Search

William E. Terrell

Examiner (ID: 4371)

Most Active Art Unit
3203
Art Unit(s)
3201, 3203, SIR, 3101, 2899, 3651
Total Applications
919
Issued Applications
833
Pending Applications
4
Abandoned Applications
82

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 7358818 [patent_doc_number] => 20040250070 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-12-09 [patent_title] => 'Authentication of electronic documents' [patent_app_type] => new [patent_app_number] => 10/488561 [patent_app_country] => US [patent_app_date] => 2004-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 2842 [patent_no_of_claims] => 31 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 53 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0250/20040250070.pdf [firstpage_image] =>[orig_patent_app_number] => 10488561 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/488561
Authentication of electronic documents Feb 29, 2004 Abandoned
Array ( [id] => 7149193 [patent_doc_number] => 20050120279 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-06-02 [patent_title] => 'Storage subsystem, storage system, and communication control method' [patent_app_type] => utility [patent_app_number] => 10/791452 [patent_app_country] => US [patent_app_date] => 2004-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8726 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 11 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0120/20050120279.pdf [firstpage_image] =>[orig_patent_app_number] => 10791452 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/791452
Storage subsystem, storage system, and communication control method Feb 29, 2004 Abandoned
Array ( [id] => 912763 [patent_doc_number] => 07334268 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2008-02-19 [patent_title] => 'Method and apparatus for data files used in the transmission of information' [patent_app_type] => utility [patent_app_number] => 10/504558 [patent_app_country] => US [patent_app_date] => 2004-02-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 4239 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 117 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/334/07334268.pdf [firstpage_image] =>[orig_patent_app_number] => 10504558 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/504558
Method and apparatus for data files used in the transmission of information Feb 18, 2004 Issued
Array ( [id] => 867234 [patent_doc_number] => 07369661 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2008-05-06 [patent_title] => 'Method and apparatus for detection of loss of cipher synchronization' [patent_app_type] => utility [patent_app_number] => 10/769253 [patent_app_country] => US [patent_app_date] => 2004-01-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3257 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 156 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/369/07369661.pdf [firstpage_image] =>[orig_patent_app_number] => 10769253 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/769253
Method and apparatus for detection of loss of cipher synchronization Jan 29, 2004 Issued
Array ( [id] => 7177895 [patent_doc_number] => 20050204128 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-09-15 [patent_title] => 'System and method for n-way authentication in a network' [patent_app_type] => utility [patent_app_number] => 10/766060 [patent_app_country] => US [patent_app_date] => 2004-01-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 9335 [patent_no_of_claims] => 45 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0204/20050204128.pdf [firstpage_image] =>[orig_patent_app_number] => 10766060 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/766060
System and method for n-way authentication in a network Jan 27, 2004 Issued
Array ( [id] => 284315 [patent_doc_number] => 07555772 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2009-06-30 [patent_title] => 'Wireless firewall with tear down messaging' [patent_app_type] => utility [patent_app_number] => 10/765676 [patent_app_country] => US [patent_app_date] => 2004-01-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5112 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/555/07555772.pdf [firstpage_image] =>[orig_patent_app_number] => 10765676 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/765676
Wireless firewall with tear down messaging Jan 25, 2004 Issued
Array ( [id] => 7190910 [patent_doc_number] => 20050163317 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-07-28 [patent_title] => 'Method and apparatus for initializing multiple security modules' [patent_app_type] => utility [patent_app_number] => 10/764966 [patent_app_country] => US [patent_app_date] => 2004-01-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6071 [patent_no_of_claims] => 37 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0163/20050163317.pdf [firstpage_image] =>[orig_patent_app_number] => 10764966 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/764966
Method and apparatus for initializing multiple security modules Jan 25, 2004 Issued
Array ( [id] => 340763 [patent_doc_number] => 07506371 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2009-03-17 [patent_title] => 'System and methods for adaptive behavior based access control' [patent_app_type] => utility [patent_app_number] => 10/762660 [patent_app_country] => US [patent_app_date] => 2004-01-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9361 [patent_no_of_claims] => 41 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 124 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/506/07506371.pdf [firstpage_image] =>[orig_patent_app_number] => 10762660 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/762660
System and methods for adaptive behavior based access control Jan 21, 2004 Issued
Array ( [id] => 6990133 [patent_doc_number] => 20050089170 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-04-28 [patent_title] => 'System for providing keys' [patent_app_type] => utility [patent_app_number] => 10/760952 [patent_app_country] => US [patent_app_date] => 2004-01-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5153 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0089/20050089170.pdf [firstpage_image] =>[orig_patent_app_number] => 10760952 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/760952
System for providing keys Jan 19, 2004 Issued
Array ( [id] => 355986 [patent_doc_number] => 07493658 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2009-02-17 [patent_title] => 'System for and method of detecting malware in macros and executable scripts' [patent_app_type] => utility [patent_app_number] => 10/500952 [patent_app_country] => US [patent_app_date] => 2004-01-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 1 [patent_no_of_words] => 2655 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 110 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/493/07493658.pdf [firstpage_image] =>[orig_patent_app_number] => 10500952 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/500952
System for and method of detecting malware in macros and executable scripts Jan 18, 2004 Issued
Array ( [id] => 7154390 [patent_doc_number] => 20040172551 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-09-02 [patent_title] => 'First response computer virus blocking.' [patent_app_type] => new [patent_app_number] => 10/707363 [patent_app_country] => US [patent_app_date] => 2003-12-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2929 [patent_no_of_claims] => 49 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 45 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0172/20040172551.pdf [firstpage_image] =>[orig_patent_app_number] => 10707363 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/707363
First response computer virus blocking. Dec 8, 2003 Abandoned
Array ( [id] => 7030684 [patent_doc_number] => 20050022016 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-01-27 [patent_title] => 'Method of and system for heuristically detecting viruses in executable code' [patent_app_type] => utility [patent_app_number] => 10/500953 [patent_app_country] => US [patent_app_date] => 2003-12-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3129 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0022/20050022016.pdf [firstpage_image] =>[orig_patent_app_number] => 10500953 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/500953
Method of and system for heuristically detecting viruses in executable code Dec 7, 2003 Issued
Array ( [id] => 175615 [patent_doc_number] => 07660998 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-02-09 [patent_title] => 'Relatively unique ID in integrated circuit' [patent_app_type] => utility [patent_app_number] => 10/727158 [patent_app_country] => US [patent_app_date] => 2003-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 331 [patent_figures_cnt] => 413 [patent_no_of_words] => 374126 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 99 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/660/07660998.pdf [firstpage_image] =>[orig_patent_app_number] => 10727158 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/727158
Relatively unique ID in integrated circuit Dec 1, 2003 Issued
Array ( [id] => 7148932 [patent_doc_number] => 20050120206 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-06-02 [patent_title] => 'Method and system for rule-based certificate validation' [patent_app_type] => utility [patent_app_number] => 10/726751 [patent_app_country] => US [patent_app_date] => 2003-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 1542 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0120/20050120206.pdf [firstpage_image] =>[orig_patent_app_number] => 10726751 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/726751
Method and system for rule-based certificate validation Dec 1, 2003 Abandoned
Array ( [id] => 7158097 [patent_doc_number] => 20050084097 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-04-21 [patent_title] => 'APPARATUS AND METHOD FOR CALCULATINGTKIP SBOX VALUE' [patent_app_type] => utility [patent_app_number] => 10/605659 [patent_app_country] => US [patent_app_date] => 2003-10-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2726 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0084/20050084097.pdf [firstpage_image] =>[orig_patent_app_number] => 10605659 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/605659
APPARATUS AND METHOD FOR CALCULATINGTKIP SBOX VALUE Oct 15, 2003 Abandoned
Array ( [id] => 823732 [patent_doc_number] => 07409718 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2008-08-05 [patent_title] => 'Method of decrypting and analyzing encrypted malicious scripts' [patent_app_type] => utility [patent_app_number] => 10/685153 [patent_app_country] => US [patent_app_date] => 2003-10-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 4564 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 362 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/409/07409718.pdf [firstpage_image] =>[orig_patent_app_number] => 10685153 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/685153
Method of decrypting and analyzing encrypted malicious scripts Oct 13, 2003 Issued
Array ( [id] => 7222889 [patent_doc_number] => 20050055561 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-03-10 [patent_title] => 'Data carrier' [patent_app_type] => utility [patent_app_number] => 10/667567 [patent_app_country] => US [patent_app_date] => 2003-09-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 1092 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0055/20050055561.pdf [firstpage_image] =>[orig_patent_app_number] => 10667567 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/667567
Data carrier Sep 21, 2003 Abandoned
Array ( [id] => 265689 [patent_doc_number] => 07571463 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2009-08-04 [patent_title] => 'Method an apparatus for providing a scalable and secure network without point to point associations' [patent_app_type] => utility [patent_app_number] => 10/661959 [patent_app_country] => US [patent_app_date] => 2003-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 19 [patent_no_of_words] => 9043 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 350 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/571/07571463.pdf [firstpage_image] =>[orig_patent_app_number] => 10661959 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/661959
Method an apparatus for providing a scalable and secure network without point to point associations Sep 11, 2003 Issued
Array ( [id] => 587959 [patent_doc_number] => 07467417 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2008-12-16 [patent_title] => 'Active verification of boot firmware' [patent_app_type] => utility [patent_app_number] => 10/656751 [patent_app_country] => US [patent_app_date] => 2003-09-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7283 [patent_no_of_claims] => 36 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 180 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/467/07467417.pdf [firstpage_image] =>[orig_patent_app_number] => 10656751 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/656751
Active verification of boot firmware Sep 3, 2003 Issued
Array ( [id] => 7309131 [patent_doc_number] => 20040117623 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-06-17 [patent_title] => 'Methods and apparatus for secure data communication links' [patent_app_type] => new [patent_app_number] => 10/650755 [patent_app_country] => US [patent_app_date] => 2003-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 11659 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 11 [patent_words_short_claim] => 17 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0117/20040117623.pdf [firstpage_image] =>[orig_patent_app_number] => 10650755 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/650755
Methods and apparatus for secure data communication links Aug 28, 2003 Abandoned
Menu