
Emily P. Pham
Examiner (ID: 15356, Phone: (571)270-3046 , Office: P/2838 )
| Most Active Art Unit | 2838 |
| Art Unit(s) | 2837, 2838, 2809 |
| Total Applications | 1550 |
| Issued Applications | 1380 |
| Pending Applications | 60 |
| Abandoned Applications | 132 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10213572
[patent_doc_number] => 20150098564
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-09
[patent_title] => 'MASKING AND UNMASKING METHODS AND DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/505762
[patent_app_country] => US
[patent_app_date] => 2014-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6426
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14505762
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/505762 | Masking and unmasking methods and devices | Oct 2, 2014 | Issued |
Array
(
[id] => 12938878
[patent_doc_number] => 09832222
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-28
[patent_title] => Anti-malware mobile content data management apparatus and method
[patent_app_type] => utility
[patent_app_number] => 14/504666
[patent_app_country] => US
[patent_app_date] => 2014-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 17787
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14504666
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/504666 | Anti-malware mobile content data management apparatus and method | Oct 1, 2014 | Issued |
Array
(
[id] => 10357609
[patent_doc_number] => 20150242614
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'PROVISIONING OF SECURITY CREDENTIALS'
[patent_app_type] => utility
[patent_app_number] => 14/505418
[patent_app_country] => US
[patent_app_date] => 2014-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4116
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14505418
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/505418 | PROVISIONING OF SECURITY CREDENTIALS | Oct 1, 2014 | Abandoned |
Array
(
[id] => 11359439
[patent_doc_number] => 09536093
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-03
[patent_title] => 'Automated verification of a software system'
[patent_app_type] => utility
[patent_app_number] => 14/505204
[patent_app_country] => US
[patent_app_date] => 2014-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 12269
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14505204
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/505204 | Automated verification of a software system | Oct 1, 2014 | Issued |
Array
(
[id] => 10753661
[patent_doc_number] => 20160099813
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-07
[patent_title] => 'Systems And Methods Of Dynamically Adapting Security Certificate-Key Pair Generation'
[patent_app_type] => utility
[patent_app_number] => 14/504669
[patent_app_country] => US
[patent_app_date] => 2014-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 10026
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14504669
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/504669 | Systems and methods of dynamically adapting security certificate-key pair generation | Oct 1, 2014 | Issued |
Array
(
[id] => 10250315
[patent_doc_number] => 20150135310
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-14
[patent_title] => 'PERSISTENT AUTHENTICATION USING SENSORS OF A USER-WEARABLE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/505189
[patent_app_country] => US
[patent_app_date] => 2014-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13108
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14505189
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/505189 | Persistent authentication using sensors of a user-wearable device | Oct 1, 2014 | Issued |
Array
(
[id] => 10752403
[patent_doc_number] => 20160098555
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-07
[patent_title] => 'PROGRAM CODE ATTESTATION CIRCUITRY, A DATA PROCESSING APPARATUS INCLUDING SUCH PROGRAM CODE ATTESTATION CIRCUITRY AND A PROGRAM ATTESTATION METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/504815
[patent_app_country] => US
[patent_app_date] => 2014-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7900
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14504815
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/504815 | PROGRAM CODE ATTESTATION CIRCUITRY, A DATA PROCESSING APPARATUS INCLUDING SUCH PROGRAM CODE ATTESTATION CIRCUITRY AND A PROGRAM ATTESTATION METHOD | Oct 1, 2014 | Abandoned |
Array
(
[id] => 11466020
[patent_doc_number] => 09582653
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-28
[patent_title] => 'Graphical user passwords'
[patent_app_type] => utility
[patent_app_number] => 14/505147
[patent_app_country] => US
[patent_app_date] => 2014-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 3457
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14505147
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/505147 | Graphical user passwords | Oct 1, 2014 | Issued |
Array
(
[id] => 11868678
[patent_doc_number] => 20170235964
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-17
[patent_title] => 'USER AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 15/515283
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3431
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15515283
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/515283 | User authentication | Sep 29, 2014 | Issued |
Array
(
[id] => 12116169
[patent_doc_number] => 09872174
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-16
[patent_title] => 'Transferring application data between devices'
[patent_app_type] => utility
[patent_app_number] => 14/491368
[patent_app_country] => US
[patent_app_date] => 2014-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 10696
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 272
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14491368
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/491368 | Transferring application data between devices | Sep 18, 2014 | Issued |
Array
(
[id] => 11418358
[patent_doc_number] => 09565198
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-07
[patent_title] => 'Tenant based signature validation'
[patent_app_type] => utility
[patent_app_number] => 14/491051
[patent_app_country] => US
[patent_app_date] => 2014-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11691
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 227
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14491051
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/491051 | Tenant based signature validation | Sep 18, 2014 | Issued |
Array
(
[id] => 10708955
[patent_doc_number] => 20160055102
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-25
[patent_title] => 'Managing Security in a System on a Chip (SOC) that Powers Down a Secure Processor'
[patent_app_type] => utility
[patent_app_number] => 14/463763
[patent_app_country] => US
[patent_app_date] => 2014-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10163
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14463763
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/463763 | Managing security in a system on a chip (SOC) that powers down a secure processor | Aug 19, 2014 | Issued |
Array
(
[id] => 10465146
[patent_doc_number] => 20150350161
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'Network Traffic Analysis to Enhance Rule-Based Network Security'
[patent_app_type] => utility
[patent_app_number] => 14/448705
[patent_app_country] => US
[patent_app_date] => 2014-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4887
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14448705
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/448705 | Network traffic analysis to enhance rule-based network security | Jul 30, 2014 | Issued |
Array
(
[id] => 9986805
[patent_doc_number] => 09032543
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-05-12
[patent_title] => 'Content provider with multi-device secure application integration'
[patent_app_type] => utility
[patent_app_number] => 14/337055
[patent_app_country] => US
[patent_app_date] => 2014-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12882
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14337055
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/337055 | Content provider with multi-device secure application integration | Jul 20, 2014 | Issued |
Array
(
[id] => 10166385
[patent_doc_number] => 09197624
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-24
[patent_title] => 'Using clock drift, clock skew, and network latency to enhance machine identification'
[patent_app_type] => utility
[patent_app_number] => 14/330405
[patent_app_country] => US
[patent_app_date] => 2014-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 7340
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 41
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14330405
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/330405 | Using clock drift, clock skew, and network latency to enhance machine identification | Jul 13, 2014 | Issued |
Array
(
[id] => 11848571
[patent_doc_number] => 09736138
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-15
[patent_title] => 'Method, apparatus and system for implementing third party application in micro-blogging service'
[patent_app_type] => utility
[patent_app_number] => 14/769967
[patent_app_country] => US
[patent_app_date] => 2014-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 11
[patent_no_of_words] => 5930
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 285
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14769967
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/769967 | Method, apparatus and system for implementing third party application in micro-blogging service | Jun 24, 2014 | Issued |
Array
(
[id] => 10963120
[patent_doc_number] => 20140366151
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-11
[patent_title] => 'TOKENIZED PAYMENT PROCESSING SCHEMES'
[patent_app_type] => utility
[patent_app_number] => 14/311654
[patent_app_country] => US
[patent_app_date] => 2014-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 14601
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14311654
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/311654 | TOKENIZED PAYMENT PROCESSING SCHEMES | Jun 22, 2014 | Abandoned |
Array
(
[id] => 10100937
[patent_doc_number] => 09137266
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-15
[patent_title] => 'Preserving privacy related to networked media consumption activities'
[patent_app_type] => utility
[patent_app_number] => 14/306832
[patent_app_country] => US
[patent_app_date] => 2014-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5360
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14306832
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/306832 | Preserving privacy related to networked media consumption activities | Jun 16, 2014 | Issued |
Array
(
[id] => 9723421
[patent_doc_number] => 20140259122
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-11
[patent_title] => 'JUBISM: Judgement Based Information Sharing with Monitoring'
[patent_app_type] => utility
[patent_app_number] => 14/282924
[patent_app_country] => US
[patent_app_date] => 2014-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5755
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14282924
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/282924 | JUBISM: judgement based information sharing with monitoring | May 19, 2014 | Issued |
Array
(
[id] => 9700826
[patent_doc_number] => 20140250511
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-04
[patent_title] => 'SECURE SINGLE SIGN-ON FOR A GROUP OF WRAPPED APPLICATIONS ON A COMPUTING DEVICE AND RUNTIME CREDENTIAL SHARING'
[patent_app_type] => utility
[patent_app_number] => 14/279971
[patent_app_country] => US
[patent_app_date] => 2014-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 28199
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14279971
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/279971 | Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing | May 15, 2014 | Issued |