
David Armand Wiley
Director (ID: 13300, Phone: (571)272-4150 , Office: P/2100 )
| Most Active Art Unit | 2781 |
| Art Unit(s) | 2155, 2143, 2174, 2305, 2781, 3781, 2855, 2100, 2158 |
| Total Applications | 523 |
| Issued Applications | 399 |
| Pending Applications | 75 |
| Abandoned Applications | 54 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9719096
[patent_doc_number] => 20140254794
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-11
[patent_title] => 'SESSION KEY GENERATION AND DISTRIBUTION WITH MULTIPLE SECURITY ASSOCIATIONS PER PROTOCOL INSTANCE'
[patent_app_type] => utility
[patent_app_number] => 14/285917
[patent_app_country] => US
[patent_app_date] => 2014-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9595
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14285917
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/285917 | Session key generation and distribution with multiple security associations per protocol instance | May 22, 2014 | Issued |
Array
(
[id] => 9493129
[patent_doc_number] => 20140143535
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-22
[patent_title] => 'AUTHENTICATED FILE HANDLES FOR NETWORK FILE SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 14/164420
[patent_app_country] => US
[patent_app_date] => 2014-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7287
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14164420
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/164420 | Authenticated file handles for network file systems | Jan 26, 2014 | Issued |
Array
(
[id] => 9886334
[patent_doc_number] => 08973120
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-03-03
[patent_title] => 'System and method for receiving requests for tasks from unregistered devices'
[patent_app_type] => utility
[patent_app_number] => 14/095570
[patent_app_country] => US
[patent_app_date] => 2013-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 11102
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14095570
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/095570 | System and method for receiving requests for tasks from unregistered devices | Dec 2, 2013 | Issued |
Array
(
[id] => 9871851
[patent_doc_number] => 08959643
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-02-17
[patent_title] => 'Detecting malware infestations in large-scale networks'
[patent_app_type] => utility
[patent_app_number] => 13/963958
[patent_app_country] => US
[patent_app_date] => 2013-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8433
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 453
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13963958
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/963958 | Detecting malware infestations in large-scale networks | Aug 8, 2013 | Issued |
Array
(
[id] => 10895264
[patent_doc_number] => 08918895
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-23
[patent_title] => 'Prevention of information leakage from a document based on dynamic database label based access control (LBAC) policies'
[patent_app_type] => utility
[patent_app_number] => 13/890329
[patent_app_country] => US
[patent_app_date] => 2013-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8069
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13890329
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/890329 | Prevention of information leakage from a document based on dynamic database label based access control (LBAC) policies | May 8, 2013 | Issued |
Array
(
[id] => 10900282
[patent_doc_number] => 08923512
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-30
[patent_title] => 'Circumvention of dynamic, robust, embedded-signal detection'
[patent_app_type] => utility
[patent_app_number] => 13/843345
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6510
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13843345
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/843345 | Circumvention of dynamic, robust, embedded-signal detection | Mar 14, 2013 | Issued |
Array
(
[id] => 9659040
[patent_doc_number] => 20140230045
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-14
[patent_title] => 'GRAPHICAL OBJECT-BASED USER AUTHENTICATION FOR COMPUTERIZED DEVICES'
[patent_app_type] => utility
[patent_app_number] => 13/767032
[patent_app_country] => US
[patent_app_date] => 2013-02-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4778
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13767032
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/767032 | GRAPHICAL OBJECT-BASED USER AUTHENTICATION FOR COMPUTERIZED DEVICES | Feb 13, 2013 | Abandoned |
Array
(
[id] => 10901473
[patent_doc_number] => 08924716
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-30
[patent_title] => 'Communication device and communication method'
[patent_app_type] => utility
[patent_app_number] => 13/738544
[patent_app_country] => US
[patent_app_date] => 2013-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 30
[patent_no_of_words] => 25506
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13738544
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/738544 | Communication device and communication method | Jan 9, 2013 | Issued |
Array
(
[id] => 9622460
[patent_doc_number] => 08792641
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-29
[patent_title] => 'Secure wireless communication'
[patent_app_type] => utility
[patent_app_number] => 13/738385
[patent_app_country] => US
[patent_app_date] => 2013-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 5050
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13738385
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/738385 | Secure wireless communication | Jan 9, 2013 | Issued |
Array
(
[id] => 10835079
[patent_doc_number] => 08863280
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-10-14
[patent_title] => 'Automatic response culling for web application security scan spidering process'
[patent_app_type] => utility
[patent_app_number] => 13/732554
[patent_app_country] => US
[patent_app_date] => 2013-01-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2855
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13732554
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/732554 | Automatic response culling for web application security scan spidering process | Jan 1, 2013 | Issued |
Array
(
[id] => 8608605
[patent_doc_number] => 20130013917
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-10
[patent_title] => 'SYSTEM AND METHOD FOR ENABLING BULK RETRIEVAL OF CERTIFICATES'
[patent_app_type] => utility
[patent_app_number] => 13/613069
[patent_app_country] => US
[patent_app_date] => 2012-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10929
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13613069
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/613069 | System and method for enabling bulk retrieval of certificates | Sep 12, 2012 | Issued |
Array
(
[id] => 9341927
[patent_doc_number] => 20140068711
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-06
[patent_title] => 'Network Access Management via a Secondary Communication Channel'
[patent_app_type] => utility
[patent_app_number] => 13/599927
[patent_app_country] => US
[patent_app_date] => 2012-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4386
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13599927
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/599927 | Network access management via a secondary communication channel | Aug 29, 2012 | Issued |
Array
(
[id] => 8511911
[patent_doc_number] => 20120311319
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-12-06
[patent_title] => 'CONTENT DATA DELIVERY SYSTEM, AND METHOD FOR DELIVERING AN ENCRYPTED CONTENT DATA'
[patent_app_type] => utility
[patent_app_number] => 13/586652
[patent_app_country] => US
[patent_app_date] => 2012-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4945
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13586652
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/586652 | Content data delivery system, and method for delivering an encrypted content data | Aug 14, 2012 | Issued |
Array
(
[id] => 9289329
[patent_doc_number] => 08645686
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-04
[patent_title] => 'Detection of encrypted packet streams using a timer'
[patent_app_type] => utility
[patent_app_number] => 13/569634
[patent_app_country] => US
[patent_app_date] => 2012-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3367
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13569634
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/569634 | Detection of encrypted packet streams using a timer | Aug 7, 2012 | Issued |
Array
(
[id] => 9308562
[patent_doc_number] => 20140047236
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-13
[patent_title] => 'AUTHENTICATED FILE HANDLES FOR NETWORK FILE SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 13/568785
[patent_app_country] => US
[patent_app_date] => 2012-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7253
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13568785
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/568785 | AUTHENTICATED FILE HANDLES FOR NETWORK FILE SYSTEMS | Aug 6, 2012 | Abandoned |
Array
(
[id] => 8467154
[patent_doc_number] => 20120272322
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-25
[patent_title] => 'DETERMINING THE VULNERABILITY OF COMPUTER SOFTWARE APPLICATIONS TO PRIVILEGE-ESCALATION ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 13/542214
[patent_app_country] => US
[patent_app_date] => 2012-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3605
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13542214
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/542214 | Determining the vulnerability of computer software applications to privilege-escalation attacks | Jul 4, 2012 | Issued |
Array
(
[id] => 9063135
[patent_doc_number] => 08549590
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-10-01
[patent_title] => 'Systems and methods for identity authentication using a social network'
[patent_app_type] => utility
[patent_app_number] => 13/541092
[patent_app_country] => US
[patent_app_date] => 2012-07-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5012
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13541092
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/541092 | Systems and methods for identity authentication using a social network | Jul 2, 2012 | Issued |
Array
(
[id] => 8467144
[patent_doc_number] => 20120272313
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-25
[patent_title] => 'CONTROLLED ACCESS TO FUNCTIONALITY OF A WIRELESS DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/539916
[patent_app_country] => US
[patent_app_date] => 2012-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6149
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13539916
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/539916 | Controlled access to functionality of a wireless device | Jul 1, 2012 | Issued |
Array
(
[id] => 10867557
[patent_doc_number] => 08893288
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-11-18
[patent_title] => 'Prevention of information leakage from a document based on dynamic database label based access control (LBAC) policies'
[patent_app_type] => utility
[patent_app_number] => 13/539816
[patent_app_country] => US
[patent_app_date] => 2012-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8036
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13539816
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/539816 | Prevention of information leakage from a document based on dynamic database label based access control (LBAC) policies | Jul 1, 2012 | Issued |
Array
(
[id] => 8524292
[patent_doc_number] => 20120323700
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-12-20
[patent_title] => 'IMAGE-BASED CAPTCHA SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/528373
[patent_app_country] => US
[patent_app_date] => 2012-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 11053
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13528373
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/528373 | IMAGE-BASED CAPTCHA SYSTEM | Jun 19, 2012 | Abandoned |