
Emily P. Pham
Examiner (ID: 15356, Phone: (571)270-3046 , Office: P/2838 )
| Most Active Art Unit | 2838 |
| Art Unit(s) | 2837, 2838, 2809 |
| Total Applications | 1550 |
| Issued Applications | 1380 |
| Pending Applications | 60 |
| Abandoned Applications | 132 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13632039
[patent_doc_number] => 20180367574
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-20
[patent_title] => ACCESS POINT NAME AND APPLICATION IDENTITY BASED SECURITY ENFORCEMENT IN SERVICE PROVIDER NETWORKS
[patent_app_type] => utility
[patent_app_number] => 15/939053
[patent_app_country] => US
[patent_app_date] => 2018-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21593
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 67
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15939053
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/939053 | Access point name and application identity based security enforcement in service provider networks | Mar 27, 2018 | Issued |
Array
(
[id] => 15417001
[patent_doc_number] => 20200028823
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-23
[patent_title] => USING CRYPTOGRAPHY AND APPLICATION GATEWAY TO ELIMINATE MALICIOUS DATA ACCESS AND DATA EXFILTRATION
[patent_app_type] => utility
[patent_app_number] => 15/909740
[patent_app_country] => US
[patent_app_date] => 2018-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6968
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15909740
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/909740 | Using cryptography and application gateway to eliminate malicious data access and data exfiltration | Feb 28, 2018 | Issued |
Array
(
[id] => 13394323
[patent_doc_number] => 20180248704
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-30
[patent_title] => SECURE LOCKING OF PHYSICAL RESOURCES USING ASYMMETRIC CRYPTOGRAPHY
[patent_app_type] => utility
[patent_app_number] => 15/903461
[patent_app_country] => US
[patent_app_date] => 2018-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14357
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 50
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15903461
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/903461 | Secure locking of physical resources using asymmetric cryptography | Feb 22, 2018 | Issued |
Array
(
[id] => 13818139
[patent_doc_number] => 10185838
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-01-22
[patent_title] => Methods to impede common file/process hiding techniques
[patent_app_type] => utility
[patent_app_number] => 15/899666
[patent_app_country] => US
[patent_app_date] => 2018-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 5192
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15899666
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/899666 | Methods to impede common file/process hiding techniques | Feb 19, 2018 | Issued |
Array
(
[id] => 16994288
[patent_doc_number] => 20210232708
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-29
[patent_title] => METHOD FOR PROTECTING ENCRYPTED CONTROL WORD, HARDWARE SECURITY MODULE, MAIN CHIP AND TERMINAL
[patent_app_type] => utility
[patent_app_number] => 16/489592
[patent_app_country] => US
[patent_app_date] => 2018-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6714
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16489592
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/489592 | Method for protecting encrypted control word, hardware security module, main chip and terminal | Feb 8, 2018 | Issued |
Array
(
[id] => 14772463
[patent_doc_number] => 10397648
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-27
[patent_title] => Remote viewing of multimedia content
[patent_app_type] => utility
[patent_app_number] => 15/881973
[patent_app_country] => US
[patent_app_date] => 2018-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5899
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15881973
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/881973 | Remote viewing of multimedia content | Jan 28, 2018 | Issued |
Array
(
[id] => 16431808
[patent_doc_number] => 10831894
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-10
[patent_title] => Decentralized root-of-trust framework for heterogeneous networks
[patent_app_type] => utility
[patent_app_number] => 15/865661
[patent_app_country] => US
[patent_app_date] => 2018-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4937
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15865661
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/865661 | Decentralized root-of-trust framework for heterogeneous networks | Jan 8, 2018 | Issued |
Array
(
[id] => 16449407
[patent_doc_number] => 10841342
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-17
[patent_title] => Data driven user interfaces for device management
[patent_app_type] => utility
[patent_app_number] => 15/865872
[patent_app_country] => US
[patent_app_date] => 2018-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12100
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15865872
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/865872 | Data driven user interfaces for device management | Jan 8, 2018 | Issued |
Array
(
[id] => 14571487
[patent_doc_number] => 20190213350
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-07-11
[patent_title] => Data Protection Management System Compliant Identification Handling
[patent_app_type] => utility
[patent_app_number] => 15/863140
[patent_app_country] => US
[patent_app_date] => 2018-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6315
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15863140
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/863140 | Data protection management system compliant identification handling | Jan 4, 2018 | Issued |
Array
(
[id] => 14575081
[patent_doc_number] => 20190215149
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-07-11
[patent_title] => Blockchain-Based Automated User Matching
[patent_app_type] => utility
[patent_app_number] => 15/862727
[patent_app_country] => US
[patent_app_date] => 2018-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21764
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15862727
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/862727 | Blockchain-based automated user matching | Jan 4, 2018 | Issued |
Array
(
[id] => 15043523
[patent_doc_number] => 20190332766
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-31
[patent_title] => EARLY RUNTIME DETECTION AND PREVENTION OF RANSOMWARE
[patent_app_type] => utility
[patent_app_number] => 16/476939
[patent_app_country] => US
[patent_app_date] => 2017-12-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8889
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16476939
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/476939 | Early runtime detection and prevention of ransomware | Dec 27, 2017 | Issued |
Array
(
[id] => 13923933
[patent_doc_number] => 10206104
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-02-12
[patent_title] => Session completion through co-browsing
[patent_app_type] => utility
[patent_app_number] => 15/848370
[patent_app_country] => US
[patent_app_date] => 2017-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 3373
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15848370
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/848370 | Session completion through co-browsing | Dec 19, 2017 | Issued |
Array
(
[id] => 17622160
[patent_doc_number] => 11341216
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-24
[patent_title] => Method for the computer-aided obfuscation of program code
[patent_app_type] => utility
[patent_app_number] => 16/492439
[patent_app_country] => US
[patent_app_date] => 2017-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 3601
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 397
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16492439
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/492439 | Method for the computer-aided obfuscation of program code | Dec 12, 2017 | Issued |
Array
(
[id] => 13896587
[patent_doc_number] => 10200859
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-02-05
[patent_title] => Transferring application data between devices
[patent_app_type] => utility
[patent_app_number] => 15/836005
[patent_app_country] => US
[patent_app_date] => 2017-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 10529
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 266
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15836005
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/836005 | Transferring application data between devices | Dec 7, 2017 | Issued |
Array
(
[id] => 16219595
[patent_doc_number] => 10735427
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-04
[patent_title] => Method and apparatus for managing program of electronic device
[patent_app_type] => utility
[patent_app_number] => 15/821982
[patent_app_country] => US
[patent_app_date] => 2017-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 17860
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15821982
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/821982 | Method and apparatus for managing program of electronic device | Nov 23, 2017 | Issued |
Array
(
[id] => 14319647
[patent_doc_number] => 20190149527
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-16
[patent_title] => DYNAMIC OFFLINE ENCRYPTION
[patent_app_type] => utility
[patent_app_number] => 15/813749
[patent_app_country] => US
[patent_app_date] => 2017-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8194
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15813749
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/813749 | Dynamic offline encryption | Nov 14, 2017 | Issued |
Array
(
[id] => 12209213
[patent_doc_number] => 20180054439
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-22
[patent_title] => 'Packet Processing Method in PPPoE Authentication Process and Relevant Device'
[patent_app_type] => utility
[patent_app_number] => 15/795835
[patent_app_country] => US
[patent_app_date] => 2017-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11982
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15795835
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/795835 | Packet processing method in PPPoE authentication process and relevant device | Oct 26, 2017 | Issued |
Array
(
[id] => 16037197
[patent_doc_number] => 10681038
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-06-09
[patent_title] => Systems and methods for efficient password based public key authentication
[patent_app_type] => utility
[patent_app_number] => 15/794916
[patent_app_country] => US
[patent_app_date] => 2017-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 3928
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15794916
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/794916 | Systems and methods for efficient password based public key authentication | Oct 25, 2017 | Issued |
Array
(
[id] => 14240367
[patent_doc_number] => 20190132356
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-02
[patent_title] => Systems and Methods to Detect and Notify Victims of Phishing Activities
[patent_app_type] => utility
[patent_app_number] => 15/794763
[patent_app_country] => US
[patent_app_date] => 2017-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8234
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15794763
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/794763 | Systems and methods to detect and notify victims of phishing activities | Oct 25, 2017 | Issued |
Array
(
[id] => 12671071
[patent_doc_number] => 20180115523
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-26
[patent_title] => METHODS AND SYSTEMS FOR API DECEPTION ENVIRONMENT AND API TRAFFIC CONTROL AND SECURITY
[patent_app_type] => utility
[patent_app_number] => 15/792850
[patent_app_country] => US
[patent_app_date] => 2017-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11254
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15792850
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/792850 | Methods and systems for API deception environment and API traffic control and security | Oct 24, 2017 | Issued |