Array ( [id] => 8511911 [patent_doc_number] => 20120311319 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-12-06 [patent_title] => 'CONTENT DATA DELIVERY SYSTEM, AND METHOD FOR DELIVERING AN ENCRYPTED CONTENT DATA' [patent_app_type] => utility [patent_app_number] => 13/586652 [patent_app_country] => US [patent_app_date] => 2012-08-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4945 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13586652 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/586652
Content data delivery system, and method for delivering an encrypted content data Aug 14, 2012 Issued
Array ( [id] => 9289329 [patent_doc_number] => 08645686 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-02-04 [patent_title] => 'Detection of encrypted packet streams using a timer' [patent_app_type] => utility [patent_app_number] => 13/569634 [patent_app_country] => US [patent_app_date] => 2012-08-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3367 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 171 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13569634 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/569634
Detection of encrypted packet streams using a timer Aug 7, 2012 Issued
Array ( [id] => 9308562 [patent_doc_number] => 20140047236 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-02-13 [patent_title] => 'AUTHENTICATED FILE HANDLES FOR NETWORK FILE SYSTEMS' [patent_app_type] => utility [patent_app_number] => 13/568785 [patent_app_country] => US [patent_app_date] => 2012-08-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7253 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13568785 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/568785
AUTHENTICATED FILE HANDLES FOR NETWORK FILE SYSTEMS Aug 6, 2012 Abandoned
Array ( [id] => 8467154 [patent_doc_number] => 20120272322 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-10-25 [patent_title] => 'DETERMINING THE VULNERABILITY OF COMPUTER SOFTWARE APPLICATIONS TO PRIVILEGE-ESCALATION ATTACKS' [patent_app_type] => utility [patent_app_number] => 13/542214 [patent_app_country] => US [patent_app_date] => 2012-07-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3605 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13542214 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/542214
Determining the vulnerability of computer software applications to privilege-escalation attacks Jul 4, 2012 Issued
Array ( [id] => 9063135 [patent_doc_number] => 08549590 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-10-01 [patent_title] => 'Systems and methods for identity authentication using a social network' [patent_app_type] => utility [patent_app_number] => 13/541092 [patent_app_country] => US [patent_app_date] => 2012-07-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5012 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 143 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13541092 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/541092
Systems and methods for identity authentication using a social network Jul 2, 2012 Issued
Array ( [id] => 8467144 [patent_doc_number] => 20120272313 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-10-25 [patent_title] => 'CONTROLLED ACCESS TO FUNCTIONALITY OF A WIRELESS DEVICE' [patent_app_type] => utility [patent_app_number] => 13/539916 [patent_app_country] => US [patent_app_date] => 2012-07-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6149 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13539916 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/539916
Controlled access to functionality of a wireless device Jul 1, 2012 Issued
Array ( [id] => 10867557 [patent_doc_number] => 08893288 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-11-18 [patent_title] => 'Prevention of information leakage from a document based on dynamic database label based access control (LBAC) policies' [patent_app_type] => utility [patent_app_number] => 13/539816 [patent_app_country] => US [patent_app_date] => 2012-07-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 8036 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 230 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13539816 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/539816
Prevention of information leakage from a document based on dynamic database label based access control (LBAC) policies Jul 1, 2012 Issued
Array ( [id] => 8524292 [patent_doc_number] => 20120323700 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-12-20 [patent_title] => 'IMAGE-BASED CAPTCHA SYSTEM' [patent_app_type] => utility [patent_app_number] => 13/528373 [patent_app_country] => US [patent_app_date] => 2012-06-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 11053 [patent_no_of_claims] => 45 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13528373 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/528373
IMAGE-BASED CAPTCHA SYSTEM Jun 19, 2012 Abandoned
Menu