
Brian D. Nguyen
Examiner (ID: 1057, Phone: (571)272-3084 , Office: P/2472 )
| Most Active Art Unit | 2472 |
| Art Unit(s) | 2475, 2416, 2661, 2616, 2732, 2472 |
| Total Applications | 2118 |
| Issued Applications | 1832 |
| Pending Applications | 159 |
| Abandoned Applications | 163 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14922657
[patent_doc_number] => 10432664
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-01
[patent_title] => Systems and methods for identifying illegitimate activities based on graph-based distance metrics
[patent_app_type] => utility
[patent_app_number] => 15/582337
[patent_app_country] => US
[patent_app_date] => 2017-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12685
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 244
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15582337
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/582337 | Systems and methods for identifying illegitimate activities based on graph-based distance metrics | Apr 27, 2017 | Issued |
Array
(
[id] => 12163584
[patent_doc_number] => 20180034851
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'ELECTRONIC CONTROL APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 15/497297
[patent_app_country] => US
[patent_app_date] => 2017-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3167
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15497297
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/497297 | ELECTRONIC CONTROL APPARATUS | Apr 25, 2017 | Abandoned |
Array
(
[id] => 15762545
[patent_doc_number] => 10623414
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-14
[patent_title] => Authenticating multi-facets of a user through unaware third-party services
[patent_app_type] => utility
[patent_app_number] => 15/497339
[patent_app_country] => US
[patent_app_date] => 2017-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6966
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15497339
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/497339 | Authenticating multi-facets of a user through unaware third-party services | Apr 25, 2017 | Issued |
Array
(
[id] => 16747464
[patent_doc_number] => 10972474
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-06
[patent_title] => Logical zones for IoT devices
[patent_app_type] => utility
[patent_app_number] => 15/490170
[patent_app_country] => US
[patent_app_date] => 2017-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4232
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 347
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15490170
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/490170 | Logical zones for IoT devices | Apr 17, 2017 | Issued |
Array
(
[id] => 15079909
[patent_doc_number] => 10469466
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-05
[patent_title] => Systems and methods for virtualization in distributed computing environment including a mobile monitor
[patent_app_type] => utility
[patent_app_number] => 15/485834
[patent_app_country] => US
[patent_app_date] => 2017-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5263
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15485834
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/485834 | Systems and methods for virtualization in distributed computing environment including a mobile monitor | Apr 11, 2017 | Issued |
Array
(
[id] => 13473081
[patent_doc_number] => 20180288083
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-04
[patent_title] => Comparing Metrics From Different Data Flows to Detect Flaws in Network Data Collection for Anomaly Detection
[patent_app_type] => utility
[patent_app_number] => 15/477910
[patent_app_country] => US
[patent_app_date] => 2017-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4699
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15477910
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/477910 | Comparing metrics from different data flows to detect flaws in network data collection for anomaly detection | Apr 2, 2017 | Issued |
Array
(
[id] => 15595059
[patent_doc_number] => 20200074064
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => Verification Method, Mobile Terminal, Device, and System
[patent_app_type] => utility
[patent_app_number] => 16/479807
[patent_app_country] => US
[patent_app_date] => 2017-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14990
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16479807
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/479807 | Verification method, mobile terminal, device, and system | Mar 19, 2017 | Issued |
Array
(
[id] => 14803401
[patent_doc_number] => 10404716
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-03
[patent_title] => Data classification and access control for cloud based data
[patent_app_type] => utility
[patent_app_number] => 15/460101
[patent_app_country] => US
[patent_app_date] => 2017-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6665
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 396
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15460101
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/460101 | Data classification and access control for cloud based data | Mar 14, 2017 | Issued |
Array
(
[id] => 11719203
[patent_doc_number] => 20170187702
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-29
[patent_title] => 'CHAINING OF USE CASE-SPECIFIC ENTITY IDENTIFIERS'
[patent_app_type] => utility
[patent_app_number] => 15/455169
[patent_app_country] => US
[patent_app_date] => 2017-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9405
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15455169
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/455169 | Chaining of use case-specific entity identifiers | Mar 9, 2017 | Issued |
Array
(
[id] => 11946874
[patent_doc_number] => 20170251025
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-31
[patent_title] => 'SYSTEMS AND METHODS FOR DISTRIBUTED DATA SHARING WITH ASYNCHRONOUS THIRD-PARTY ATTESTATION'
[patent_app_type] => utility
[patent_app_number] => 15/443400
[patent_app_country] => US
[patent_app_date] => 2017-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 14207
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15443400
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/443400 | Systems and methods for distributed data sharing with asynchronous third-party attestation | Feb 26, 2017 | Issued |
Array
(
[id] => 11531464
[patent_doc_number] => 20170091442
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'MANAGING A PASSWORD'
[patent_app_type] => utility
[patent_app_number] => 15/372813
[patent_app_country] => US
[patent_app_date] => 2016-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8213
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15372813
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/372813 | Managing a password | Dec 7, 2016 | Issued |
Array
(
[id] => 14953407
[patent_doc_number] => 10437968
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-08
[patent_title] => Secure DRM-agnostic key rotation
[patent_app_type] => utility
[patent_app_number] => 15/361904
[patent_app_country] => US
[patent_app_date] => 2016-11-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9076
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15361904
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/361904 | Secure DRM-agnostic key rotation | Nov 27, 2016 | Issued |
Array
(
[id] => 11953215
[patent_doc_number] => 20170257367
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-07
[patent_title] => 'ELECTRONIC DEVICES AND METHOD FOR PERFORMING AUTHENTICATION BETWEEN ELECTRONIC DEVICES'
[patent_app_type] => utility
[patent_app_number] => 15/360950
[patent_app_country] => US
[patent_app_date] => 2016-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5818
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15360950
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/360950 | ELECTRONIC DEVICES AND METHOD FOR PERFORMING AUTHENTICATION BETWEEN ELECTRONIC DEVICES | Nov 22, 2016 | Abandoned |
Array
(
[id] => 14802907
[patent_doc_number] => 10404468
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-03
[patent_title] => Technologies for CCM encryption with 64-bit block ciphers
[patent_app_type] => utility
[patent_app_number] => 15/351606
[patent_app_country] => US
[patent_app_date] => 2016-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 7999
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15351606
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/351606 | Technologies for CCM encryption with 64-bit block ciphers | Nov 14, 2016 | Issued |
Array
(
[id] => 14524029
[patent_doc_number] => 10339278
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-02
[patent_title] => Monitoring nearby mobile computing devices to prevent digital content misuse
[patent_app_type] => utility
[patent_app_number] => 15/344303
[patent_app_country] => US
[patent_app_date] => 2016-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 39
[patent_figures_cnt] => 49
[patent_no_of_words] => 34553
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 303
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15344303
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/344303 | Monitoring nearby mobile computing devices to prevent digital content misuse | Nov 3, 2016 | Issued |
Array
(
[id] => 12696781
[patent_doc_number] => 20180124093
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-03
[patent_title] => DETECTION OF VULNERABLE WIRELESS NETWORKS
[patent_app_type] => utility
[patent_app_number] => 15/339229
[patent_app_country] => US
[patent_app_date] => 2016-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6199
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15339229
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/339229 | Detection of vulnerable wireless networks | Oct 30, 2016 | Issued |
Array
(
[id] => 12592746
[patent_doc_number] => 20180089411
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-29
[patent_title] => Distributed Trust as Secondary Authentication Mechanism
[patent_app_type] => utility
[patent_app_number] => 15/277590
[patent_app_country] => US
[patent_app_date] => 2016-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5643
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15277590
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/277590 | Distributed trust as secondary authentication mechanism | Sep 26, 2016 | Issued |
Array
(
[id] => 18191601
[patent_doc_number] => 11582215
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-02-14
[patent_title] => Modifying security state with secured range detection
[patent_app_type] => utility
[patent_app_number] => 15/275203
[patent_app_country] => US
[patent_app_date] => 2016-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 17
[patent_no_of_words] => 15607
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15275203
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/275203 | Modifying security state with secured range detection | Sep 22, 2016 | Issued |
Array
(
[id] => 12237368
[patent_doc_number] => 20180070231
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-08
[patent_title] => 'METHOD AND DEVICE FOR FACILITATING AUTHENTICATION OVER A WIRELESS NETWORK'
[patent_app_type] => utility
[patent_app_number] => 15/256347
[patent_app_country] => US
[patent_app_date] => 2016-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 11815
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15256347
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/256347 | Method and device for facilitating authentication over a wireless network | Sep 1, 2016 | Issued |
Array
(
[id] => 16846934
[patent_doc_number] => 11019045
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-25
[patent_title] => Secure group communication
[patent_app_type] => utility
[patent_app_number] => 15/738318
[patent_app_country] => US
[patent_app_date] => 2016-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 14
[patent_no_of_words] => 10375
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 415
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15738318
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/738318 | Secure group communication | Jul 5, 2016 | Issued |