
Cao H. Nguyen
Examiner (ID: 4028, Phone: (571)272-4053 , Office: P/2171 )
| Most Active Art Unit | 2171 |
| Art Unit(s) | 2173, 2415, 2787, 2171, 2773 |
| Total Applications | 1947 |
| Issued Applications | 1666 |
| Pending Applications | 136 |
| Abandoned Applications | 167 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13998831
[patent_doc_number] => 20190068573
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => DETECTION OF THE NETWORK LOGON PROTOCOL USED IN PASS-THROUGH AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 15/689229
[patent_app_country] => US
[patent_app_date] => 2017-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6083
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 63
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689229
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/689229 | Detection of the network logon protocol used in pass-through authentication | Aug 28, 2017 | Issued |
Array
(
[id] => 13998429
[patent_doc_number] => 20190068372
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => Transmitting an Encrypted Communication to a User in a Second Secure Communication Network
[patent_app_type] => utility
[patent_app_number] => 15/689250
[patent_app_country] => US
[patent_app_date] => 2017-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11963
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689250
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/689250 | Transmitting an encrypted communication to a user in a second secure communication network | Aug 28, 2017 | Issued |
Array
(
[id] => 15891787
[patent_doc_number] => 10652259
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-12
[patent_title] => Information processing apparatus, method and medium for classifying unauthorized activity
[patent_app_type] => utility
[patent_app_number] => 15/689327
[patent_app_country] => US
[patent_app_date] => 2017-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13070
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 244
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689327
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/689327 | Information processing apparatus, method and medium for classifying unauthorized activity | Aug 28, 2017 | Issued |
Array
(
[id] => 16772990
[patent_doc_number] => 10984099
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-20
[patent_title] => Unauthorized authentication events
[patent_app_type] => utility
[patent_app_number] => 15/689043
[patent_app_country] => US
[patent_app_date] => 2017-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 4415
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689043
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/689043 | Unauthorized authentication events | Aug 28, 2017 | Issued |
Array
(
[id] => 13993151
[patent_doc_number] => 20190065733
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => DEVICE LIFECYCLE DISTRIBUTED LEDGER
[patent_app_type] => utility
[patent_app_number] => 15/689235
[patent_app_country] => US
[patent_app_date] => 2017-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9710
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 56
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689235
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/689235 | Device lifecycle distributed ledger | Aug 28, 2017 | Issued |
Array
(
[id] => 13993263
[patent_doc_number] => 20190065789
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => DEVICE AND METHOD FOR POWER SOURCE BASED DEVICE AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 15/689335
[patent_app_country] => US
[patent_app_date] => 2017-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8196
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689335
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/689335 | DEVICE AND METHOD FOR POWER SOURCE BASED DEVICE AUTHENTICATION | Aug 28, 2017 | Abandoned |
Array
(
[id] => 16410951
[patent_doc_number] => 10819524
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-27
[patent_title] => Methods for header extension preservation, security, authentication, and protocol translation for RTP over MPRTP
[patent_app_type] => utility
[patent_app_number] => 15/689742
[patent_app_country] => US
[patent_app_date] => 2017-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 9912
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689742
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/689742 | Methods for header extension preservation, security, authentication, and protocol translation for RTP over MPRTP | Aug 28, 2017 | Issued |
Array
(
[id] => 15521499
[patent_doc_number] => 10567360
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-18
[patent_title] => SSH key validation in a hyper-converged computing environment
[patent_app_type] => utility
[patent_app_number] => 15/687561
[patent_app_country] => US
[patent_app_date] => 2017-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6851
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15687561
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/687561 | SSH key validation in a hyper-converged computing environment | Aug 27, 2017 | Issued |
Array
(
[id] => 12875896
[patent_doc_number] => 20180183807
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-28
[patent_title] => METHOD FOR AUDITING CLOUD ACCESS IN REAL TIME
[patent_app_type] => utility
[patent_app_number] => 15/686438
[patent_app_country] => US
[patent_app_date] => 2017-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1995
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -3
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15686438
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/686438 | METHOD FOR AUDITING CLOUD ACCESS IN REAL TIME | Aug 24, 2017 | Abandoned |
Array
(
[id] => 15111059
[patent_doc_number] => 10476870
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-12
[patent_title] => Local claim-based security service with cross-browser compatibility
[patent_app_type] => utility
[patent_app_number] => 15/686391
[patent_app_country] => US
[patent_app_date] => 2017-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7490
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15686391
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/686391 | Local claim-based security service with cross-browser compatibility | Aug 24, 2017 | Issued |
Array
(
[id] => 16232894
[patent_doc_number] => 10740446
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-11
[patent_title] => Methods and systems for remote sensing device control based on facial information
[patent_app_type] => utility
[patent_app_number] => 15/685521
[patent_app_country] => US
[patent_app_date] => 2017-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6979
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15685521
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/685521 | Methods and systems for remote sensing device control based on facial information | Aug 23, 2017 | Issued |
Array
(
[id] => 12207780
[patent_doc_number] => 20180053006
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-22
[patent_title] => 'PRIMARY DEVICE, AN ACCESSORY DEVICE, AND METHODS FOR PROCESSING OPERATIONS ON THE PRIMARY DEVICE AND THE ACCESSORY DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/678609
[patent_app_country] => US
[patent_app_date] => 2017-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 12568
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15678609
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/678609 | Primary device, an accessory device, and methods for processing operations on the primary device and the accessory device | Aug 15, 2017 | Issued |
Array
(
[id] => 15111019
[patent_doc_number] => 10476850
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-12
[patent_title] => Supporting unknown unicast traffic using policy-based encryption virtualized networks
[patent_app_type] => utility
[patent_app_number] => 15/675482
[patent_app_country] => US
[patent_app_date] => 2017-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7666
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15675482
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/675482 | Supporting unknown unicast traffic using policy-based encryption virtualized networks | Aug 10, 2017 | Issued |
Array
(
[id] => 13850047
[patent_doc_number] => 20190028508
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-24
[patent_title] => GATEWAY APPARATUS, DETECTING METHOD OF MALICIOUS DOMAIN AND HACKED HOST THEREOF, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 15/667632
[patent_app_country] => US
[patent_app_date] => 2017-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3380
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15667632
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/667632 | Gateway apparatus, detecting method of malicious domain and hacked host thereof, and non-transitory computer readable medium | Aug 2, 2017 | Issued |
Array
(
[id] => 16537675
[patent_doc_number] => 10880298
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-12-29
[patent_title] => Method for generating a key and access control method
[patent_app_type] => utility
[patent_app_number] => 15/668551
[patent_app_country] => US
[patent_app_date] => 2017-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5732
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 309
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15668551
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/668551 | Method for generating a key and access control method | Aug 2, 2017 | Issued |
Array
(
[id] => 13849995
[patent_doc_number] => 20190028482
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-24
[patent_title] => WIRELESS NETWORK STEERING
[patent_app_type] => utility
[patent_app_number] => 15/656184
[patent_app_country] => US
[patent_app_date] => 2017-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11679
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15656184
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/656184 | Wireless network steering | Jul 20, 2017 | Issued |
Array
(
[id] => 13834335
[patent_doc_number] => 20190020652
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-17
[patent_title] => SYSTEM AND METHOD FOR LOCAL DATA IP BASED NETWORK SECURITY FOR PREVENTING DATA BREACH ATTEMPTS IN A MULTI-TENANT PROTECTION STORAGE DEPLOYMENT
[patent_app_type] => utility
[patent_app_number] => 15/650600
[patent_app_country] => US
[patent_app_date] => 2017-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6941
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15650600
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/650600 | System and method for local data IP based network security for preventing data breach attempts in a multi-tenant protection storage deployment | Jul 13, 2017 | Issued |
Array
(
[id] => 13801113
[patent_doc_number] => 20190014095
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-10
[patent_title] => FACILITATING PROVISIONING OF AN OUT-OF-BAND PSEUDONYM OVER A SECURE COMMUNICATION CHANNEL
[patent_app_type] => utility
[patent_app_number] => 15/643142
[patent_app_country] => US
[patent_app_date] => 2017-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12547
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15643142
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/643142 | FACILITATING PROVISIONING OF AN OUT-OF-BAND PSEUDONYM OVER A SECURE COMMUNICATION CHANNEL | Jul 5, 2017 | Abandoned |
Array
(
[id] => 14369201
[patent_doc_number] => 10305923
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-28
[patent_title] => Server-supported malware detection and protection
[patent_app_type] => utility
[patent_app_number] => 15/639520
[patent_app_country] => US
[patent_app_date] => 2017-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 17827
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 333
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15639520
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/639520 | Server-supported malware detection and protection | Jun 29, 2017 | Issued |
Array
(
[id] => 15317405
[patent_doc_number] => 10523425
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-31
[patent_title] => Database password changes
[patent_app_type] => utility
[patent_app_number] => 15/630642
[patent_app_country] => US
[patent_app_date] => 2017-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 13031
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15630642
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/630642 | Database password changes | Jun 21, 2017 | Issued |