Search

Canh Le

Examiner (ID: 12879, Phone: (571)270-1380 , Office: P/2439 )

Most Active Art Unit
2439
Art Unit(s)
2139, 2439
Total Applications
574
Issued Applications
349
Pending Applications
50
Abandoned Applications
186

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 15545751 [patent_doc_number] => 10572659 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-02-25 [patent_title] => Cyber physical attack detection [patent_app_type] => utility [patent_app_number] => 15/709176 [patent_app_country] => US [patent_app_date] => 2017-09-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3247 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 218 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15709176 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/709176
Cyber physical attack detection Sep 18, 2017 Issued
Array ( [id] => 13993157 [patent_doc_number] => 20190065736 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-28 [patent_title] => SYSTEMS AND METHODS FOR PREVENTING MALICIOUS APPLICATIONS FROM EXPLOITING APPLICATION SERVICES [patent_app_type] => utility [patent_app_number] => 15/688911 [patent_app_country] => US [patent_app_date] => 2017-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8777 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15688911 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/688911
Systems and methods for preventing malicious applications from exploiting application services Aug 28, 2017 Issued
Array ( [id] => 16494340 [patent_doc_number] => 10860382 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-12-08 [patent_title] => Resource protection using metric-based access control policies [patent_app_type] => utility [patent_app_number] => 15/688562 [patent_app_country] => US [patent_app_date] => 2017-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10519 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 241 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15688562 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/688562
Resource protection using metric-based access control policies Aug 27, 2017 Issued
Array ( [id] => 13998891 [patent_doc_number] => 20190068603 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-28 [patent_title] => TECHNIQUES FOR COMMUNICATING VIA EXCHANGES OF PHYSICAL CHARMS [patent_app_type] => utility [patent_app_number] => 15/687391 [patent_app_country] => US [patent_app_date] => 2017-08-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10498 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 90 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15687391 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/687391
Techniques for communicating via exchanges of physical charms Aug 24, 2017 Issued
Array ( [id] => 17861865 [patent_doc_number] => 11443023 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-09-13 [patent_title] => Distributed profile and key management [patent_app_type] => utility [patent_app_number] => 15/685299 [patent_app_country] => US [patent_app_date] => 2017-08-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 14 [patent_no_of_words] => 9909 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 195 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15685299 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/685299
Distributed profile and key management Aug 23, 2017 Issued
Array ( [id] => 13998821 [patent_doc_number] => 20190068568 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-28 [patent_title] => DISTRIBUTED PROFILE AND KEY MANAGEMENT [patent_app_type] => utility [patent_app_number] => 15/685094 [patent_app_country] => US [patent_app_date] => 2017-08-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9913 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 99 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15685094 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/685094
Distributed profile and key management Aug 23, 2017 Issued
Array ( [id] => 17108232 [patent_doc_number] => 11128464 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-09-21 [patent_title] => Identity token for accessing computing resources [patent_app_type] => utility [patent_app_number] => 15/686013 [patent_app_country] => US [patent_app_date] => 2017-08-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 18123 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 223 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15686013 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/686013
Identity token for accessing computing resources Aug 23, 2017 Issued
Array ( [id] => 13993197 [patent_doc_number] => 20190065756 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-28 [patent_title] => COPY AND DECRYPT SUPPORT FOR ENCRYPTED VIRTUAL MACHINES [patent_app_type] => utility [patent_app_number] => 15/684908 [patent_app_country] => US [patent_app_date] => 2017-08-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5526 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -21 [patent_words_short_claim] => 78 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15684908 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/684908
Copy and decrypt support for encrypted virtual machines Aug 22, 2017 Issued
Array ( [id] => 13114345 [patent_doc_number] => 10075846 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-09-11 [patent_title] => Method for continuous user authentication with wearables [patent_app_type] => utility [patent_app_number] => 15/674133 [patent_app_country] => US [patent_app_date] => 2017-08-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 18 [patent_no_of_words] => 10229 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 360 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15674133 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/674133
Method for continuous user authentication with wearables Aug 9, 2017 Issued
Array ( [id] => 17819503 [patent_doc_number] => 11425133 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-08-23 [patent_title] => System and method for network device security and trust score determinations [patent_app_type] => utility [patent_app_number] => 16/500080 [patent_app_country] => US [patent_app_date] => 2017-04-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 6321 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 223 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16500080 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/500080
System and method for network device security and trust score determinations Apr 2, 2017 Issued
Array ( [id] => 11624248 [patent_doc_number] => 20170134436 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-05-11 [patent_title] => 'SYSTEM AND METHOD FOR PREVENTING DATA LOSS USING VIRTUAL MACHINE WRAPPED APPLICATIONS' [patent_app_type] => utility [patent_app_number] => 15/412337 [patent_app_country] => US [patent_app_date] => 2017-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5956 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15412337 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/412337
SYSTEM AND METHOD FOR PREVENTING DATA LOSS USING VIRTUAL MACHINE WRAPPED APPLICATIONS Jan 22, 2017 Abandoned
Array ( [id] => 15221523 [patent_doc_number] => 20190373448 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-12-05 [patent_title] => Subscription Profile Downloading Method, Device, and Server [patent_app_type] => utility [patent_app_number] => 16/477767 [patent_app_country] => US [patent_app_date] => 2017-01-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 18040 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16477767 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/477767
Subscription profile downloading method, device, and server Jan 12, 2017 Issued
Array ( [id] => 12558588 [patent_doc_number] => 10015768 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-07-03 [patent_title] => Systems and methods for locating unrecognized computing devices [patent_app_type] => utility [patent_app_number] => 15/375760 [patent_app_country] => US [patent_app_date] => 2016-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9141 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 248 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15375760 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/375760
Systems and methods for locating unrecognized computing devices Dec 11, 2016 Issued
Array ( [id] => 16219630 [patent_doc_number] => 10735462 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-08-04 [patent_title] => Computer malware detection [patent_app_type] => utility [patent_app_number] => 15/366315 [patent_app_country] => US [patent_app_date] => 2016-12-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5124 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 283 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15366315 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/366315
Computer malware detection Nov 30, 2016 Issued
Array ( [id] => 14841007 [patent_doc_number] => 20190278904 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-09-12 [patent_title] => COMPUTER SYSTEM, IOT DEVICE MONITORING METHOD, AND PROGRAM [patent_app_type] => utility [patent_app_number] => 15/575918 [patent_app_country] => US [patent_app_date] => 2016-11-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5264 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -3 [patent_words_short_claim] => 73 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15575918 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/575918
Computer system, IoT device monitoring method, and program Nov 29, 2016 Issued
Array ( [id] => 12756850 [patent_doc_number] => 20180144117 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-05-24 [patent_title] => SECURE CALLS BETWEEN APPLICATIONS [patent_app_type] => utility [patent_app_number] => 15/355379 [patent_app_country] => US [patent_app_date] => 2016-11-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9616 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 126 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15355379 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/355379
Secure calls between applications Nov 17, 2016 Issued
Array ( [id] => 12743317 [patent_doc_number] => 20180139606 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-05-17 [patent_title] => MULTI-TIERED USER AUTHENTICATION METHODS [patent_app_type] => utility [patent_app_number] => 15/351871 [patent_app_country] => US [patent_app_date] => 2016-11-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10961 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 126 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15351871 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/351871
Multi-tiered user authentication methods Nov 14, 2016 Issued
Array ( [id] => 12742114 [patent_doc_number] => 20180139205 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-05-17 [patent_title] => SYSTEM AND METHOD FOR TRANSPARENT MULTI-FACTOR AUTHENTICATION AND SECURITY POSTURE CHECKING [patent_app_type] => utility [patent_app_number] => 15/350912 [patent_app_country] => US [patent_app_date] => 2016-11-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4030 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 177 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15350912 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/350912
System and method for transparent multi-factor authentication and security posture checking Nov 13, 2016 Issued
Array ( [id] => 11631895 [patent_doc_number] => 20170142084 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-05-18 [patent_title] => 'Systems and Methods for Employing RSA Cryptography' [patent_app_type] => utility [patent_app_number] => 15/350046 [patent_app_country] => US [patent_app_date] => 2016-11-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3395 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15350046 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/350046
Systems and Methods for Employing RSA Cryptography Nov 11, 2016 Abandoned
Array ( [id] => 14269953 [patent_doc_number] => 10284556 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-05-07 [patent_title] => Systems and methods for verifying authentication requests using internet protocol addresses [patent_app_type] => utility [patent_app_number] => 15/349682 [patent_app_country] => US [patent_app_date] => 2016-11-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10028 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 248 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15349682 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/349682
Systems and methods for verifying authentication requests using internet protocol addresses Nov 10, 2016 Issued
Menu