Search

David J. Parsley

Examiner (ID: 16789, Phone: (571)272-6890 , Office: P/3643 )

Most Active Art Unit
3643
Art Unit(s)
3643
Total Applications
2042
Issued Applications
925
Pending Applications
180
Abandoned Applications
967

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 8757252 [patent_doc_number] => 20130091557 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-04-11 [patent_title] => 'SYSTEM AND METHOD FOR PROVIDING CLOUD-BASED CROSS-PLATFORM APPLICATION STORES FOR MOBILE COMPUTING DEVICES' [patent_app_type] => utility [patent_app_number] => 13/650011 [patent_app_country] => US [patent_app_date] => 2012-10-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5751 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13650011 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/650011
SYSTEM AND METHOD FOR PROVIDING CLOUD-BASED CROSS-PLATFORM APPLICATION STORES FOR MOBILE COMPUTING DEVICES Oct 10, 2012 Abandoned
Array ( [id] => 11345588 [patent_doc_number] => 09529996 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-12-27 [patent_title] => 'Controlling mobile device access to enterprise resources' [patent_app_type] => utility [patent_app_number] => 13/649073 [patent_app_country] => US [patent_app_date] => 2012-10-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 40 [patent_figures_cnt] => 43 [patent_no_of_words] => 60505 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13649073 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/649073
Controlling mobile device access to enterprise resources Oct 9, 2012 Issued
Array ( [id] => 10113276 [patent_doc_number] => 09148700 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-09-29 [patent_title] => 'Remotely defining security data for authorization of local application activity' [patent_app_type] => utility [patent_app_number] => 13/616796 [patent_app_country] => US [patent_app_date] => 2012-09-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 9650 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 155 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13616796 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/616796
Remotely defining security data for authorization of local application activity Sep 13, 2012 Issued
Array ( [id] => 9578853 [patent_doc_number] => 08769289 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-07-01 [patent_title] => 'Authentication of a user accessing a protected resource using multi-channel protocol' [patent_app_type] => utility [patent_app_number] => 13/617159 [patent_app_country] => US [patent_app_date] => 2012-09-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 6 [patent_no_of_words] => 2904 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 140 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13617159 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/617159
Authentication of a user accessing a protected resource using multi-channel protocol Sep 13, 2012 Issued
Array ( [id] => 10119581 [patent_doc_number] => 09154479 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-10-06 [patent_title] => 'Secure proxy' [patent_app_type] => utility [patent_app_number] => 13/619317 [patent_app_country] => US [patent_app_date] => 2012-09-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 12983 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 197 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13619317 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/619317
Secure proxy Sep 13, 2012 Issued
Array ( [id] => 8568509 [patent_doc_number] => 20120331080 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-12-27 [patent_title] => 'PRIVATE ELECTRONIC INFORMATION EXCHANGE' [patent_app_type] => utility [patent_app_number] => 13/607417 [patent_app_country] => US [patent_app_date] => 2012-09-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 9402 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13607417 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/607417
Private electronic information exchange Sep 6, 2012 Issued
Array ( [id] => 9826045 [patent_doc_number] => 08935541 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-01-13 [patent_title] => 'Method and apparatus for encrypting and processing data in flash translation layer' [patent_app_type] => utility [patent_app_number] => 13/569713 [patent_app_country] => US [patent_app_date] => 2012-08-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 3792 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 92 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13569713 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/569713
Method and apparatus for encrypting and processing data in flash translation layer Aug 7, 2012 Issued
Array ( [id] => 10860713 [patent_doc_number] => 08886930 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-11-11 [patent_title] => 'DNS flood protection platform for a network' [patent_app_type] => utility [patent_app_number] => 13/567938 [patent_app_country] => US [patent_app_date] => 2012-08-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6395 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 242 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13567938 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/567938
DNS flood protection platform for a network Aug 5, 2012 Issued
Array ( [id] => 10328269 [patent_doc_number] => 20150213272 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-07-30 [patent_title] => 'CONJOINT VULNERABILITY IDENTIFIERS' [patent_app_type] => utility [patent_app_number] => 14/418894 [patent_app_country] => US [patent_app_date] => 2012-07-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4413 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14418894 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/418894
CONJOINT VULNERABILITY IDENTIFIERS Jul 30, 2012 Abandoned
Array ( [id] => 10295879 [patent_doc_number] => 20150180878 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-06-25 [patent_title] => 'UNAUTHORIZED USER CLASSIFICATION' [patent_app_type] => utility [patent_app_number] => 14/418927 [patent_app_country] => US [patent_app_date] => 2012-07-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6440 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14418927 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/418927
UNAUTHORIZED USER CLASSIFICATION Jul 30, 2012 Abandoned
Array ( [id] => 8504870 [patent_doc_number] => 20120304278 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-11-29 [patent_title] => 'METHODS AND SYSTEMS FOR ACHIEVING HIGH ASSURANCE COMPUTING USING LOW ASSURANCE OPERATING SYSTEMS AND PROCESSES' [patent_app_type] => utility [patent_app_number] => 13/557751 [patent_app_country] => US [patent_app_date] => 2012-07-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 10880 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13557751 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/557751
METHODS AND SYSTEMS FOR ACHIEVING HIGH ASSURANCE COMPUTING USING LOW ASSURANCE OPERATING SYSTEMS AND PROCESSES Jul 24, 2012 Abandoned
Array ( [id] => 8455281 [patent_doc_number] => 20120266227 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-10-18 [patent_title] => 'VERIFICATION AND AUTHENTICATION SYSTEMS AND METHODS' [patent_app_type] => utility [patent_app_number] => 13/537437 [patent_app_country] => US [patent_app_date] => 2012-06-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 12764 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13537437 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/537437
Verification and authentication systems and methods Jun 28, 2012 Issued
Array ( [id] => 9207598 [patent_doc_number] => 20140006775 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-01-02 [patent_title] => 'MESSAGE ORIGINATOR TOKEN VERIFICATION' [patent_app_type] => utility [patent_app_number] => 13/536368 [patent_app_country] => US [patent_app_date] => 2012-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 11578 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13536368 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/536368
Message originator token verification Jun 27, 2012 Issued
Array ( [id] => 9352551 [patent_doc_number] => 08671456 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-03-11 [patent_title] => 'Accessing restricted resources in computer programming' [patent_app_type] => utility [patent_app_number] => 13/532813 [patent_app_country] => US [patent_app_date] => 2012-06-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6254 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 124 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13532813 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/532813
Accessing restricted resources in computer programming Jun 25, 2012 Issued
Array ( [id] => 9968208 [patent_doc_number] => 09015844 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-04-21 [patent_title] => 'Techniques for web application vulnerability scanning' [patent_app_type] => utility [patent_app_number] => 13/532327 [patent_app_country] => US [patent_app_date] => 2012-06-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5570 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13532327 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/532327
Techniques for web application vulnerability scanning Jun 24, 2012 Issued
Array ( [id] => 10074522 [patent_doc_number] => 09112895 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-08-18 [patent_title] => 'Anomaly detection system for enterprise network security' [patent_app_type] => utility [patent_app_number] => 13/532355 [patent_app_country] => US [patent_app_date] => 2012-06-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 7074 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 278 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13532355 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/532355
Anomaly detection system for enterprise network security Jun 24, 2012 Issued
Array ( [id] => 9992957 [patent_doc_number] => 09038178 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-05-19 [patent_title] => 'Detection of malware beaconing activities' [patent_app_type] => utility [patent_app_number] => 13/532385 [patent_app_country] => US [patent_app_date] => 2012-06-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6934 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 228 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13532385 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/532385
Detection of malware beaconing activities Jun 24, 2012 Issued
Array ( [id] => 9265166 [patent_doc_number] => 20130347095 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-12-26 [patent_title] => 'ISOLATION AND SECURITY HARDENING AMONG WORKLOADS IN A MULTI-TENANT NETWORKED ENVIRONMENT' [patent_app_type] => utility [patent_app_number] => 13/531761 [patent_app_country] => US [patent_app_date] => 2012-06-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 9140 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13531761 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/531761
Isolation and security hardening among workloads in a multi-tenant networked environment Jun 24, 2012 Issued
Array ( [id] => 9500072 [patent_doc_number] => 08738911 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-05-27 [patent_title] => 'Secure socket layer keystore and truststore generation' [patent_app_type] => utility [patent_app_number] => 13/532210 [patent_app_country] => US [patent_app_date] => 2012-06-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7869 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 104 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13532210 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/532210
Secure socket layer keystore and truststore generation Jun 24, 2012 Issued
Array ( [id] => 8455051 [patent_doc_number] => 20120265997 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-10-18 [patent_title] => 'PRIVACY-PRESERVING FLEXIBLE ANONYMOUS-PSEUDONYMOUS ACCESS' [patent_app_type] => utility [patent_app_number] => 13/530438 [patent_app_country] => US [patent_app_date] => 2012-06-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 18652 [patent_no_of_claims] => 47 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13530438 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/530438
Privacy-preserving flexible anonymous-pseudonymous access Jun 21, 2012 Issued
Menu