Search

Brian D. Nguyen

Examiner (ID: 1057, Phone: (571)272-3084 , Office: P/2472 )

Most Active Art Unit
2472
Art Unit(s)
2475, 2416, 2661, 2616, 2732, 2472
Total Applications
2118
Issued Applications
1832
Pending Applications
159
Abandoned Applications
163

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 14922657 [patent_doc_number] => 10432664 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-10-01 [patent_title] => Systems and methods for identifying illegitimate activities based on graph-based distance metrics [patent_app_type] => utility [patent_app_number] => 15/582337 [patent_app_country] => US [patent_app_date] => 2017-04-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 12685 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 244 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15582337 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/582337
Systems and methods for identifying illegitimate activities based on graph-based distance metrics Apr 27, 2017 Issued
Array ( [id] => 12163584 [patent_doc_number] => 20180034851 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-02-01 [patent_title] => 'ELECTRONIC CONTROL APPARATUS' [patent_app_type] => utility [patent_app_number] => 15/497297 [patent_app_country] => US [patent_app_date] => 2017-04-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3167 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15497297 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/497297
ELECTRONIC CONTROL APPARATUS Apr 25, 2017 Abandoned
Array ( [id] => 15762545 [patent_doc_number] => 10623414 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-04-14 [patent_title] => Authenticating multi-facets of a user through unaware third-party services [patent_app_type] => utility [patent_app_number] => 15/497339 [patent_app_country] => US [patent_app_date] => 2017-04-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6966 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15497339 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/497339
Authenticating multi-facets of a user through unaware third-party services Apr 25, 2017 Issued
Array ( [id] => 16747464 [patent_doc_number] => 10972474 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-04-06 [patent_title] => Logical zones for IoT devices [patent_app_type] => utility [patent_app_number] => 15/490170 [patent_app_country] => US [patent_app_date] => 2017-04-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4232 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 347 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15490170 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/490170
Logical zones for IoT devices Apr 17, 2017 Issued
Array ( [id] => 15079909 [patent_doc_number] => 10469466 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-11-05 [patent_title] => Systems and methods for virtualization in distributed computing environment including a mobile monitor [patent_app_type] => utility [patent_app_number] => 15/485834 [patent_app_country] => US [patent_app_date] => 2017-04-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5263 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 253 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15485834 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/485834
Systems and methods for virtualization in distributed computing environment including a mobile monitor Apr 11, 2017 Issued
Array ( [id] => 13473081 [patent_doc_number] => 20180288083 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-10-04 [patent_title] => Comparing Metrics From Different Data Flows to Detect Flaws in Network Data Collection for Anomaly Detection [patent_app_type] => utility [patent_app_number] => 15/477910 [patent_app_country] => US [patent_app_date] => 2017-04-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4699 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 118 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15477910 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/477910
Comparing metrics from different data flows to detect flaws in network data collection for anomaly detection Apr 2, 2017 Issued
Array ( [id] => 15595059 [patent_doc_number] => 20200074064 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-03-05 [patent_title] => Verification Method, Mobile Terminal, Device, and System [patent_app_type] => utility [patent_app_number] => 16/479807 [patent_app_country] => US [patent_app_date] => 2017-03-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14990 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16479807 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/479807
Verification method, mobile terminal, device, and system Mar 19, 2017 Issued
Array ( [id] => 14803401 [patent_doc_number] => 10404716 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-09-03 [patent_title] => Data classification and access control for cloud based data [patent_app_type] => utility [patent_app_number] => 15/460101 [patent_app_country] => US [patent_app_date] => 2017-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6665 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 396 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15460101 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/460101
Data classification and access control for cloud based data Mar 14, 2017 Issued
Array ( [id] => 11719203 [patent_doc_number] => 20170187702 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-06-29 [patent_title] => 'CHAINING OF USE CASE-SPECIFIC ENTITY IDENTIFIERS' [patent_app_type] => utility [patent_app_number] => 15/455169 [patent_app_country] => US [patent_app_date] => 2017-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9405 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15455169 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/455169
Chaining of use case-specific entity identifiers Mar 9, 2017 Issued
Array ( [id] => 11946874 [patent_doc_number] => 20170251025 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-08-31 [patent_title] => 'SYSTEMS AND METHODS FOR DISTRIBUTED DATA SHARING WITH ASYNCHRONOUS THIRD-PARTY ATTESTATION' [patent_app_type] => utility [patent_app_number] => 15/443400 [patent_app_country] => US [patent_app_date] => 2017-02-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 14207 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15443400 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/443400
Systems and methods for distributed data sharing with asynchronous third-party attestation Feb 26, 2017 Issued
Array ( [id] => 11531464 [patent_doc_number] => 20170091442 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-03-30 [patent_title] => 'MANAGING A PASSWORD' [patent_app_type] => utility [patent_app_number] => 15/372813 [patent_app_country] => US [patent_app_date] => 2016-12-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8213 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15372813 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/372813
Managing a password Dec 7, 2016 Issued
Array ( [id] => 14953407 [patent_doc_number] => 10437968 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-10-08 [patent_title] => Secure DRM-agnostic key rotation [patent_app_type] => utility [patent_app_number] => 15/361904 [patent_app_country] => US [patent_app_date] => 2016-11-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9076 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 220 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15361904 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/361904
Secure DRM-agnostic key rotation Nov 27, 2016 Issued
Array ( [id] => 11953215 [patent_doc_number] => 20170257367 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-09-07 [patent_title] => 'ELECTRONIC DEVICES AND METHOD FOR PERFORMING AUTHENTICATION BETWEEN ELECTRONIC DEVICES' [patent_app_type] => utility [patent_app_number] => 15/360950 [patent_app_country] => US [patent_app_date] => 2016-11-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5818 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15360950 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/360950
ELECTRONIC DEVICES AND METHOD FOR PERFORMING AUTHENTICATION BETWEEN ELECTRONIC DEVICES Nov 22, 2016 Abandoned
Array ( [id] => 14802907 [patent_doc_number] => 10404468 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-09-03 [patent_title] => Technologies for CCM encryption with 64-bit block ciphers [patent_app_type] => utility [patent_app_number] => 15/351606 [patent_app_country] => US [patent_app_date] => 2016-11-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 7 [patent_no_of_words] => 7999 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 221 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15351606 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/351606
Technologies for CCM encryption with 64-bit block ciphers Nov 14, 2016 Issued
Array ( [id] => 14524029 [patent_doc_number] => 10339278 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-02 [patent_title] => Monitoring nearby mobile computing devices to prevent digital content misuse [patent_app_type] => utility [patent_app_number] => 15/344303 [patent_app_country] => US [patent_app_date] => 2016-11-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 39 [patent_figures_cnt] => 49 [patent_no_of_words] => 34553 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 303 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15344303 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/344303
Monitoring nearby mobile computing devices to prevent digital content misuse Nov 3, 2016 Issued
Array ( [id] => 12696781 [patent_doc_number] => 20180124093 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-05-03 [patent_title] => DETECTION OF VULNERABLE WIRELESS NETWORKS [patent_app_type] => utility [patent_app_number] => 15/339229 [patent_app_country] => US [patent_app_date] => 2016-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6199 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 118 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15339229 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/339229
Detection of vulnerable wireless networks Oct 30, 2016 Issued
Array ( [id] => 12592746 [patent_doc_number] => 20180089411 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-29 [patent_title] => Distributed Trust as Secondary Authentication Mechanism [patent_app_type] => utility [patent_app_number] => 15/277590 [patent_app_country] => US [patent_app_date] => 2016-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5643 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 126 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15277590 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/277590
Distributed trust as secondary authentication mechanism Sep 26, 2016 Issued
Array ( [id] => 18191601 [patent_doc_number] => 11582215 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-02-14 [patent_title] => Modifying security state with secured range detection [patent_app_type] => utility [patent_app_number] => 15/275203 [patent_app_country] => US [patent_app_date] => 2016-09-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 17 [patent_no_of_words] => 15607 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 109 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15275203 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/275203
Modifying security state with secured range detection Sep 22, 2016 Issued
Array ( [id] => 12237368 [patent_doc_number] => 20180070231 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-08 [patent_title] => 'METHOD AND DEVICE FOR FACILITATING AUTHENTICATION OVER A WIRELESS NETWORK' [patent_app_type] => utility [patent_app_number] => 15/256347 [patent_app_country] => US [patent_app_date] => 2016-09-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 11815 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15256347 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/256347
Method and device for facilitating authentication over a wireless network Sep 1, 2016 Issued
Array ( [id] => 16846934 [patent_doc_number] => 11019045 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-05-25 [patent_title] => Secure group communication [patent_app_type] => utility [patent_app_number] => 15/738318 [patent_app_country] => US [patent_app_date] => 2016-07-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 14 [patent_no_of_words] => 10375 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 415 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15738318 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/738318
Secure group communication Jul 5, 2016 Issued
Menu