
Canh Le
Examiner (ID: 2611, Phone: (571)270-1380 , Office: P/2439 )
| Most Active Art Unit | 2439 |
| Art Unit(s) | 2439, 2139 |
| Total Applications | 564 |
| Issued Applications | 342 |
| Pending Applications | 55 |
| Abandoned Applications | 184 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12666511
[patent_doc_number] => 20180114003
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-26
[patent_title] => Authentication Device, Authentication Method, and Electronic Device That Reduce Password Peeking by Third Person
[patent_app_type] => utility
[patent_app_number] => 15/794233
[patent_app_country] => US
[patent_app_date] => 2017-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2295
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15794233
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/794233 | Authentication Device, Authentication Method, and Electronic Device That Reduce Password Peeking by Third Person | Oct 25, 2017 | Abandoned |
Array
(
[id] => 16804291
[patent_doc_number] => 10999255
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-04
[patent_title] => Systems and methods for re-commissioning a controlled device in a home area network
[patent_app_type] => utility
[patent_app_number] => 15/722773
[patent_app_country] => US
[patent_app_date] => 2017-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 8741
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15722773
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/722773 | Systems and methods for re-commissioning a controlled device in a home area network | Oct 1, 2017 | Issued |
Array
(
[id] => 18687503
[patent_doc_number] => 11783243
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-10-10
[patent_title] => Targeted prioritization within a network based on user-defined factors and success rates
[patent_app_type] => utility
[patent_app_number] => 15/709495
[patent_app_country] => US
[patent_app_date] => 2017-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 14904
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 480
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15709495
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/709495 | Targeted prioritization within a network based on user-defined factors and success rates | Sep 19, 2017 | Issued |
Array
(
[id] => 17078970
[patent_doc_number] => 11115397
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-07
[patent_title] => System and methods for point to point encryption and tokenization in a hosted environment
[patent_app_type] => utility
[patent_app_number] => 15/710300
[patent_app_country] => US
[patent_app_date] => 2017-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7190
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 277
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15710300
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/710300 | System and methods for point to point encryption and tokenization in a hosted environment | Sep 19, 2017 | Issued |
Array
(
[id] => 15545751
[patent_doc_number] => 10572659
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-25
[patent_title] => Cyber physical attack detection
[patent_app_type] => utility
[patent_app_number] => 15/709176
[patent_app_country] => US
[patent_app_date] => 2017-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3247
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15709176
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/709176 | Cyber physical attack detection | Sep 18, 2017 | Issued |
Array
(
[id] => 13993157
[patent_doc_number] => 20190065736
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => SYSTEMS AND METHODS FOR PREVENTING MALICIOUS APPLICATIONS FROM EXPLOITING APPLICATION SERVICES
[patent_app_type] => utility
[patent_app_number] => 15/688911
[patent_app_country] => US
[patent_app_date] => 2017-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8777
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15688911
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/688911 | Systems and methods for preventing malicious applications from exploiting application services | Aug 28, 2017 | Issued |
Array
(
[id] => 16494340
[patent_doc_number] => 10860382
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-08
[patent_title] => Resource protection using metric-based access control policies
[patent_app_type] => utility
[patent_app_number] => 15/688562
[patent_app_country] => US
[patent_app_date] => 2017-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10519
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15688562
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/688562 | Resource protection using metric-based access control policies | Aug 27, 2017 | Issued |
Array
(
[id] => 13998891
[patent_doc_number] => 20190068603
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => TECHNIQUES FOR COMMUNICATING VIA EXCHANGES OF PHYSICAL CHARMS
[patent_app_type] => utility
[patent_app_number] => 15/687391
[patent_app_country] => US
[patent_app_date] => 2017-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10498
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 90
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15687391
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/687391 | Techniques for communicating via exchanges of physical charms | Aug 24, 2017 | Issued |
Array
(
[id] => 17861865
[patent_doc_number] => 11443023
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-13
[patent_title] => Distributed profile and key management
[patent_app_type] => utility
[patent_app_number] => 15/685299
[patent_app_country] => US
[patent_app_date] => 2017-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 14
[patent_no_of_words] => 9909
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15685299
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/685299 | Distributed profile and key management | Aug 23, 2017 | Issued |
Array
(
[id] => 17108232
[patent_doc_number] => 11128464
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-09-21
[patent_title] => Identity token for accessing computing resources
[patent_app_type] => utility
[patent_app_number] => 15/686013
[patent_app_country] => US
[patent_app_date] => 2017-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 18123
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15686013
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/686013 | Identity token for accessing computing resources | Aug 23, 2017 | Issued |
Array
(
[id] => 13998821
[patent_doc_number] => 20190068568
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => DISTRIBUTED PROFILE AND KEY MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 15/685094
[patent_app_country] => US
[patent_app_date] => 2017-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9913
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15685094
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/685094 | Distributed profile and key management | Aug 23, 2017 | Issued |
Array
(
[id] => 13993197
[patent_doc_number] => 20190065756
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => COPY AND DECRYPT SUPPORT FOR ENCRYPTED VIRTUAL MACHINES
[patent_app_type] => utility
[patent_app_number] => 15/684908
[patent_app_country] => US
[patent_app_date] => 2017-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5526
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15684908
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/684908 | Copy and decrypt support for encrypted virtual machines | Aug 22, 2017 | Issued |
Array
(
[id] => 13114345
[patent_doc_number] => 10075846
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-09-11
[patent_title] => Method for continuous user authentication with wearables
[patent_app_type] => utility
[patent_app_number] => 15/674133
[patent_app_country] => US
[patent_app_date] => 2017-08-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 18
[patent_no_of_words] => 10229
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 360
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15674133
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/674133 | Method for continuous user authentication with wearables | Aug 9, 2017 | Issued |
Array
(
[id] => 17819503
[patent_doc_number] => 11425133
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-23
[patent_title] => System and method for network device security and trust score determinations
[patent_app_type] => utility
[patent_app_number] => 16/500080
[patent_app_country] => US
[patent_app_date] => 2017-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 6321
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16500080
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/500080 | System and method for network device security and trust score determinations | Apr 2, 2017 | Issued |
Array
(
[id] => 11624248
[patent_doc_number] => 20170134436
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-11
[patent_title] => 'SYSTEM AND METHOD FOR PREVENTING DATA LOSS USING VIRTUAL MACHINE WRAPPED APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 15/412337
[patent_app_country] => US
[patent_app_date] => 2017-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5956
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15412337
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/412337 | SYSTEM AND METHOD FOR PREVENTING DATA LOSS USING VIRTUAL MACHINE WRAPPED APPLICATIONS | Jan 22, 2017 | Abandoned |
Array
(
[id] => 15221523
[patent_doc_number] => 20190373448
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-05
[patent_title] => Subscription Profile Downloading Method, Device, and Server
[patent_app_type] => utility
[patent_app_number] => 16/477767
[patent_app_country] => US
[patent_app_date] => 2017-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18040
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16477767
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/477767 | Subscription profile downloading method, device, and server | Jan 12, 2017 | Issued |
Array
(
[id] => 12558588
[patent_doc_number] => 10015768
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-07-03
[patent_title] => Systems and methods for locating unrecognized computing devices
[patent_app_type] => utility
[patent_app_number] => 15/375760
[patent_app_country] => US
[patent_app_date] => 2016-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9141
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15375760
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/375760 | Systems and methods for locating unrecognized computing devices | Dec 11, 2016 | Issued |
Array
(
[id] => 16219630
[patent_doc_number] => 10735462
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-04
[patent_title] => Computer malware detection
[patent_app_type] => utility
[patent_app_number] => 15/366315
[patent_app_country] => US
[patent_app_date] => 2016-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5124
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 283
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15366315
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/366315 | Computer malware detection | Nov 30, 2016 | Issued |
Array
(
[id] => 14841007
[patent_doc_number] => 20190278904
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-12
[patent_title] => COMPUTER SYSTEM, IOT DEVICE MONITORING METHOD, AND PROGRAM
[patent_app_type] => utility
[patent_app_number] => 15/575918
[patent_app_country] => US
[patent_app_date] => 2016-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5264
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -3
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15575918
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/575918 | Computer system, IoT device monitoring method, and program | Nov 29, 2016 | Issued |
Array
(
[id] => 12756850
[patent_doc_number] => 20180144117
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-24
[patent_title] => SECURE CALLS BETWEEN APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 15/355379
[patent_app_country] => US
[patent_app_date] => 2016-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9616
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15355379
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/355379 | Secure calls between applications | Nov 17, 2016 | Issued |