
Canh Le
Examiner (ID: 12879, Phone: (571)270-1380 , Office: P/2439 )
| Most Active Art Unit | 2439 |
| Art Unit(s) | 2139, 2439 |
| Total Applications | 574 |
| Issued Applications | 349 |
| Pending Applications | 50 |
| Abandoned Applications | 186 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15545751
[patent_doc_number] => 10572659
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-25
[patent_title] => Cyber physical attack detection
[patent_app_type] => utility
[patent_app_number] => 15/709176
[patent_app_country] => US
[patent_app_date] => 2017-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3247
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15709176
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/709176 | Cyber physical attack detection | Sep 18, 2017 | Issued |
Array
(
[id] => 13993157
[patent_doc_number] => 20190065736
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => SYSTEMS AND METHODS FOR PREVENTING MALICIOUS APPLICATIONS FROM EXPLOITING APPLICATION SERVICES
[patent_app_type] => utility
[patent_app_number] => 15/688911
[patent_app_country] => US
[patent_app_date] => 2017-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8777
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15688911
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/688911 | Systems and methods for preventing malicious applications from exploiting application services | Aug 28, 2017 | Issued |
Array
(
[id] => 16494340
[patent_doc_number] => 10860382
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-08
[patent_title] => Resource protection using metric-based access control policies
[patent_app_type] => utility
[patent_app_number] => 15/688562
[patent_app_country] => US
[patent_app_date] => 2017-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10519
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15688562
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/688562 | Resource protection using metric-based access control policies | Aug 27, 2017 | Issued |
Array
(
[id] => 13998891
[patent_doc_number] => 20190068603
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => TECHNIQUES FOR COMMUNICATING VIA EXCHANGES OF PHYSICAL CHARMS
[patent_app_type] => utility
[patent_app_number] => 15/687391
[patent_app_country] => US
[patent_app_date] => 2017-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10498
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 90
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15687391
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/687391 | Techniques for communicating via exchanges of physical charms | Aug 24, 2017 | Issued |
Array
(
[id] => 17861865
[patent_doc_number] => 11443023
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-13
[patent_title] => Distributed profile and key management
[patent_app_type] => utility
[patent_app_number] => 15/685299
[patent_app_country] => US
[patent_app_date] => 2017-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 14
[patent_no_of_words] => 9909
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15685299
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/685299 | Distributed profile and key management | Aug 23, 2017 | Issued |
Array
(
[id] => 13998821
[patent_doc_number] => 20190068568
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => DISTRIBUTED PROFILE AND KEY MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 15/685094
[patent_app_country] => US
[patent_app_date] => 2017-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9913
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15685094
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/685094 | Distributed profile and key management | Aug 23, 2017 | Issued |
Array
(
[id] => 17108232
[patent_doc_number] => 11128464
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-09-21
[patent_title] => Identity token for accessing computing resources
[patent_app_type] => utility
[patent_app_number] => 15/686013
[patent_app_country] => US
[patent_app_date] => 2017-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 18123
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15686013
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/686013 | Identity token for accessing computing resources | Aug 23, 2017 | Issued |
Array
(
[id] => 13993197
[patent_doc_number] => 20190065756
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => COPY AND DECRYPT SUPPORT FOR ENCRYPTED VIRTUAL MACHINES
[patent_app_type] => utility
[patent_app_number] => 15/684908
[patent_app_country] => US
[patent_app_date] => 2017-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5526
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15684908
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/684908 | Copy and decrypt support for encrypted virtual machines | Aug 22, 2017 | Issued |
Array
(
[id] => 13114345
[patent_doc_number] => 10075846
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-09-11
[patent_title] => Method for continuous user authentication with wearables
[patent_app_type] => utility
[patent_app_number] => 15/674133
[patent_app_country] => US
[patent_app_date] => 2017-08-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 18
[patent_no_of_words] => 10229
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 360
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15674133
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/674133 | Method for continuous user authentication with wearables | Aug 9, 2017 | Issued |
Array
(
[id] => 17819503
[patent_doc_number] => 11425133
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-23
[patent_title] => System and method for network device security and trust score determinations
[patent_app_type] => utility
[patent_app_number] => 16/500080
[patent_app_country] => US
[patent_app_date] => 2017-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 6321
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16500080
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/500080 | System and method for network device security and trust score determinations | Apr 2, 2017 | Issued |
Array
(
[id] => 11624248
[patent_doc_number] => 20170134436
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-11
[patent_title] => 'SYSTEM AND METHOD FOR PREVENTING DATA LOSS USING VIRTUAL MACHINE WRAPPED APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 15/412337
[patent_app_country] => US
[patent_app_date] => 2017-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5956
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15412337
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/412337 | SYSTEM AND METHOD FOR PREVENTING DATA LOSS USING VIRTUAL MACHINE WRAPPED APPLICATIONS | Jan 22, 2017 | Abandoned |
Array
(
[id] => 15221523
[patent_doc_number] => 20190373448
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-05
[patent_title] => Subscription Profile Downloading Method, Device, and Server
[patent_app_type] => utility
[patent_app_number] => 16/477767
[patent_app_country] => US
[patent_app_date] => 2017-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18040
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16477767
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/477767 | Subscription profile downloading method, device, and server | Jan 12, 2017 | Issued |
Array
(
[id] => 12558588
[patent_doc_number] => 10015768
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-07-03
[patent_title] => Systems and methods for locating unrecognized computing devices
[patent_app_type] => utility
[patent_app_number] => 15/375760
[patent_app_country] => US
[patent_app_date] => 2016-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9141
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15375760
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/375760 | Systems and methods for locating unrecognized computing devices | Dec 11, 2016 | Issued |
Array
(
[id] => 16219630
[patent_doc_number] => 10735462
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-04
[patent_title] => Computer malware detection
[patent_app_type] => utility
[patent_app_number] => 15/366315
[patent_app_country] => US
[patent_app_date] => 2016-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5124
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 283
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15366315
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/366315 | Computer malware detection | Nov 30, 2016 | Issued |
Array
(
[id] => 14841007
[patent_doc_number] => 20190278904
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-12
[patent_title] => COMPUTER SYSTEM, IOT DEVICE MONITORING METHOD, AND PROGRAM
[patent_app_type] => utility
[patent_app_number] => 15/575918
[patent_app_country] => US
[patent_app_date] => 2016-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5264
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -3
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15575918
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/575918 | Computer system, IoT device monitoring method, and program | Nov 29, 2016 | Issued |
Array
(
[id] => 12756850
[patent_doc_number] => 20180144117
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-24
[patent_title] => SECURE CALLS BETWEEN APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 15/355379
[patent_app_country] => US
[patent_app_date] => 2016-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9616
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15355379
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/355379 | Secure calls between applications | Nov 17, 2016 | Issued |
Array
(
[id] => 12743317
[patent_doc_number] => 20180139606
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-17
[patent_title] => MULTI-TIERED USER AUTHENTICATION METHODS
[patent_app_type] => utility
[patent_app_number] => 15/351871
[patent_app_country] => US
[patent_app_date] => 2016-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10961
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15351871
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/351871 | Multi-tiered user authentication methods | Nov 14, 2016 | Issued |
Array
(
[id] => 12742114
[patent_doc_number] => 20180139205
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-17
[patent_title] => SYSTEM AND METHOD FOR TRANSPARENT MULTI-FACTOR AUTHENTICATION AND SECURITY POSTURE CHECKING
[patent_app_type] => utility
[patent_app_number] => 15/350912
[patent_app_country] => US
[patent_app_date] => 2016-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4030
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15350912
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/350912 | System and method for transparent multi-factor authentication and security posture checking | Nov 13, 2016 | Issued |
Array
(
[id] => 11631895
[patent_doc_number] => 20170142084
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-18
[patent_title] => 'Systems and Methods for Employing RSA Cryptography'
[patent_app_type] => utility
[patent_app_number] => 15/350046
[patent_app_country] => US
[patent_app_date] => 2016-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3395
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15350046
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/350046 | Systems and Methods for Employing RSA Cryptography | Nov 11, 2016 | Abandoned |
Array
(
[id] => 14269953
[patent_doc_number] => 10284556
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-05-07
[patent_title] => Systems and methods for verifying authentication requests using internet protocol addresses
[patent_app_type] => utility
[patent_app_number] => 15/349682
[patent_app_country] => US
[patent_app_date] => 2016-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10028
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15349682
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/349682 | Systems and methods for verifying authentication requests using internet protocol addresses | Nov 10, 2016 | Issued |