
Emily P. Pham
Examiner (ID: 15356, Phone: (571)270-3046 , Office: P/2838 )
| Most Active Art Unit | 2838 |
| Art Unit(s) | 2837, 2838, 2809 |
| Total Applications | 1550 |
| Issued Applications | 1380 |
| Pending Applications | 60 |
| Abandoned Applications | 132 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 5053112
[patent_doc_number] => 20070033657
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-02-08
[patent_title] => 'Recording Medium And Device Administration Apparatus'
[patent_app_type] => utility
[patent_app_number] => 11/419005
[patent_app_country] => US
[patent_app_date] => 2006-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5401
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0033/20070033657.pdf
[firstpage_image] =>[orig_patent_app_number] => 11419005
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/419005 | Recording medium and device administration apparatus | May 17, 2006 | Issued |
Array
(
[id] => 5017891
[patent_doc_number] => 20070261100
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-08
[patent_title] => 'Platform independent distributed system and method that constructs a security management infrastructure'
[patent_app_type] => utility
[patent_app_number] => 11/418851
[patent_app_country] => US
[patent_app_date] => 2006-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4198
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0261/20070261100.pdf
[firstpage_image] =>[orig_patent_app_number] => 11418851
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/418851 | Platform independent distributed system and method that constructs a security management infrastructure | May 4, 2006 | Abandoned |
Array
(
[id] => 5055891
[patent_doc_number] => 20070058813
[patent_country] => US
[patent_kind] => A9
[patent_issue_date] => 2007-03-15
[patent_title] => 'Opportunistic use of null packets during encryption/decryption'
[patent_app_type] => utility
[patent_app_number] => 11/342472
[patent_app_country] => US
[patent_app_date] => 2006-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12346
[patent_no_of_claims] => 38
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A9/0058/20070058813.pdf
[firstpage_image] =>[orig_patent_app_number] => 11342472
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/342472 | Opportunistic use of null packets during encryption/decryption | Jan 29, 2006 | Issued |
Array
(
[id] => 4468978
[patent_doc_number] => 07936870
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-05-03
[patent_title] => 'Rotation of keys during encryption/decryption'
[patent_app_type] => utility
[patent_app_number] => 11/342460
[patent_app_country] => US
[patent_app_date] => 2006-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 20
[patent_no_of_words] => 12343
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/936/07936870.pdf
[firstpage_image] =>[orig_patent_app_number] => 11342460
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/342460 | Rotation of keys during encryption/decryption | Jan 29, 2006 | Issued |
Array
(
[id] => 4445844
[patent_doc_number] => 07929704
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-04-19
[patent_title] => 'Modified triple wrap encryption/decryption system'
[patent_app_type] => utility
[patent_app_number] => 11/343060
[patent_app_country] => US
[patent_app_date] => 2006-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 20
[patent_no_of_words] => 12315
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/929/07929704.pdf
[firstpage_image] =>[orig_patent_app_number] => 11343060
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/343060 | Modified triple wrap encryption/decryption system | Jan 29, 2006 | Issued |
Array
(
[id] => 5055891
[patent_doc_number] => 20070058813
[patent_country] => US
[patent_kind] => A9
[patent_issue_date] => 2007-03-15
[patent_title] => 'Opportunistic use of null packets during encryption/decryption'
[patent_app_type] => utility
[patent_app_number] => 11/342472
[patent_app_country] => US
[patent_app_date] => 2006-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12346
[patent_no_of_claims] => 38
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A9/0058/20070058813.pdf
[firstpage_image] =>[orig_patent_app_number] => 11342472
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/342472 | Opportunistic use of null packets during encryption/decryption | Jan 29, 2006 | Issued |
Array
(
[id] => 8171179
[patent_doc_number] => 08176534
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-05-08
[patent_title] => 'Method and apparatus for provisioning a device to access digital rights management (DRM) services in a universal plug and play (UPnP) network'
[patent_app_type] => utility
[patent_app_number] => 11/323517
[patent_app_country] => US
[patent_app_date] => 2005-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4900
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/176/08176534.pdf
[firstpage_image] =>[orig_patent_app_number] => 11323517
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/323517 | Method and apparatus for provisioning a device to access digital rights management (DRM) services in a universal plug and play (UPnP) network | Dec 29, 2005 | Issued |
Array
(
[id] => 8366916
[patent_doc_number] => 08255996
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-08-28
[patent_title] => 'Network threat detection and mitigation'
[patent_app_type] => utility
[patent_app_number] => 11/322942
[patent_app_country] => US
[patent_app_date] => 2005-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4334
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11322942
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/322942 | Network threat detection and mitigation | Dec 29, 2005 | Issued |
Array
(
[id] => 4500388
[patent_doc_number] => 07886349
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-02-08
[patent_title] => 'State-full perimeter security for data networks'
[patent_app_type] => utility
[patent_app_number] => 11/323237
[patent_app_country] => US
[patent_app_date] => 2005-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4164
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 228
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/886/07886349.pdf
[firstpage_image] =>[orig_patent_app_number] => 11323237
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/323237 | State-full perimeter security for data networks | Dec 29, 2005 | Issued |
Array
(
[id] => 4990971
[patent_doc_number] => 20070157312
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-07-05
[patent_title] => 'Unified networking diagnostics'
[patent_app_type] => utility
[patent_app_number] => 11/323341
[patent_app_country] => US
[patent_app_date] => 2005-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4461
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0157/20070157312.pdf
[firstpage_image] =>[orig_patent_app_number] => 11323341
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/323341 | Unified networking diagnostics | Dec 29, 2005 | Issued |
Array
(
[id] => 7746934
[patent_doc_number] => 08108923
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-01-31
[patent_title] => 'Assessing risk based on offline activity history'
[patent_app_type] => utility
[patent_app_number] => 11/324190
[patent_app_country] => US
[patent_app_date] => 2005-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4228
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/108/08108923.pdf
[firstpage_image] =>[orig_patent_app_number] => 11324190
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/324190 | Assessing risk based on offline activity history | Dec 28, 2005 | Issued |
Array
(
[id] => 4528753
[patent_doc_number] => 07934229
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2011-04-26
[patent_title] => 'Generating options for repairing a computer infected with malicious software'
[patent_app_type] => utility
[patent_app_number] => 11/323388
[patent_app_country] => US
[patent_app_date] => 2005-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4851
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/934/07934229.pdf
[firstpage_image] =>[orig_patent_app_number] => 11323388
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/323388 | Generating options for repairing a computer infected with malicious software | Dec 28, 2005 | Issued |
Array
(
[id] => 8424650
[patent_doc_number] => 08281148
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-10-02
[patent_title] => 'Securely computing a similarity measure'
[patent_app_type] => utility
[patent_app_number] => 11/718806
[patent_app_country] => US
[patent_app_date] => 2005-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4526
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11718806
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/718806 | Securely computing a similarity measure | Nov 8, 2005 | Issued |
Array
(
[id] => 5809024
[patent_doc_number] => 20060095379
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-05-04
[patent_title] => 'Key management method in network system'
[patent_app_type] => utility
[patent_app_number] => 11/256167
[patent_app_country] => US
[patent_app_date] => 2005-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 8234
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0095/20060095379.pdf
[firstpage_image] =>[orig_patent_app_number] => 11256167
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/256167 | Key management method in network system | Oct 23, 2005 | Abandoned |
Array
(
[id] => 7993543
[patent_doc_number] => 08079080
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-12-13
[patent_title] => 'Method, system and computer program product for detecting security threats in a computer network'
[patent_app_type] => utility
[patent_app_number] => 11/255835
[patent_app_country] => US
[patent_app_date] => 2005-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 21
[patent_no_of_words] => 13631
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 275
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/079/08079080.pdf
[firstpage_image] =>[orig_patent_app_number] => 11255835
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/255835 | Method, system and computer program product for detecting security threats in a computer network | Oct 20, 2005 | Issued |
Array
(
[id] => 5042215
[patent_doc_number] => 20070094497
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-04-26
[patent_title] => 'Secure authentication with voiced responses from a telecommunications terminal'
[patent_app_type] => utility
[patent_app_number] => 11/256224
[patent_app_country] => US
[patent_app_date] => 2005-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4580
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0094/20070094497.pdf
[firstpage_image] =>[orig_patent_app_number] => 11256224
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/256224 | Secure authentication with voiced responses from a telecommunications terminal | Oct 20, 2005 | Issued |
Array
(
[id] => 5150786
[patent_doc_number] => 20070050846
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-03-01
[patent_title] => 'Logging method, system, and device with analytical capabilities for the network traffic'
[patent_app_type] => utility
[patent_app_number] => 11/213719
[patent_app_country] => US
[patent_app_date] => 2005-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 7492
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0050/20070050846.pdf
[firstpage_image] =>[orig_patent_app_number] => 11213719
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/213719 | Logging method, system, and device with analytical capabilities for the network traffic | Aug 29, 2005 | Abandoned |
Array
(
[id] => 5144067
[patent_doc_number] => 20070006283
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-01-04
[patent_title] => 'Identifying dependencies of an application upon a given security context'
[patent_app_type] => utility
[patent_app_number] => 11/214125
[patent_app_country] => US
[patent_app_date] => 2005-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7370
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0006/20070006283.pdf
[firstpage_image] =>[orig_patent_app_number] => 11214125
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/214125 | Identifying dependencies of an application upon a given security context | Aug 28, 2005 | Issued |
Array
(
[id] => 8158238
[patent_doc_number] => 08171299
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-05-01
[patent_title] => 'Data communication apparatus, data communication method, data communication program, and storage medium storing the program'
[patent_app_type] => utility
[patent_app_number] => 11/214009
[patent_app_country] => US
[patent_app_date] => 2005-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11768
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 244
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/171/08171299.pdf
[firstpage_image] =>[orig_patent_app_number] => 11214009
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/214009 | Data communication apparatus, data communication method, data communication program, and storage medium storing the program | Aug 28, 2005 | Issued |
Array
(
[id] => 48195
[patent_doc_number] => 07784101
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-08-24
[patent_title] => 'Identifying dependencies of an application upon a given security context'
[patent_app_type] => utility
[patent_app_number] => 11/214123
[patent_app_country] => US
[patent_app_date] => 2005-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7369
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/784/07784101.pdf
[firstpage_image] =>[orig_patent_app_number] => 11214123
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/214123 | Identifying dependencies of an application upon a given security context | Aug 28, 2005 | Issued |