
Daxin Wu
Examiner (ID: 6062)
| Most Active Art Unit | 2191 |
| Art Unit(s) | 2198, 2191 |
| Total Applications | 688 |
| Issued Applications | 571 |
| Pending Applications | 44 |
| Abandoned Applications | 90 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16602390
[patent_doc_number] => 20210028921
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-28
[patent_title] => Method of Operation for a Configurable Number Theoretic Transform (NTT) Butterfly Circuit For Homomorphic Encryption
[patent_app_type] => utility
[patent_app_number] => 16/921028
[patent_app_country] => US
[patent_app_date] => 2020-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12296
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16921028
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/921028 | Method of operation for a configurable number theoretic transform (NTT) butterfly circuit for homomorphic encryption | Jul 5, 2020 | Issued |
Array
(
[id] => 17788825
[patent_doc_number] => 11411971
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-09
[patent_title] => Context-aware network-based malicious activity warning systems
[patent_app_type] => utility
[patent_app_number] => 16/904944
[patent_app_country] => US
[patent_app_date] => 2020-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 13905
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16904944
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/904944 | Context-aware network-based malicious activity warning systems | Jun 17, 2020 | Issued |
Array
(
[id] => 16317211
[patent_doc_number] => 20200295949
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-17
[patent_title] => BLOCKCHAIN-BASED CONTENT VERIFICATION
[patent_app_type] => utility
[patent_app_number] => 16/888329
[patent_app_country] => US
[patent_app_date] => 2020-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9091
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16888329
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/888329 | Blockchain-based content verification | May 28, 2020 | Issued |
Array
(
[id] => 17327271
[patent_doc_number] => 11218303
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-01-04
[patent_title] => Quantum attack-resistant system to facilitate and enhance processes of cryptography key exchange
[patent_app_type] => utility
[patent_app_number] => 16/885312
[patent_app_country] => US
[patent_app_date] => 2020-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 23
[patent_no_of_words] => 11302
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16885312
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/885312 | Quantum attack-resistant system to facilitate and enhance processes of cryptography key exchange | May 27, 2020 | Issued |
Array
(
[id] => 18048714
[patent_doc_number] => 11522677
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-12-06
[patent_title] => Systems and methods for trigger based synchronized updates in a distributed records environment
[patent_app_type] => utility
[patent_app_number] => 16/880682
[patent_app_country] => US
[patent_app_date] => 2020-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6904
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16880682
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/880682 | Systems and methods for trigger based synchronized updates in a distributed records environment | May 20, 2020 | Issued |
Array
(
[id] => 17584152
[patent_doc_number] => 20220141007
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-05-05
[patent_title] => QUANTUM COLOR IMAGE ENCRYPTING METHOD AND CIRCUIT BASED ON MODIFICATION DIRECTION
[patent_app_type] => utility
[patent_app_number] => 17/260286
[patent_app_country] => US
[patent_app_date] => 2020-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4910
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17260286
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/260286 | Quantum color image encrypting method and circuit based on modification direction | May 20, 2020 | Issued |
Array
(
[id] => 17848926
[patent_doc_number] => 11438318
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-06
[patent_title] => Symmetric-key infrastructure
[patent_app_type] => utility
[patent_app_number] => 16/877804
[patent_app_country] => US
[patent_app_date] => 2020-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 24429
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16877804
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/877804 | Symmetric-key infrastructure | May 18, 2020 | Issued |
Array
(
[id] => 17684045
[patent_doc_number] => 11368313
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-06-21
[patent_title] => Data storage devices and methods for encrypting a firmware file thereof
[patent_app_type] => utility
[patent_app_number] => 16/869562
[patent_app_country] => US
[patent_app_date] => 2020-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 4550
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16869562
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/869562 | Data storage devices and methods for encrypting a firmware file thereof | May 6, 2020 | Issued |
Array
(
[id] => 16887718
[patent_doc_number] => 20210173915
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-10
[patent_title] => AUTOMATED ID PROOFING USING A RANDOM MULTITUDE OF REAL-TIME BEHAVIORAL BIOMETRIC SAMPLINGS
[patent_app_type] => utility
[patent_app_number] => 16/868067
[patent_app_country] => US
[patent_app_date] => 2020-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13581
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16868067
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/868067 | Automated ID proofing using a random multitude of real-time behavioral biometric samplings | May 5, 2020 | Issued |
Array
(
[id] => 16887717
[patent_doc_number] => 20210173914
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-10
[patent_title] => DEVICE HANDOFF IDENTIFICATION PROOFING USING BEHAVIORAL ANALYTICS
[patent_app_type] => utility
[patent_app_number] => 16/868053
[patent_app_country] => US
[patent_app_date] => 2020-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13581
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -34
[patent_words_short_claim] => 49
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16868053
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/868053 | Device handoff identification proofing using behavioral analytics | May 5, 2020 | Issued |
Array
(
[id] => 16887710
[patent_doc_number] => 20210173907
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-10
[patent_title] => AUTOMATED TRANSPARENT LOGIN WITHOUT SAVED CREDENTIALS OR PASSWORDS
[patent_app_type] => utility
[patent_app_number] => 16/868062
[patent_app_country] => US
[patent_app_date] => 2020-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13581
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 56
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16868062
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/868062 | Automated transparent login without saved credentials or passwords | May 5, 2020 | Issued |
Array
(
[id] => 19047659
[patent_doc_number] => 11936787
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-03-19
[patent_title] => User identification proofing using a combination of user responses to system turing tests using biometric methods
[patent_app_type] => utility
[patent_app_number] => 16/868080
[patent_app_country] => US
[patent_app_date] => 2020-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 19
[patent_no_of_words] => 13581
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16868080
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/868080 | User identification proofing using a combination of user responses to system turing tests using biometric methods | May 5, 2020 | Issued |
Array
(
[id] => 16373305
[patent_doc_number] => 10805081
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-10-13
[patent_title] => Processing batches of point evaluations in a supersingular isogeny-based cryptosystem
[patent_app_type] => utility
[patent_app_number] => 16/863837
[patent_app_country] => US
[patent_app_date] => 2020-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 24043
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16863837
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/863837 | Processing batches of point evaluations in a supersingular isogeny-based cryptosystem | Apr 29, 2020 | Issued |
Array
(
[id] => 16211655
[patent_doc_number] => 20200244645
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-30
[patent_title] => COMPOSITE USER IDENTITIES IN DISTRIBUTED COMPUTING SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 16/853455
[patent_app_country] => US
[patent_app_date] => 2020-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10233
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16853455
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/853455 | Composite user identities in distributed computing systems | Apr 19, 2020 | Issued |
Array
(
[id] => 17575186
[patent_doc_number] => 11323468
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-05-03
[patent_title] => Methods, systems, and media for detecting fraudulent activity based on hardware events
[patent_app_type] => utility
[patent_app_number] => 16/852009
[patent_app_country] => US
[patent_app_date] => 2020-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 5864
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16852009
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/852009 | Methods, systems, and media for detecting fraudulent activity based on hardware events | Apr 16, 2020 | Issued |
Array
(
[id] => 17559960
[patent_doc_number] => 11316691
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-26
[patent_title] => Methods and systems for enhancing network privacy of multiple party documents on distributed ledger-based networks
[patent_app_type] => utility
[patent_app_number] => 16/848269
[patent_app_country] => US
[patent_app_date] => 2020-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 9775
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16848269
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/848269 | Methods and systems for enhancing network privacy of multiple party documents on distributed ledger-based networks | Apr 13, 2020 | Issued |
Array
(
[id] => 16165003
[patent_doc_number] => 20200220734
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-09
[patent_title] => IDENTITY AUTHENTICATION USING A WEARABLE DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/822467
[patent_app_country] => US
[patent_app_date] => 2020-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9700
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16822467
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/822467 | Identity authentication using a wearable device | Mar 17, 2020 | Issued |
Array
(
[id] => 17086397
[patent_doc_number] => 20210281404
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-09-09
[patent_title] => COMMUNICATION LATENCY BASED CRYPTOGRAPHIC NEGOTIATIONS
[patent_app_type] => utility
[patent_app_number] => 16/809135
[patent_app_country] => US
[patent_app_date] => 2020-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7737
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16809135
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/809135 | Communication latency based cryptographic negotiations | Mar 3, 2020 | Issued |
Array
(
[id] => 16273215
[patent_doc_number] => 20200274703
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-27
[patent_title] => QUANTUM FREQUENCY PROCESSOR FOR PROVABLE CYBERSECURITY
[patent_app_type] => utility
[patent_app_number] => 16/802337
[patent_app_country] => US
[patent_app_date] => 2020-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11679
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -31
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16802337
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/802337 | Quantum frequency processor for provable cybersecurity | Feb 25, 2020 | Issued |
Array
(
[id] => 19495076
[patent_doc_number] => 12113804
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-10-08
[patent_title] => Method for authorized use of projector
[patent_app_type] => utility
[patent_app_number] => 17/310888
[patent_app_country] => US
[patent_app_date] => 2020-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4522
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17310888
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/310888 | Method for authorized use of projector | Feb 25, 2020 | Issued |