Search

Thomas B. Will

Supervisory Patent Examiner (ID: 6177, Phone: (571)272-6998 , Office: P/3671 )

Most Active Art Unit
2406
Art Unit(s)
3616, 2859, 3671, 2856, 2855, 2406, 3108
Total Applications
1203
Issued Applications
972
Pending Applications
68
Abandoned Applications
163

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 8775420 [patent_doc_number] => 08429396 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-04-23 [patent_title] => 'Peer discovery and secure communication in failover schemes' [patent_app_type] => utility [patent_app_number] => 11/421386 [patent_app_country] => US [patent_app_date] => 2006-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 4137 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 259 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11421386 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/421386
Peer discovery and secure communication in failover schemes May 30, 2006 Issued
Array ( [id] => 96898 [patent_doc_number] => 07734911 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-06-08 [patent_title] => 'Secure login using augmented single factor split key asymmetric cryptography' [patent_app_type] => utility [patent_app_number] => 11/421080 [patent_app_country] => US [patent_app_date] => 2006-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 28349 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 299 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/734/07734911.pdf [firstpage_image] =>[orig_patent_app_number] => 11421080 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/421080
Secure login using augmented single factor split key asymmetric cryptography May 30, 2006 Issued
Array ( [id] => 4911348 [patent_doc_number] => 20080022115 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-01-24 [patent_title] => 'METHOD AND SYSTEM FOR ELECTRONIC GRAFFITI' [patent_app_type] => utility [patent_app_number] => 11/421252 [patent_app_country] => US [patent_app_date] => 2006-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 3438 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0022/20080022115.pdf [firstpage_image] =>[orig_patent_app_number] => 11421252 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/421252
METHOD AND SYSTEM FOR ELECTRONIC GRAFFITI May 30, 2006 Abandoned
Array ( [id] => 96901 [patent_doc_number] => 07734912 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-06-08 [patent_title] => 'Secure login using single factor split key asymmetric cryptography and an augmenting factor' [patent_app_type] => utility [patent_app_number] => 11/421088 [patent_app_country] => US [patent_app_date] => 2006-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 28473 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 285 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/734/07734912.pdf [firstpage_image] =>[orig_patent_app_number] => 11421088 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/421088
Secure login using single factor split key asymmetric cryptography and an augmenting factor May 30, 2006 Issued
Array ( [id] => 9062842 [patent_doc_number] => 08549295 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-10-01 [patent_title] => 'Establishing secure, mutually authenticated communication credentials' [patent_app_type] => utility [patent_app_number] => 11/421341 [patent_app_country] => US [patent_app_date] => 2006-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5010 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 385 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11421341 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/421341
Establishing secure, mutually authenticated communication credentials May 30, 2006 Issued
Array ( [id] => 7552262 [patent_doc_number] => 08064601 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2011-11-22 [patent_title] => 'Security in wireless communication systems' [patent_app_type] => utility [patent_app_number] => 11/396400 [patent_app_country] => US [patent_app_date] => 2006-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4844 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 90 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/064/08064601.pdf [firstpage_image] =>[orig_patent_app_number] => 11396400 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/396400
Security in wireless communication systems Mar 30, 2006 Issued
Array ( [id] => 5184679 [patent_doc_number] => 20070056033 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-03-08 [patent_title] => 'Platform configuration apparatus, systems, and methods' [patent_app_type] => utility [patent_app_number] => 11/396266 [patent_app_country] => US [patent_app_date] => 2006-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4900 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0056/20070056033.pdf [firstpage_image] =>[orig_patent_app_number] => 11396266 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/396266
Platform configuration apparatus, systems, and methods Mar 30, 2006 Abandoned
Array ( [id] => 5208598 [patent_doc_number] => 20070247182 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-10-25 [patent_title] => 'Protection of security key information' [patent_app_type] => utility [patent_app_number] => 11/395871 [patent_app_country] => US [patent_app_date] => 2006-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3747 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0247/20070247182.pdf [firstpage_image] =>[orig_patent_app_number] => 11395871 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/395871
Protection of security key information Mar 30, 2006 Abandoned
Array ( [id] => 9680893 [patent_doc_number] => 08819822 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-08-26 [patent_title] => 'Security method for detecting intrusions that exploit misinterpretation of supplied data' [patent_app_type] => utility [patent_app_number] => 11/395817 [patent_app_country] => US [patent_app_date] => 2006-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 10702 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 152 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11395817 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/395817
Security method for detecting intrusions that exploit misinterpretation of supplied data Mar 29, 2006 Issued
Array ( [id] => 8389014 [patent_doc_number] => 08266424 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-09-11 [patent_title] => 'Method and system for in-field recovery of security when a certificate authority has been compromised' [patent_app_type] => utility [patent_app_number] => 11/395588 [patent_app_country] => US [patent_app_date] => 2006-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 1 [patent_no_of_words] => 2112 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11395588 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/395588
Method and system for in-field recovery of security when a certificate authority has been compromised Mar 29, 2006 Issued
Array ( [id] => 7689615 [patent_doc_number] => 20070234418 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-10-04 [patent_title] => 'Method and apparatus of remote access message differentiation in VPN endpoint routers' [patent_app_type] => utility [patent_app_number] => 11/396020 [patent_app_country] => US [patent_app_date] => 2006-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2954 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0234/20070234418.pdf [firstpage_image] =>[orig_patent_app_number] => 11396020 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/396020
Method and apparatus of remote access message differentiation in VPN endpoint routers Mar 29, 2006 Abandoned
Array ( [id] => 5850177 [patent_doc_number] => 20060233368 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-10-19 [patent_title] => 'Method for conditional access in a DMTS/DOCSIS enabled set top box environment' [patent_app_type] => utility [patent_app_number] => 11/395589 [patent_app_country] => US [patent_app_date] => 2006-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2093 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0233/20060233368.pdf [firstpage_image] =>[orig_patent_app_number] => 11395589 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/395589
Method for conditional access in a DMTS/DOCSIS enabled set top box environment Mar 29, 2006 Abandoned
Array ( [id] => 10137836 [patent_doc_number] => 09171157 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-27 [patent_title] => 'Method and system for tracking access to application data and preventing data exploitation by malicious programs' [patent_app_type] => utility [patent_app_number] => 11/391017 [patent_app_country] => US [patent_app_date] => 2006-03-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 7 [patent_no_of_words] => 4842 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 363 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11391017 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/391017
Method and system for tracking access to application data and preventing data exploitation by malicious programs Mar 27, 2006 Issued
Array ( [id] => 7547927 [patent_doc_number] => 08055908 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-11-08 [patent_title] => 'Data transmission method and electronic device using the same' [patent_app_type] => utility [patent_app_number] => 11/391030 [patent_app_country] => US [patent_app_date] => 2006-03-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 4469 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 269 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/055/08055908.pdf [firstpage_image] =>[orig_patent_app_number] => 11391030 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/391030
Data transmission method and electronic device using the same Mar 27, 2006 Issued
Array ( [id] => 5065164 [patent_doc_number] => 20070226806 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-09-27 [patent_title] => 'Method and apparatus for enhancing cryptographic engines against security attacks' [patent_app_type] => utility [patent_app_number] => 11/390949 [patent_app_country] => US [patent_app_date] => 2006-03-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4539 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0226/20070226806.pdf [firstpage_image] =>[orig_patent_app_number] => 11390949 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/390949
Method and apparatus for enhancing cryptographic engines against security attacks Mar 26, 2006 Abandoned
Array ( [id] => 8861775 [patent_doc_number] => 08464329 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-06-11 [patent_title] => 'System and method for providing security for SIP-based communications' [patent_app_type] => utility [patent_app_number] => 11/357164 [patent_app_country] => US [patent_app_date] => 2006-02-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4092 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11357164 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/357164
System and method for providing security for SIP-based communications Feb 20, 2006 Issued
Array ( [id] => 5179168 [patent_doc_number] => 20070180228 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-08-02 [patent_title] => 'Dynamic loading of hardware security modules' [patent_app_type] => utility [patent_app_number] => 11/357351 [patent_app_country] => US [patent_app_date] => 2006-02-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 3432 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0180/20070180228.pdf [firstpage_image] =>[orig_patent_app_number] => 11357351 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/357351
Dynamic loading of hardware security modules Feb 16, 2006 Abandoned
Array ( [id] => 9586225 [patent_doc_number] => 08776237 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-07-08 [patent_title] => 'Method and apparatus for end-to-end security in a heterogeneous network' [patent_app_type] => utility [patent_app_number] => 11/356721 [patent_app_country] => US [patent_app_date] => 2006-02-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 2643 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 108 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11356721 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/356721
Method and apparatus for end-to-end security in a heterogeneous network Feb 16, 2006 Issued
Array ( [id] => 8799740 [patent_doc_number] => 08438629 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-05-07 [patent_title] => 'Packet security method and apparatus' [patent_app_type] => utility [patent_app_number] => 11/356138 [patent_app_country] => US [patent_app_date] => 2006-02-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3562 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 257 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11356138 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/356138
Packet security method and apparatus Feb 16, 2006 Issued
Array ( [id] => 5927943 [patent_doc_number] => 20060242412 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-10-26 [patent_title] => 'Method and communication system for configuring security information in WLAN' [patent_app_type] => utility [patent_app_number] => 11/355961 [patent_app_country] => US [patent_app_date] => 2006-02-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4971 [patent_no_of_claims] => 39 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0242/20060242412.pdf [firstpage_image] =>[orig_patent_app_number] => 11355961 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/355961
Method and communication system for configuring security information in WLAN Feb 16, 2006 Abandoned
Menu