
Emily P. Pham
Examiner (ID: 15356, Phone: (571)270-3046 , Office: P/2838 )
| Most Active Art Unit | 2838 |
| Art Unit(s) | 2837, 2838, 2809 |
| Total Applications | 1550 |
| Issued Applications | 1380 |
| Pending Applications | 60 |
| Abandoned Applications | 132 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 4923721
[patent_doc_number] => 20080072038
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-03-20
[patent_title] => 'Key generation method for self-configuration'
[patent_app_type] => utility
[patent_app_number] => 11/716696
[patent_app_country] => US
[patent_app_date] => 2007-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2697
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0072/20080072038.pdf
[firstpage_image] =>[orig_patent_app_number] => 11716696
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/716696 | Key generation method for self-configuration | Mar 11, 2007 | Issued |
Array
(
[id] => 6652829
[patent_doc_number] => 20100229229
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-09
[patent_title] => 'METHOD, SYSTEM AND APPARATUS FOR INDIRECT ACCESS BY COMMUNICATION DEVICE'
[patent_app_type] => utility
[patent_app_number] => 12/159888
[patent_app_country] => US
[patent_app_date] => 2007-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 5520
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0229/20100229229.pdf
[firstpage_image] =>[orig_patent_app_number] => 12159888
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/159888 | Method, system and apparatus for indirect access by communication device | Feb 5, 2007 | Issued |
Array
(
[id] => 4659550
[patent_doc_number] => 20080028412
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-01-31
[patent_title] => 'METHOD FOR THE ADMINISTRATION OF RESOURCES'
[patent_app_type] => utility
[patent_app_number] => 11/622139
[patent_app_country] => US
[patent_app_date] => 2007-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1743
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0028/20080028412.pdf
[firstpage_image] =>[orig_patent_app_number] => 11622139
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/622139 | METHOD FOR THE ADMINISTRATION OF RESOURCES | Jan 10, 2007 | Abandoned |
Array
(
[id] => 8678647
[patent_doc_number] => 08386782
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-02-26
[patent_title] => 'Authenticated group key agreement in groups such as ad-hoc scenarios'
[patent_app_type] => utility
[patent_app_number] => 11/649812
[patent_app_country] => US
[patent_app_date] => 2007-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1747
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11649812
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/649812 | Authenticated group key agreement in groups such as ad-hoc scenarios | Jan 4, 2007 | Issued |
Array
(
[id] => 9012738
[patent_doc_number] => 08528060
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-09-03
[patent_title] => 'Method and system for password protocols in the bounded retrieval mode with security dictionary attacks and intrusions'
[patent_app_type] => utility
[patent_app_number] => 11/644368
[patent_app_country] => US
[patent_app_date] => 2006-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6098
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11644368
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/644368 | Method and system for password protocols in the bounded retrieval mode with security dictionary attacks and intrusions | Dec 21, 2006 | Issued |
Array
(
[id] => 8366933
[patent_doc_number] => 08256013
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-08-28
[patent_title] => 'Method and apparatus for dynamic creation of persona'
[patent_app_type] => utility
[patent_app_number] => 11/644537
[patent_app_country] => US
[patent_app_date] => 2006-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3709
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11644537
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/644537 | Method and apparatus for dynamic creation of persona | Dec 21, 2006 | Issued |
Array
(
[id] => 8120647
[patent_doc_number] => 08161543
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-04-17
[patent_title] => 'VLAN tunneling'
[patent_app_type] => utility
[patent_app_number] => 11/644098
[patent_app_country] => US
[patent_app_date] => 2006-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 11
[patent_no_of_words] => 4066
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/161/08161543.pdf
[firstpage_image] =>[orig_patent_app_number] => 11644098
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/644098 | VLAN tunneling | Dec 21, 2006 | Issued |
Array
(
[id] => 7704340
[patent_doc_number] => 08090104
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-01-03
[patent_title] => 'Method of descrambling a scrambled content data object'
[patent_app_type] => utility
[patent_app_number] => 11/644171
[patent_app_country] => US
[patent_app_date] => 2006-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8151
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/090/08090104.pdf
[firstpage_image] =>[orig_patent_app_number] => 11644171
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/644171 | Method of descrambling a scrambled content data object | Dec 21, 2006 | Issued |
Array
(
[id] => 5190883
[patent_doc_number] => 20070169192
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-07-19
[patent_title] => 'Detection of system compromise by per-process network modeling'
[patent_app_type] => utility
[patent_app_number] => 11/644103
[patent_app_country] => US
[patent_app_date] => 2006-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5738
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0169/20070169192.pdf
[firstpage_image] =>[orig_patent_app_number] => 11644103
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/644103 | Detection of system compromise by per-process network modeling | Dec 21, 2006 | Abandoned |
Array
(
[id] => 5161499
[patent_doc_number] => 20070174543
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-07-26
[patent_title] => 'High-security mask ROM and data scramble/descramble method thereof'
[patent_app_type] => utility
[patent_app_number] => 11/644241
[patent_app_country] => US
[patent_app_date] => 2006-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1860
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0174/20070174543.pdf
[firstpage_image] =>[orig_patent_app_number] => 11644241
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/644241 | High-security mask ROM and data scramble/descramble method thereof | Dec 21, 2006 | Abandoned |
Array
(
[id] => 4881879
[patent_doc_number] => 20080155262
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-06-26
[patent_title] => 'System and method for tamper evident certification'
[patent_app_type] => utility
[patent_app_number] => 11/643629
[patent_app_country] => US
[patent_app_date] => 2006-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7631
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0155/20080155262.pdf
[firstpage_image] =>[orig_patent_app_number] => 11643629
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/643629 | System and method for tamper evident certification | Dec 20, 2006 | Issued |
Array
(
[id] => 6189335
[patent_doc_number] => 20110126022
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-26
[patent_title] => 'METHOD FOR GENERATING AN ADVANCED ELECTRONIC SIGNATURE FOR AN ELECTRONIC DOCUMENT'
[patent_app_type] => utility
[patent_app_number] => 11/817491
[patent_app_country] => US
[patent_app_date] => 2006-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5044
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0126/20110126022.pdf
[firstpage_image] =>[orig_patent_app_number] => 11817491
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/817491 | METHOD FOR GENERATING AN ADVANCED ELECTRONIC SIGNATURE FOR AN ELECTRONIC DOCUMENT | Nov 7, 2006 | Abandoned |
Array
(
[id] => 8899730
[patent_doc_number] => 08479264
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-02
[patent_title] => 'Architecture for virtual security module'
[patent_app_type] => utility
[patent_app_number] => 11/529987
[patent_app_country] => US
[patent_app_date] => 2006-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2224
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11529987
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/529987 | Architecture for virtual security module | Sep 28, 2006 | Issued |
Array
(
[id] => 4479274
[patent_doc_number] => 07945776
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2011-05-17
[patent_title] => 'Securing a passphrase'
[patent_app_type] => utility
[patent_app_number] => 11/529919
[patent_app_country] => US
[patent_app_date] => 2006-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 14
[patent_no_of_words] => 10560
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 228
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/945/07945776.pdf
[firstpage_image] =>[orig_patent_app_number] => 11529919
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/529919 | Securing a passphrase | Sep 28, 2006 | Issued |
Array
(
[id] => 4895608
[patent_doc_number] => 20080104708
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-05-01
[patent_title] => 'Comprehensive security architecture for dynamic, web service based virtual organizations'
[patent_app_type] => utility
[patent_app_number] => 11/529954
[patent_app_country] => US
[patent_app_date] => 2006-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 7230
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0104/20080104708.pdf
[firstpage_image] =>[orig_patent_app_number] => 11529954
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/529954 | Comprehensive security architecture for dynamic, web service based virtual organizations | Sep 28, 2006 | Issued |
Array
(
[id] => 4945496
[patent_doc_number] => 20080082823
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-04-03
[patent_title] => 'Systems and methods for management of secured networks with distributed keys'
[patent_app_type] => utility
[patent_app_number] => 11/529818
[patent_app_country] => US
[patent_app_date] => 2006-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 4694
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0082/20080082823.pdf
[firstpage_image] =>[orig_patent_app_number] => 11529818
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/529818 | Systems and methods for management of secured networks with distributed keys | Sep 28, 2006 | Abandoned |
Array
(
[id] => 5029659
[patent_doc_number] => 20070271106
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-22
[patent_title] => 'SYSTEM AND METHOD FOR SECURE INTERNET CHANNELING AGENT'
[patent_app_type] => utility
[patent_app_number] => 11/419244
[patent_app_country] => US
[patent_app_date] => 2006-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4173
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0271/20070271106.pdf
[firstpage_image] =>[orig_patent_app_number] => 11419244
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/419244 | SYSTEM AND METHOD FOR SECURE INTERNET CHANNELING AGENT | May 18, 2006 | Abandoned |
Array
(
[id] => 8574451
[patent_doc_number] => 08341112
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-12-25
[patent_title] => 'Annotation by search'
[patent_app_type] => utility
[patent_app_number] => 11/419368
[patent_app_country] => US
[patent_app_date] => 2006-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4397
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11419368
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/419368 | Annotation by search | May 18, 2006 | Issued |
Array
(
[id] => 5030171
[patent_doc_number] => 20070271618
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-22
[patent_title] => 'SECURING ACCESS TO A SERVICE DATA OBJECT'
[patent_app_type] => utility
[patent_app_number] => 11/419245
[patent_app_country] => US
[patent_app_date] => 2006-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10699
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0271/20070271618.pdf
[firstpage_image] =>[orig_patent_app_number] => 11419245
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/419245 | SECURING ACCESS TO A SERVICE DATA OBJECT | May 18, 2006 | Abandoned |
Array
(
[id] => 5030147
[patent_doc_number] => 20070271594
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-22
[patent_title] => 'Access-Control Permissions with Inter-Process Message-Based Communications'
[patent_app_type] => utility
[patent_app_number] => 11/419145
[patent_app_country] => US
[patent_app_date] => 2006-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6323
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0271/20070271594.pdf
[firstpage_image] =>[orig_patent_app_number] => 11419145
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/419145 | Access-control permissions with inter-process message-based communications | May 17, 2006 | Issued |