Search

Emily P. Pham

Examiner (ID: 15356, Phone: (571)270-3046 , Office: P/2838 )

Most Active Art Unit
2838
Art Unit(s)
2837, 2838, 2809
Total Applications
1550
Issued Applications
1380
Pending Applications
60
Abandoned Applications
132

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 4923721 [patent_doc_number] => 20080072038 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-03-20 [patent_title] => 'Key generation method for self-configuration' [patent_app_type] => utility [patent_app_number] => 11/716696 [patent_app_country] => US [patent_app_date] => 2007-03-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2697 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0072/20080072038.pdf [firstpage_image] =>[orig_patent_app_number] => 11716696 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/716696
Key generation method for self-configuration Mar 11, 2007 Issued
Array ( [id] => 6652829 [patent_doc_number] => 20100229229 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-09-09 [patent_title] => 'METHOD, SYSTEM AND APPARATUS FOR INDIRECT ACCESS BY COMMUNICATION DEVICE' [patent_app_type] => utility [patent_app_number] => 12/159888 [patent_app_country] => US [patent_app_date] => 2007-02-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 5520 [patent_no_of_claims] => 36 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0229/20100229229.pdf [firstpage_image] =>[orig_patent_app_number] => 12159888 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/159888
Method, system and apparatus for indirect access by communication device Feb 5, 2007 Issued
Array ( [id] => 4659550 [patent_doc_number] => 20080028412 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-01-31 [patent_title] => 'METHOD FOR THE ADMINISTRATION OF RESOURCES' [patent_app_type] => utility [patent_app_number] => 11/622139 [patent_app_country] => US [patent_app_date] => 2007-01-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 1743 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0028/20080028412.pdf [firstpage_image] =>[orig_patent_app_number] => 11622139 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/622139
METHOD FOR THE ADMINISTRATION OF RESOURCES Jan 10, 2007 Abandoned
Array ( [id] => 8678647 [patent_doc_number] => 08386782 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-02-26 [patent_title] => 'Authenticated group key agreement in groups such as ad-hoc scenarios' [patent_app_type] => utility [patent_app_number] => 11/649812 [patent_app_country] => US [patent_app_date] => 2007-01-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 1747 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 248 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11649812 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/649812
Authenticated group key agreement in groups such as ad-hoc scenarios Jan 4, 2007 Issued
Array ( [id] => 9012738 [patent_doc_number] => 08528060 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-09-03 [patent_title] => 'Method and system for password protocols in the bounded retrieval mode with security dictionary attacks and intrusions' [patent_app_type] => utility [patent_app_number] => 11/644368 [patent_app_country] => US [patent_app_date] => 2006-12-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 6098 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 179 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11644368 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/644368
Method and system for password protocols in the bounded retrieval mode with security dictionary attacks and intrusions Dec 21, 2006 Issued
Array ( [id] => 8366933 [patent_doc_number] => 08256013 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-08-28 [patent_title] => 'Method and apparatus for dynamic creation of persona' [patent_app_type] => utility [patent_app_number] => 11/644537 [patent_app_country] => US [patent_app_date] => 2006-12-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3709 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 211 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11644537 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/644537
Method and apparatus for dynamic creation of persona Dec 21, 2006 Issued
Array ( [id] => 8120647 [patent_doc_number] => 08161543 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-04-17 [patent_title] => 'VLAN tunneling' [patent_app_type] => utility [patent_app_number] => 11/644098 [patent_app_country] => US [patent_app_date] => 2006-12-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 11 [patent_no_of_words] => 4066 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 78 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/161/08161543.pdf [firstpage_image] =>[orig_patent_app_number] => 11644098 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/644098
VLAN tunneling Dec 21, 2006 Issued
Array ( [id] => 7704340 [patent_doc_number] => 08090104 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-01-03 [patent_title] => 'Method of descrambling a scrambled content data object' [patent_app_type] => utility [patent_app_number] => 11/644171 [patent_app_country] => US [patent_app_date] => 2006-12-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 8151 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 109 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/090/08090104.pdf [firstpage_image] =>[orig_patent_app_number] => 11644171 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/644171
Method of descrambling a scrambled content data object Dec 21, 2006 Issued
Array ( [id] => 5190883 [patent_doc_number] => 20070169192 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-07-19 [patent_title] => 'Detection of system compromise by per-process network modeling' [patent_app_type] => utility [patent_app_number] => 11/644103 [patent_app_country] => US [patent_app_date] => 2006-12-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5738 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0169/20070169192.pdf [firstpage_image] =>[orig_patent_app_number] => 11644103 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/644103
Detection of system compromise by per-process network modeling Dec 21, 2006 Abandoned
Array ( [id] => 5161499 [patent_doc_number] => 20070174543 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-07-26 [patent_title] => 'High-security mask ROM and data scramble/descramble method thereof' [patent_app_type] => utility [patent_app_number] => 11/644241 [patent_app_country] => US [patent_app_date] => 2006-12-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 1860 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0174/20070174543.pdf [firstpage_image] =>[orig_patent_app_number] => 11644241 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/644241
High-security mask ROM and data scramble/descramble method thereof Dec 21, 2006 Abandoned
Array ( [id] => 4881879 [patent_doc_number] => 20080155262 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-06-26 [patent_title] => 'System and method for tamper evident certification' [patent_app_type] => utility [patent_app_number] => 11/643629 [patent_app_country] => US [patent_app_date] => 2006-12-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7631 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0155/20080155262.pdf [firstpage_image] =>[orig_patent_app_number] => 11643629 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/643629
System and method for tamper evident certification Dec 20, 2006 Issued
Array ( [id] => 6189335 [patent_doc_number] => 20110126022 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-26 [patent_title] => 'METHOD FOR GENERATING AN ADVANCED ELECTRONIC SIGNATURE FOR AN ELECTRONIC DOCUMENT' [patent_app_type] => utility [patent_app_number] => 11/817491 [patent_app_country] => US [patent_app_date] => 2006-11-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5044 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0126/20110126022.pdf [firstpage_image] =>[orig_patent_app_number] => 11817491 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/817491
METHOD FOR GENERATING AN ADVANCED ELECTRONIC SIGNATURE FOR AN ELECTRONIC DOCUMENT Nov 7, 2006 Abandoned
Array ( [id] => 8899730 [patent_doc_number] => 08479264 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-07-02 [patent_title] => 'Architecture for virtual security module' [patent_app_type] => utility [patent_app_number] => 11/529987 [patent_app_country] => US [patent_app_date] => 2006-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2224 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 112 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11529987 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/529987
Architecture for virtual security module Sep 28, 2006 Issued
Array ( [id] => 4479274 [patent_doc_number] => 07945776 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2011-05-17 [patent_title] => 'Securing a passphrase' [patent_app_type] => utility [patent_app_number] => 11/529919 [patent_app_country] => US [patent_app_date] => 2006-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 14 [patent_no_of_words] => 10560 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 228 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/945/07945776.pdf [firstpage_image] =>[orig_patent_app_number] => 11529919 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/529919
Securing a passphrase Sep 28, 2006 Issued
Array ( [id] => 4895608 [patent_doc_number] => 20080104708 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-05-01 [patent_title] => 'Comprehensive security architecture for dynamic, web service based virtual organizations' [patent_app_type] => utility [patent_app_number] => 11/529954 [patent_app_country] => US [patent_app_date] => 2006-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 7230 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0104/20080104708.pdf [firstpage_image] =>[orig_patent_app_number] => 11529954 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/529954
Comprehensive security architecture for dynamic, web service based virtual organizations Sep 28, 2006 Issued
Array ( [id] => 4945496 [patent_doc_number] => 20080082823 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-04-03 [patent_title] => 'Systems and methods for management of secured networks with distributed keys' [patent_app_type] => utility [patent_app_number] => 11/529818 [patent_app_country] => US [patent_app_date] => 2006-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 4694 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0082/20080082823.pdf [firstpage_image] =>[orig_patent_app_number] => 11529818 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/529818
Systems and methods for management of secured networks with distributed keys Sep 28, 2006 Abandoned
Array ( [id] => 5029659 [patent_doc_number] => 20070271106 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-11-22 [patent_title] => 'SYSTEM AND METHOD FOR SECURE INTERNET CHANNELING AGENT' [patent_app_type] => utility [patent_app_number] => 11/419244 [patent_app_country] => US [patent_app_date] => 2006-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4173 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0271/20070271106.pdf [firstpage_image] =>[orig_patent_app_number] => 11419244 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/419244
SYSTEM AND METHOD FOR SECURE INTERNET CHANNELING AGENT May 18, 2006 Abandoned
Array ( [id] => 8574451 [patent_doc_number] => 08341112 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-12-25 [patent_title] => 'Annotation by search' [patent_app_type] => utility [patent_app_number] => 11/419368 [patent_app_country] => US [patent_app_date] => 2006-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4397 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11419368 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/419368
Annotation by search May 18, 2006 Issued
Array ( [id] => 5030171 [patent_doc_number] => 20070271618 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-11-22 [patent_title] => 'SECURING ACCESS TO A SERVICE DATA OBJECT' [patent_app_type] => utility [patent_app_number] => 11/419245 [patent_app_country] => US [patent_app_date] => 2006-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10699 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0271/20070271618.pdf [firstpage_image] =>[orig_patent_app_number] => 11419245 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/419245
SECURING ACCESS TO A SERVICE DATA OBJECT May 18, 2006 Abandoned
Array ( [id] => 5030147 [patent_doc_number] => 20070271594 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-11-22 [patent_title] => 'Access-Control Permissions with Inter-Process Message-Based Communications' [patent_app_type] => utility [patent_app_number] => 11/419145 [patent_app_country] => US [patent_app_date] => 2006-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6323 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0271/20070271594.pdf [firstpage_image] =>[orig_patent_app_number] => 11419145 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/419145
Access-control permissions with inter-process message-based communications May 17, 2006 Issued
Menu