
Brian T. Le
Examiner (ID: 15317, Phone: (571)270-5615 , Office: P/2469 )
| Most Active Art Unit | 2469 |
| Art Unit(s) | 2479, 2469 |
| Total Applications | 509 |
| Issued Applications | 386 |
| Pending Applications | 64 |
| Abandoned Applications | 75 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11368052
[patent_doc_number] => 20170006034
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'Method and system for internetwork communication with machine devices'
[patent_app_type] => utility
[patent_app_number] => 15/093560
[patent_app_country] => US
[patent_app_date] => 2016-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 16523
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15093560
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/093560 | Method and system for internetwork communication with machine devices | Apr 6, 2016 | Issued |
Array
(
[id] => 13895669
[patent_doc_number] => 10200396
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-02-05
[patent_title] => Monitoring packet routes
[patent_app_type] => utility
[patent_app_number] => 15/091520
[patent_app_country] => US
[patent_app_date] => 2016-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 6610
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15091520
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/091520 | Monitoring packet routes | Apr 4, 2016 | Issued |
Array
(
[id] => 11682307
[patent_doc_number] => 09680857
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-06-13
[patent_title] => 'Cyber intelligence clearinghouse'
[patent_app_type] => utility
[patent_app_number] => 15/088367
[patent_app_country] => US
[patent_app_date] => 2016-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6026
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15088367
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/088367 | Cyber intelligence clearinghouse | Mar 31, 2016 | Issued |
Array
(
[id] => 12224731
[patent_doc_number] => 20180063092
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-01
[patent_title] => 'SYSTEM AND METHOD FOR DELEGATION OF CLOUD COMPUTING PROCESSES'
[patent_app_type] => utility
[patent_app_number] => 15/558031
[patent_app_country] => US
[patent_app_date] => 2016-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8475
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15558031
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/558031 | SYSTEM AND METHOD FOR DELEGATION OF CLOUD COMPUTING PROCESSES | Mar 30, 2016 | Pending |
Array
(
[id] => 15013347
[patent_doc_number] => 10452821
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Tiered code obfuscation in a development environment
[patent_app_type] => utility
[patent_app_number] => 15/085070
[patent_app_country] => US
[patent_app_date] => 2016-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8711
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15085070
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/085070 | Tiered code obfuscation in a development environment | Mar 29, 2016 | Issued |
Array
(
[id] => 17004010
[patent_doc_number] => 11082849
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-03
[patent_title] => Validating authorization for use of a set of features of a device
[patent_app_type] => utility
[patent_app_number] => 15/082919
[patent_app_country] => US
[patent_app_date] => 2016-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 28663
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 228
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15082919
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/082919 | Validating authorization for use of a set of features of a device | Mar 27, 2016 | Issued |
Array
(
[id] => 12598461
[patent_doc_number] => 20180091317
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-29
[patent_title] => EMBEDDING PROTECTED MEMORY ACCESS INTO A RFID AUTHENTICATION PROCESS BASED ON A CHALLENGE-RESPONSE MECHANISM
[patent_app_type] => utility
[patent_app_number] => 15/561714
[patent_app_country] => US
[patent_app_date] => 2016-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8124
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15561714
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/561714 | Embedding protected memory access into a RFID authentication process based on a challenge-response mechanism | Mar 22, 2016 | Issued |
Array
(
[id] => 11384927
[patent_doc_number] => 20170010982
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-12
[patent_title] => 'SECURE HANDLING OF MEMORY CACHES AND CACHED SOFTWARE MODULE IDENTITIES FOR A METHOD TO ISOLATE SOFTWARE MODULES BY MEANS OF CONTROLLED ENCRYPTION KEY MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 15/070947
[patent_app_country] => US
[patent_app_date] => 2016-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 21814
[patent_no_of_claims] => 42
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15070947
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/070947 | Secure handling of memory caches and cached software module identities for a method to isolate software modules by means of controlled encryption key management | Mar 14, 2016 | Issued |
Array
(
[id] => 13147657
[patent_doc_number] => 10091175
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-02
[patent_title] => Authenticating a device in a network
[patent_app_type] => utility
[patent_app_number] => 15/057809
[patent_app_country] => US
[patent_app_date] => 2016-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 8468
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 276
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15057809
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/057809 | Authenticating a device in a network | Feb 29, 2016 | Issued |
Array
(
[id] => 11592021
[patent_doc_number] => 20170116432
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-27
[patent_title] => 'SYSTEM AND METHODS FOR CYBER-AND-PHYSICALLY-SECURE HIGH GRADE WEAPONRY'
[patent_app_type] => utility
[patent_app_number] => 15/004056
[patent_app_country] => US
[patent_app_date] => 2016-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7002
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15004056
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/004056 | SYSTEM AND METHODS FOR CYBER-AND-PHYSICALLY-SECURE HIGH GRADE WEAPONRY | Jan 21, 2016 | Abandoned |
Array
(
[id] => 11044596
[patent_doc_number] => 20160241553
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-18
[patent_title] => 'WEARABLE DEVICE AND OPERATING METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 15/002540
[patent_app_country] => US
[patent_app_date] => 2016-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 10830
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15002540
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/002540 | WEARABLE DEVICE AND OPERATING METHOD THEREOF | Jan 20, 2016 | Abandoned |
Array
(
[id] => 17848929
[patent_doc_number] => 11438321
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-06
[patent_title] => Method and apparatus for trust based authentication in SDN clustering
[patent_app_type] => utility
[patent_app_number] => 16/060997
[patent_app_country] => US
[patent_app_date] => 2016-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 6913
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16060997
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/060997 | Method and apparatus for trust based authentication in SDN clustering | Jan 12, 2016 | Issued |
Array
(
[id] => 11933407
[patent_doc_number] => 09800416
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-24
[patent_title] => 'Distributed validation of digitally signed electronic documents'
[patent_app_type] => utility
[patent_app_number] => 14/992986
[patent_app_country] => US
[patent_app_date] => 2016-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 11661
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14992986
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/992986 | Distributed validation of digitally signed electronic documents | Jan 10, 2016 | Issued |
Array
(
[id] => 11733893
[patent_doc_number] => 20170195336
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-06
[patent_title] => 'Method and System for Non-Authoritative Identity and Identity Permissions Broker and Use Thereof'
[patent_app_type] => utility
[patent_app_number] => 14/988472
[patent_app_country] => US
[patent_app_date] => 2016-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3082
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14988472
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/988472 | Method and System for Non-Authoritative Identity and Identity Permissions Broker and Use Thereof | Jan 4, 2016 | Abandoned |
Array
(
[id] => 13260261
[patent_doc_number] => 10142833
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-27
[patent_title] => Methods, systems and apparatus for recognizing genuine products
[patent_app_type] => utility
[patent_app_number] => 14/984225
[patent_app_country] => US
[patent_app_date] => 2015-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 19118
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 430
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14984225
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/984225 | Methods, systems and apparatus for recognizing genuine products | Dec 29, 2015 | Issued |
Array
(
[id] => 11717031
[patent_doc_number] => 20170185529
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-29
[patent_title] => 'Techniques for Data storage protection and integrity checking'
[patent_app_type] => utility
[patent_app_number] => 14/998323
[patent_app_country] => US
[patent_app_date] => 2015-12-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 26089
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14998323
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/998323 | Techniques for data storage protection and integrity checking | Dec 23, 2015 | Issued |
Array
(
[id] => 13864231
[patent_doc_number] => 10193858
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-29
[patent_title] => Attestation device custody transfer protocol
[patent_app_type] => utility
[patent_app_number] => 14/978658
[patent_app_country] => US
[patent_app_date] => 2015-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 17556
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14978658
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/978658 | Attestation device custody transfer protocol | Dec 21, 2015 | Issued |
Array
(
[id] => 11484438
[patent_doc_number] => 09591011
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-07
[patent_title] => 'Techniques for separating the processing of clients\' traffic to different zones in software defined networks'
[patent_app_type] => utility
[patent_app_number] => 14/957876
[patent_app_country] => US
[patent_app_date] => 2015-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8262
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14957876
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/957876 | Techniques for separating the processing of clients' traffic to different zones in software defined networks | Dec 2, 2015 | Issued |
Array
(
[id] => 10741817
[patent_doc_number] => 20160087968
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'Table-Connected Tokenization'
[patent_app_type] => utility
[patent_app_number] => 14/958712
[patent_app_country] => US
[patent_app_date] => 2015-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6537
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14958712
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/958712 | Table-connected tokenization | Dec 2, 2015 | Issued |
Array
(
[id] => 11666948
[patent_doc_number] => 20170155667
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-01
[patent_title] => 'SYSTEMS AND METHODS FOR DETECTING MALWARE INFECTIONS VIA DOMAIN NAME SERVICE TRAFFIC ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 14/954425
[patent_app_country] => US
[patent_app_date] => 2015-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8460
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14954425
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/954425 | SYSTEMS AND METHODS FOR DETECTING MALWARE INFECTIONS VIA DOMAIN NAME SERVICE TRAFFIC ANALYSIS | Nov 29, 2015 | Abandoned |