
Chi D. Nguy
Examiner (ID: 15802, Phone: (571)270-7311 , Office: P/2435 )
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435 |
| Total Applications | 536 |
| Issued Applications | 382 |
| Pending Applications | 46 |
| Abandoned Applications | 128 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12216371
[patent_doc_number] => 09913201
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-03-06
[patent_title] => 'Systems and methods for detecting potentially illegitimate wireless access points'
[patent_app_type] => utility
[patent_app_number] => 14/608218
[patent_app_country] => US
[patent_app_date] => 2015-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10054
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 337
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14608218
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/608218 | Systems and methods for detecting potentially illegitimate wireless access points | Jan 28, 2015 | Issued |
Array
(
[id] => 12196577
[patent_doc_number] => 09900324
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-02-20
[patent_title] => 'System to discover and analyze evasive malware'
[patent_app_type] => utility
[patent_app_number] => 14/609382
[patent_app_country] => US
[patent_app_date] => 2015-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6199
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14609382
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/609382 | System to discover and analyze evasive malware | Jan 28, 2015 | Issued |
Array
(
[id] => 10764058
[patent_doc_number] => 20160110213
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-21
[patent_title] => 'VIRTUAL MACHINE MONITORING METHOD AND SYSTEM THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/608209
[patent_app_country] => US
[patent_app_date] => 2015-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4223
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14608209
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/608209 | Virtual machine monitoring method and system thereof | Jan 28, 2015 | Issued |
Array
(
[id] => 12956584
[patent_doc_number] => 09838371
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-12-05
[patent_title] => Method and system for securely transmitting volumes into cloud
[patent_app_type] => utility
[patent_app_number] => 14/609033
[patent_app_country] => US
[patent_app_date] => 2015-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10090
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14609033
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/609033 | Method and system for securely transmitting volumes into cloud | Jan 28, 2015 | Issued |
Array
(
[id] => 11912293
[patent_doc_number] => 09781126
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-10-03
[patent_title] => 'Export control and clearance authorization for a multi-user CAx environment'
[patent_app_type] => utility
[patent_app_number] => 14/608280
[patent_app_country] => US
[patent_app_date] => 2015-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 5844
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14608280
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/608280 | Export control and clearance authorization for a multi-user CAx environment | Jan 28, 2015 | Issued |
Array
(
[id] => 14861307
[patent_doc_number] => 10419400
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-17
[patent_title] => Secure application processing systems and methods
[patent_app_type] => utility
[patent_app_number] => 14/609288
[patent_app_country] => US
[patent_app_date] => 2015-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3577
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14609288
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/609288 | Secure application processing systems and methods | Jan 28, 2015 | Issued |
Array
(
[id] => 10330112
[patent_doc_number] => 20150215117
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-30
[patent_title] => 'WHITE BOX ENCRYPTION APPARATUS AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/608878
[patent_app_country] => US
[patent_app_date] => 2015-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4803
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14608878
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/608878 | WHITE BOX ENCRYPTION APPARATUS AND METHOD | Jan 28, 2015 | Abandoned |
Array
(
[id] => 13268663
[patent_doc_number] => 10146416
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-04
[patent_title] => Systems and methods for sensory interface
[patent_app_type] => utility
[patent_app_number] => 14/609425
[patent_app_country] => US
[patent_app_date] => 2015-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7090
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14609425
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/609425 | Systems and methods for sensory interface | Jan 28, 2015 | Issued |
Array
(
[id] => 11029913
[patent_doc_number] => 20160226869
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-04
[patent_title] => 'SYSTEM AND METHOD OF CONTROLLING NETWORK ACCESS'
[patent_app_type] => utility
[patent_app_number] => 14/608889
[patent_app_country] => US
[patent_app_date] => 2015-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6517
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14608889
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/608889 | SYSTEM AND METHOD OF CONTROLLING NETWORK ACCESS | Jan 28, 2015 | Abandoned |
Array
(
[id] => 12110093
[patent_doc_number] => 09866585
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-09
[patent_title] => 'Scanning computer files for specified content'
[patent_app_type] => utility
[patent_app_number] => 14/583481
[patent_app_country] => US
[patent_app_date] => 2014-12-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3440
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14583481
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/583481 | Scanning computer files for specified content | Dec 25, 2014 | Issued |
Array
(
[id] => 10816107
[patent_doc_number] => 20160162269
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-09
[patent_title] => 'SECURITY EVALUATION AND USER INTERFACE FOR APPLICATION INSTALLATION'
[patent_app_type] => utility
[patent_app_number] => 14/558976
[patent_app_country] => US
[patent_app_date] => 2014-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5118
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14558976
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/558976 | SECURITY EVALUATION AND USER INTERFACE FOR APPLICATION INSTALLATION | Dec 2, 2014 | Abandoned |
Array
(
[id] => 10818725
[patent_doc_number] => 20160164889
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-09
[patent_title] => 'ROGUE ACCESS POINT DETECTION'
[patent_app_type] => utility
[patent_app_number] => 14/559255
[patent_app_country] => US
[patent_app_date] => 2014-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7793
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14559255
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/559255 | ROGUE ACCESS POINT DETECTION | Dec 2, 2014 | Abandoned |
Array
(
[id] => 10819285
[patent_doc_number] => 20160165449
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-09
[patent_title] => 'NOTIFICATION OF UNAUTHORIZED WIRELESS NETWORK DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/559592
[patent_app_country] => US
[patent_app_date] => 2014-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11630
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14559592
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/559592 | NOTIFICATION OF UNAUTHORIZED WIRELESS NETWORK DEVICES | Dec 2, 2014 | Abandoned |
Array
(
[id] => 12230546
[patent_doc_number] => 09917803
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-13
[patent_title] => 'Detection of false message in social media'
[patent_app_type] => utility
[patent_app_number] => 14/559508
[patent_app_country] => US
[patent_app_date] => 2014-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6204
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14559508
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/559508 | Detection of false message in social media | Dec 2, 2014 | Issued |
Array
(
[id] => 10818716
[patent_doc_number] => 20160164880
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-09
[patent_title] => 'Systems And Methods Of Transaction Authorization Using Server-Triggered Switching To An Integrity-Attested Virtual Machine'
[patent_app_type] => utility
[patent_app_number] => 14/558922
[patent_app_country] => US
[patent_app_date] => 2014-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 13565
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14558922
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/558922 | Systems And Methods Of Transaction Authorization Using Server-Triggered Switching To An Integrity-Attested Virtual Machine | Dec 2, 2014 | Abandoned |
Array
(
[id] => 10726625
[patent_doc_number] => 20160072774
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'Encrypted streams to receivers'
[patent_app_type] => utility
[patent_app_number] => 14/481355
[patent_app_country] => US
[patent_app_date] => 2014-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4367
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14481355
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/481355 | Encrypted streams to receivers | Sep 8, 2014 | Issued |
Array
(
[id] => 9919185
[patent_doc_number] => 20150074390
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-12
[patent_title] => 'METHOD AND DEVICE FOR CLASSIFYING RISK LEVEL IN USER AGENT BY COMBINING MULTIPLE EVALUATIONS'
[patent_app_type] => utility
[patent_app_number] => 14/481577
[patent_app_country] => US
[patent_app_date] => 2014-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 9581
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14481577
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/481577 | METHOD AND DEVICE FOR CLASSIFYING RISK LEVEL IN USER AGENT BY COMBINING MULTIPLE EVALUATIONS | Sep 8, 2014 | Abandoned |
Array
(
[id] => 11933605
[patent_doc_number] => 09800615
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-24
[patent_title] => 'Real-time security monitoring using cross-channel event processor'
[patent_app_type] => utility
[patent_app_number] => 14/481223
[patent_app_country] => US
[patent_app_date] => 2014-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9371
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 386
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14481223
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/481223 | Real-time security monitoring using cross-channel event processor | Sep 8, 2014 | Issued |
Array
(
[id] => 11892019
[patent_doc_number] => 09762593
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-09-12
[patent_title] => 'Automatic generation of generic file signatures'
[patent_app_type] => utility
[patent_app_number] => 14/481763
[patent_app_country] => US
[patent_app_date] => 2014-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6263
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14481763
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/481763 | Automatic generation of generic file signatures | Sep 8, 2014 | Issued |
Array
(
[id] => 12501588
[patent_doc_number] => 09998494
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-12
[patent_title] => Methods and apparatus for secure communication in a vehicle-based data communication system
[patent_app_type] => utility
[patent_app_number] => 14/481043
[patent_app_country] => US
[patent_app_date] => 2014-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 2849
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14481043
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/481043 | Methods and apparatus for secure communication in a vehicle-based data communication system | Sep 8, 2014 | Issued |