
William E. Terrell
Examiner (ID: 4371)
| Most Active Art Unit | 3203 |
| Art Unit(s) | 3201, 3203, SIR, 3101, 2899, 3651 |
| Total Applications | 919 |
| Issued Applications | 833 |
| Pending Applications | 4 |
| Abandoned Applications | 82 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 7358818
[patent_doc_number] => 20040250070
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-12-09
[patent_title] => 'Authentication of electronic documents'
[patent_app_type] => new
[patent_app_number] => 10/488561
[patent_app_country] => US
[patent_app_date] => 2004-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 2842
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 53
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0250/20040250070.pdf
[firstpage_image] =>[orig_patent_app_number] => 10488561
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/488561 | Authentication of electronic documents | Feb 29, 2004 | Abandoned |
Array
(
[id] => 7149193
[patent_doc_number] => 20050120279
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-06-02
[patent_title] => 'Storage subsystem, storage system, and communication control method'
[patent_app_type] => utility
[patent_app_number] => 10/791452
[patent_app_country] => US
[patent_app_date] => 2004-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8726
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 11
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0120/20050120279.pdf
[firstpage_image] =>[orig_patent_app_number] => 10791452
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/791452 | Storage subsystem, storage system, and communication control method | Feb 29, 2004 | Abandoned |
Array
(
[id] => 912763
[patent_doc_number] => 07334268
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-02-19
[patent_title] => 'Method and apparatus for data files used in the transmission of information'
[patent_app_type] => utility
[patent_app_number] => 10/504558
[patent_app_country] => US
[patent_app_date] => 2004-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 4239
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/334/07334268.pdf
[firstpage_image] =>[orig_patent_app_number] => 10504558
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/504558 | Method and apparatus for data files used in the transmission of information | Feb 18, 2004 | Issued |
Array
(
[id] => 867234
[patent_doc_number] => 07369661
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-05-06
[patent_title] => 'Method and apparatus for detection of loss of cipher synchronization'
[patent_app_type] => utility
[patent_app_number] => 10/769253
[patent_app_country] => US
[patent_app_date] => 2004-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3257
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/369/07369661.pdf
[firstpage_image] =>[orig_patent_app_number] => 10769253
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/769253 | Method and apparatus for detection of loss of cipher synchronization | Jan 29, 2004 | Issued |
Array
(
[id] => 7177895
[patent_doc_number] => 20050204128
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-09-15
[patent_title] => 'System and method for n-way authentication in a network'
[patent_app_type] => utility
[patent_app_number] => 10/766060
[patent_app_country] => US
[patent_app_date] => 2004-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9335
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0204/20050204128.pdf
[firstpage_image] =>[orig_patent_app_number] => 10766060
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/766060 | System and method for n-way authentication in a network | Jan 27, 2004 | Issued |
Array
(
[id] => 284315
[patent_doc_number] => 07555772
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-06-30
[patent_title] => 'Wireless firewall with tear down messaging'
[patent_app_type] => utility
[patent_app_number] => 10/765676
[patent_app_country] => US
[patent_app_date] => 2004-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5112
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/555/07555772.pdf
[firstpage_image] =>[orig_patent_app_number] => 10765676
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/765676 | Wireless firewall with tear down messaging | Jan 25, 2004 | Issued |
Array
(
[id] => 7190910
[patent_doc_number] => 20050163317
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-07-28
[patent_title] => 'Method and apparatus for initializing multiple security modules'
[patent_app_type] => utility
[patent_app_number] => 10/764966
[patent_app_country] => US
[patent_app_date] => 2004-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6071
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0163/20050163317.pdf
[firstpage_image] =>[orig_patent_app_number] => 10764966
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/764966 | Method and apparatus for initializing multiple security modules | Jan 25, 2004 | Issued |
Array
(
[id] => 340763
[patent_doc_number] => 07506371
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2009-03-17
[patent_title] => 'System and methods for adaptive behavior based access control'
[patent_app_type] => utility
[patent_app_number] => 10/762660
[patent_app_country] => US
[patent_app_date] => 2004-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9361
[patent_no_of_claims] => 41
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/506/07506371.pdf
[firstpage_image] =>[orig_patent_app_number] => 10762660
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/762660 | System and methods for adaptive behavior based access control | Jan 21, 2004 | Issued |
Array
(
[id] => 6990133
[patent_doc_number] => 20050089170
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-04-28
[patent_title] => 'System for providing keys'
[patent_app_type] => utility
[patent_app_number] => 10/760952
[patent_app_country] => US
[patent_app_date] => 2004-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5153
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0089/20050089170.pdf
[firstpage_image] =>[orig_patent_app_number] => 10760952
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/760952 | System for providing keys | Jan 19, 2004 | Issued |
Array
(
[id] => 355986
[patent_doc_number] => 07493658
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-02-17
[patent_title] => 'System for and method of detecting malware in macros and executable scripts'
[patent_app_type] => utility
[patent_app_number] => 10/500952
[patent_app_country] => US
[patent_app_date] => 2004-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 2655
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/493/07493658.pdf
[firstpage_image] =>[orig_patent_app_number] => 10500952
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/500952 | System for and method of detecting malware in macros and executable scripts | Jan 18, 2004 | Issued |
Array
(
[id] => 7154390
[patent_doc_number] => 20040172551
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-09-02
[patent_title] => 'First response computer virus blocking.'
[patent_app_type] => new
[patent_app_number] => 10/707363
[patent_app_country] => US
[patent_app_date] => 2003-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2929
[patent_no_of_claims] => 49
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 45
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0172/20040172551.pdf
[firstpage_image] =>[orig_patent_app_number] => 10707363
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/707363 | First response computer virus blocking. | Dec 8, 2003 | Abandoned |
Array
(
[id] => 7030684
[patent_doc_number] => 20050022016
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-01-27
[patent_title] => 'Method of and system for heuristically detecting viruses in executable code'
[patent_app_type] => utility
[patent_app_number] => 10/500953
[patent_app_country] => US
[patent_app_date] => 2003-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3129
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0022/20050022016.pdf
[firstpage_image] =>[orig_patent_app_number] => 10500953
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/500953 | Method of and system for heuristically detecting viruses in executable code | Dec 7, 2003 | Issued |
Array
(
[id] => 175615
[patent_doc_number] => 07660998
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-02-09
[patent_title] => 'Relatively unique ID in integrated circuit'
[patent_app_type] => utility
[patent_app_number] => 10/727158
[patent_app_country] => US
[patent_app_date] => 2003-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 331
[patent_figures_cnt] => 413
[patent_no_of_words] => 374126
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/660/07660998.pdf
[firstpage_image] =>[orig_patent_app_number] => 10727158
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/727158 | Relatively unique ID in integrated circuit | Dec 1, 2003 | Issued |
Array
(
[id] => 7148932
[patent_doc_number] => 20050120206
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-06-02
[patent_title] => 'Method and system for rule-based certificate validation'
[patent_app_type] => utility
[patent_app_number] => 10/726751
[patent_app_country] => US
[patent_app_date] => 2003-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1542
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0120/20050120206.pdf
[firstpage_image] =>[orig_patent_app_number] => 10726751
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/726751 | Method and system for rule-based certificate validation | Dec 1, 2003 | Abandoned |
Array
(
[id] => 7158097
[patent_doc_number] => 20050084097
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-04-21
[patent_title] => 'APPARATUS AND METHOD FOR CALCULATINGTKIP SBOX VALUE'
[patent_app_type] => utility
[patent_app_number] => 10/605659
[patent_app_country] => US
[patent_app_date] => 2003-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2726
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0084/20050084097.pdf
[firstpage_image] =>[orig_patent_app_number] => 10605659
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/605659 | APPARATUS AND METHOD FOR CALCULATINGTKIP SBOX VALUE | Oct 15, 2003 | Abandoned |
Array
(
[id] => 823732
[patent_doc_number] => 07409718
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2008-08-05
[patent_title] => 'Method of decrypting and analyzing encrypted malicious scripts'
[patent_app_type] => utility
[patent_app_number] => 10/685153
[patent_app_country] => US
[patent_app_date] => 2003-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 4564
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 362
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/409/07409718.pdf
[firstpage_image] =>[orig_patent_app_number] => 10685153
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/685153 | Method of decrypting and analyzing encrypted malicious scripts | Oct 13, 2003 | Issued |
Array
(
[id] => 7222889
[patent_doc_number] => 20050055561
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-03-10
[patent_title] => 'Data carrier'
[patent_app_type] => utility
[patent_app_number] => 10/667567
[patent_app_country] => US
[patent_app_date] => 2003-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1092
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0055/20050055561.pdf
[firstpage_image] =>[orig_patent_app_number] => 10667567
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/667567 | Data carrier | Sep 21, 2003 | Abandoned |
Array
(
[id] => 265689
[patent_doc_number] => 07571463
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2009-08-04
[patent_title] => 'Method an apparatus for providing a scalable and secure network without point to point associations'
[patent_app_type] => utility
[patent_app_number] => 10/661959
[patent_app_country] => US
[patent_app_date] => 2003-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 19
[patent_no_of_words] => 9043
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 350
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/571/07571463.pdf
[firstpage_image] =>[orig_patent_app_number] => 10661959
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/661959 | Method an apparatus for providing a scalable and secure network without point to point associations | Sep 11, 2003 | Issued |
Array
(
[id] => 587959
[patent_doc_number] => 07467417
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-12-16
[patent_title] => 'Active verification of boot firmware'
[patent_app_type] => utility
[patent_app_number] => 10/656751
[patent_app_country] => US
[patent_app_date] => 2003-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7283
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/467/07467417.pdf
[firstpage_image] =>[orig_patent_app_number] => 10656751
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/656751 | Active verification of boot firmware | Sep 3, 2003 | Issued |
Array
(
[id] => 7309131
[patent_doc_number] => 20040117623
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-06-17
[patent_title] => 'Methods and apparatus for secure data communication links'
[patent_app_type] => new
[patent_app_number] => 10/650755
[patent_app_country] => US
[patent_app_date] => 2003-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11659
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 11
[patent_words_short_claim] => 17
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0117/20040117623.pdf
[firstpage_image] =>[orig_patent_app_number] => 10650755
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/650755 | Methods and apparatus for secure data communication links | Aug 28, 2003 | Abandoned |