
Emily P. Pham
Examiner (ID: 15356, Phone: (571)270-3046 , Office: P/2838 )
| Most Active Art Unit | 2838 |
| Art Unit(s) | 2837, 2838, 2809 |
| Total Applications | 1550 |
| Issued Applications | 1380 |
| Pending Applications | 60 |
| Abandoned Applications | 132 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12196557
[patent_doc_number] => 09900304
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-20
[patent_title] => 'Method, apparatus and system for implementing third party application in micro-blogging service'
[patent_app_type] => utility
[patent_app_number] => 15/630520
[patent_app_country] => US
[patent_app_date] => 2017-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 11
[patent_no_of_words] => 5959
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 38
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15630520
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/630520 | Method, apparatus and system for implementing third party application in micro-blogging service | Jun 21, 2017 | Issued |
Array
(
[id] => 14705167
[patent_doc_number] => 10380333
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-08-13
[patent_title] => Multi-factor authentication for determining whether a user is authorized to take an examination
[patent_app_type] => utility
[patent_app_number] => 15/623532
[patent_app_country] => US
[patent_app_date] => 2017-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 20
[patent_no_of_words] => 17286
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 501
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15623532
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/623532 | Multi-factor authentication for determining whether a user is authorized to take an examination | Jun 14, 2017 | Issued |
Array
(
[id] => 15426393
[patent_doc_number] => 10546126
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-28
[patent_title] => Method for detecting the tampering of application code and electronic device supporting the same
[patent_app_type] => utility
[patent_app_number] => 15/613746
[patent_app_country] => US
[patent_app_date] => 2017-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11901
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15613746
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/613746 | Method for detecting the tampering of application code and electronic device supporting the same | Jun 4, 2017 | Issued |
Array
(
[id] => 14240259
[patent_doc_number] => 20190132302
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-02
[patent_title] => INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 16/306313
[patent_app_country] => US
[patent_app_date] => 2017-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6186
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -3
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16306313
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/306313 | Information processing system, information processing method, and non-transitory computer-readable recording medium | Jun 4, 2017 | Issued |
Array
(
[id] => 15853953
[patent_doc_number] => 10642256
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-05
[patent_title] => Method and apparatus for unified personal climate management
[patent_app_type] => utility
[patent_app_number] => 15/613680
[patent_app_country] => US
[patent_app_date] => 2017-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 5898
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15613680
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/613680 | Method and apparatus for unified personal climate management | Jun 4, 2017 | Issued |
Array
(
[id] => 13468049
[patent_doc_number] => 20180285567
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-04
[patent_title] => Methods and Systems for Malware Analysis and Gating Logic
[patent_app_type] => utility
[patent_app_number] => 15/604889
[patent_app_country] => US
[patent_app_date] => 2017-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16776
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -25
[patent_words_short_claim] => 63
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15604889
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/604889 | Methods and Systems for Malware Analysis and Gating Logic | May 24, 2017 | Abandoned |
Array
(
[id] => 12993124
[patent_doc_number] => 20170346849
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-30
[patent_title] => Preventing Security Threats in a Computer Network
[patent_app_type] => utility
[patent_app_number] => 15/604769
[patent_app_country] => US
[patent_app_date] => 2017-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3562
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15604769
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/604769 | Preventing security threats in a computer network | May 24, 2017 | Issued |
Array
(
[id] => 17239201
[patent_doc_number] => 11183083
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-23
[patent_title] => Cryptographic device and memory based PUF
[patent_app_type] => utility
[patent_app_number] => 16/306459
[patent_app_country] => US
[patent_app_date] => 2017-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 11273
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16306459
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/306459 | Cryptographic device and memory based PUF | May 17, 2017 | Issued |
Array
(
[id] => 12062763
[patent_doc_number] => 20170339108
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-23
[patent_title] => 'Network Traffic Analysis to Enhance Rule-Based Network Security'
[patent_app_type] => utility
[patent_app_number] => 15/599211
[patent_app_country] => US
[patent_app_date] => 2017-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4885
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15599211
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/599211 | Network traffic analysis to enhance rule-based network security | May 17, 2017 | Issued |
Array
(
[id] => 11870444
[patent_doc_number] => 20170237730
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-17
[patent_title] => 'Identity Federation and Token Translation Module for Use With a Web Application'
[patent_app_type] => utility
[patent_app_number] => 15/581772
[patent_app_country] => US
[patent_app_date] => 2017-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4496
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15581772
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/581772 | Identity federation and token translation module for use with a web application | Apr 27, 2017 | Issued |
Array
(
[id] => 12230964
[patent_doc_number] => 09918228
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-13
[patent_title] => 'Session completion through co-browsing'
[patent_app_type] => utility
[patent_app_number] => 15/495952
[patent_app_country] => US
[patent_app_date] => 2017-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 3439
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 53
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15495952
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/495952 | Session completion through co-browsing | Apr 23, 2017 | Issued |
Array
(
[id] => 14956935
[patent_doc_number] => 10439754
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-08
[patent_title] => Methods and apparatus to implement a third-order signal scrambler
[patent_app_type] => utility
[patent_app_number] => 15/474499
[patent_app_country] => US
[patent_app_date] => 2017-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8911
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15474499
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/474499 | Methods and apparatus to implement a third-order signal scrambler | Mar 29, 2017 | Issued |
Array
(
[id] => 11927183
[patent_doc_number] => 09794781
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-17
[patent_title] => 'Systems and methods for preventing transmitted cryptographic parameters from compromising privacy'
[patent_app_type] => utility
[patent_app_number] => 15/467938
[patent_app_country] => US
[patent_app_date] => 2017-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3064
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15467938
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/467938 | Systems and methods for preventing transmitted cryptographic parameters from compromising privacy | Mar 22, 2017 | Issued |
Array
(
[id] => 11998509
[patent_doc_number] => 20170302664
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-19
[patent_title] => 'USING CLOCK DRIFT, CLOCK SKEW, AND NETWORK LATENCY TO ENHANCE MACHINE IDENTIFICATION'
[patent_app_type] => utility
[patent_app_number] => 15/457909
[patent_app_country] => US
[patent_app_date] => 2017-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7401
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15457909
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/457909 | Using clock drift, clock skew, and network latency to enhance machine identification | Mar 12, 2017 | Issued |
Array
(
[id] => 15079473
[patent_doc_number] => 10469246
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-05
[patent_title] => Efficient encrypted data management system and method
[patent_app_type] => utility
[patent_app_number] => 15/445104
[patent_app_country] => US
[patent_app_date] => 2017-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 14210
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15445104
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/445104 | Efficient encrypted data management system and method | Feb 27, 2017 | Issued |
Array
(
[id] => 11673358
[patent_doc_number] => 20170162080
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-08
[patent_title] => 'MASKING AND UNMASKING METHODS AND DEVICES'
[patent_app_type] => utility
[patent_app_number] => 15/439973
[patent_app_country] => US
[patent_app_date] => 2017-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6414
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15439973
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/439973 | Masking and unmasking methods and devices | Feb 22, 2017 | Issued |
Array
(
[id] => 15186599
[patent_doc_number] => 20190363891
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-28
[patent_title] => ENCRYPTION DEVICE AND DECRYPTION DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/475298
[patent_app_country] => US
[patent_app_date] => 2017-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11760
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16475298
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/475298 | Encryption device and decryption device | Feb 20, 2017 | Issued |
Array
(
[id] => 15318785
[patent_doc_number] => 10524122
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-31
[patent_title] => Tenant based signature validation
[patent_app_type] => utility
[patent_app_number] => 15/412886
[patent_app_country] => US
[patent_app_date] => 2017-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11340
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15412886
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/412886 | Tenant based signature validation | Jan 22, 2017 | Issued |
Array
(
[id] => 15549315
[patent_doc_number] => 10574454
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-02-25
[patent_title] => Current key data encryption
[patent_app_type] => utility
[patent_app_number] => 15/402954
[patent_app_country] => US
[patent_app_date] => 2017-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13744
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15402954
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/402954 | Current key data encryption | Jan 9, 2017 | Issued |
Array
(
[id] => 13336271
[patent_doc_number] => 20180219674
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-02
[patent_title] => SUCCESSIVE CRYPTOGRAPHIC TECHNIQUES
[patent_app_type] => utility
[patent_app_number] => 15/400439
[patent_app_country] => US
[patent_app_date] => 2017-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11041
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15400439
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/400439 | SUCCESSIVE CRYPTOGRAPHIC TECHNIQUES | Jan 5, 2017 | Abandoned |