Search

Emily P. Pham

Examiner (ID: 15356, Phone: (571)270-3046 , Office: P/2838 )

Most Active Art Unit
2838
Art Unit(s)
2837, 2838, 2809
Total Applications
1550
Issued Applications
1380
Pending Applications
60
Abandoned Applications
132

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 5053112 [patent_doc_number] => 20070033657 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-02-08 [patent_title] => 'Recording Medium And Device Administration Apparatus' [patent_app_type] => utility [patent_app_number] => 11/419005 [patent_app_country] => US [patent_app_date] => 2006-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5401 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0033/20070033657.pdf [firstpage_image] =>[orig_patent_app_number] => 11419005 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/419005
Recording medium and device administration apparatus May 17, 2006 Issued
Array ( [id] => 5017891 [patent_doc_number] => 20070261100 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-11-08 [patent_title] => 'Platform independent distributed system and method that constructs a security management infrastructure' [patent_app_type] => utility [patent_app_number] => 11/418851 [patent_app_country] => US [patent_app_date] => 2006-05-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 4198 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0261/20070261100.pdf [firstpage_image] =>[orig_patent_app_number] => 11418851 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/418851
Platform independent distributed system and method that constructs a security management infrastructure May 4, 2006 Abandoned
Array ( [id] => 5055891 [patent_doc_number] => 20070058813 [patent_country] => US [patent_kind] => A9 [patent_issue_date] => 2007-03-15 [patent_title] => 'Opportunistic use of null packets during encryption/decryption' [patent_app_type] => utility [patent_app_number] => 11/342472 [patent_app_country] => US [patent_app_date] => 2006-01-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 12346 [patent_no_of_claims] => 38 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A9/0058/20070058813.pdf [firstpage_image] =>[orig_patent_app_number] => 11342472 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/342472
Opportunistic use of null packets during encryption/decryption Jan 29, 2006 Issued
Array ( [id] => 4468978 [patent_doc_number] => 07936870 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-05-03 [patent_title] => 'Rotation of keys during encryption/decryption' [patent_app_type] => utility [patent_app_number] => 11/342460 [patent_app_country] => US [patent_app_date] => 2006-01-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 20 [patent_no_of_words] => 12343 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 117 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/936/07936870.pdf [firstpage_image] =>[orig_patent_app_number] => 11342460 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/342460
Rotation of keys during encryption/decryption Jan 29, 2006 Issued
Array ( [id] => 4445844 [patent_doc_number] => 07929704 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-04-19 [patent_title] => 'Modified triple wrap encryption/decryption system' [patent_app_type] => utility [patent_app_number] => 11/343060 [patent_app_country] => US [patent_app_date] => 2006-01-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 20 [patent_no_of_words] => 12315 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 193 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/929/07929704.pdf [firstpage_image] =>[orig_patent_app_number] => 11343060 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/343060
Modified triple wrap encryption/decryption system Jan 29, 2006 Issued
Array ( [id] => 5055891 [patent_doc_number] => 20070058813 [patent_country] => US [patent_kind] => A9 [patent_issue_date] => 2007-03-15 [patent_title] => 'Opportunistic use of null packets during encryption/decryption' [patent_app_type] => utility [patent_app_number] => 11/342472 [patent_app_country] => US [patent_app_date] => 2006-01-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 12346 [patent_no_of_claims] => 38 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A9/0058/20070058813.pdf [firstpage_image] =>[orig_patent_app_number] => 11342472 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/342472
Opportunistic use of null packets during encryption/decryption Jan 29, 2006 Issued
Array ( [id] => 8171179 [patent_doc_number] => 08176534 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-05-08 [patent_title] => 'Method and apparatus for provisioning a device to access digital rights management (DRM) services in a universal plug and play (UPnP) network' [patent_app_type] => utility [patent_app_number] => 11/323517 [patent_app_country] => US [patent_app_date] => 2005-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4900 [patent_no_of_claims] => 31 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 175 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/176/08176534.pdf [firstpage_image] =>[orig_patent_app_number] => 11323517 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/323517
Method and apparatus for provisioning a device to access digital rights management (DRM) services in a universal plug and play (UPnP) network Dec 29, 2005 Issued
Array ( [id] => 8366916 [patent_doc_number] => 08255996 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-08-28 [patent_title] => 'Network threat detection and mitigation' [patent_app_type] => utility [patent_app_number] => 11/322942 [patent_app_country] => US [patent_app_date] => 2005-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4334 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 255 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11322942 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/322942
Network threat detection and mitigation Dec 29, 2005 Issued
Array ( [id] => 4500388 [patent_doc_number] => 07886349 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-02-08 [patent_title] => 'State-full perimeter security for data networks' [patent_app_type] => utility [patent_app_number] => 11/323237 [patent_app_country] => US [patent_app_date] => 2005-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4164 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 228 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/886/07886349.pdf [firstpage_image] =>[orig_patent_app_number] => 11323237 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/323237
State-full perimeter security for data networks Dec 29, 2005 Issued
Array ( [id] => 4990971 [patent_doc_number] => 20070157312 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-07-05 [patent_title] => 'Unified networking diagnostics' [patent_app_type] => utility [patent_app_number] => 11/323341 [patent_app_country] => US [patent_app_date] => 2005-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 4461 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0157/20070157312.pdf [firstpage_image] =>[orig_patent_app_number] => 11323341 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/323341
Unified networking diagnostics Dec 29, 2005 Issued
Array ( [id] => 7746934 [patent_doc_number] => 08108923 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-01-31 [patent_title] => 'Assessing risk based on offline activity history' [patent_app_type] => utility [patent_app_number] => 11/324190 [patent_app_country] => US [patent_app_date] => 2005-12-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 4228 [patent_no_of_claims] => 37 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/108/08108923.pdf [firstpage_image] =>[orig_patent_app_number] => 11324190 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/324190
Assessing risk based on offline activity history Dec 28, 2005 Issued
Array ( [id] => 4528753 [patent_doc_number] => 07934229 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2011-04-26 [patent_title] => 'Generating options for repairing a computer infected with malicious software' [patent_app_type] => utility [patent_app_number] => 11/323388 [patent_app_country] => US [patent_app_date] => 2005-12-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4851 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 190 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/934/07934229.pdf [firstpage_image] =>[orig_patent_app_number] => 11323388 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/323388
Generating options for repairing a computer infected with malicious software Dec 28, 2005 Issued
Array ( [id] => 8424650 [patent_doc_number] => 08281148 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-10-02 [patent_title] => 'Securely computing a similarity measure' [patent_app_type] => utility [patent_app_number] => 11/718806 [patent_app_country] => US [patent_app_date] => 2005-11-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 4526 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 134 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11718806 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/718806
Securely computing a similarity measure Nov 8, 2005 Issued
Array ( [id] => 5809024 [patent_doc_number] => 20060095379 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-05-04 [patent_title] => 'Key management method in network system' [patent_app_type] => utility [patent_app_number] => 11/256167 [patent_app_country] => US [patent_app_date] => 2005-10-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 22 [patent_figures_cnt] => 22 [patent_no_of_words] => 8234 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0095/20060095379.pdf [firstpage_image] =>[orig_patent_app_number] => 11256167 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/256167
Key management method in network system Oct 23, 2005 Abandoned
Array ( [id] => 7993543 [patent_doc_number] => 08079080 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-12-13 [patent_title] => 'Method, system and computer program product for detecting security threats in a computer network' [patent_app_type] => utility [patent_app_number] => 11/255835 [patent_app_country] => US [patent_app_date] => 2005-10-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 21 [patent_no_of_words] => 13631 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 275 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/079/08079080.pdf [firstpage_image] =>[orig_patent_app_number] => 11255835 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/255835
Method, system and computer program product for detecting security threats in a computer network Oct 20, 2005 Issued
Array ( [id] => 5042215 [patent_doc_number] => 20070094497 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-04-26 [patent_title] => 'Secure authentication with voiced responses from a telecommunications terminal' [patent_app_type] => utility [patent_app_number] => 11/256224 [patent_app_country] => US [patent_app_date] => 2005-10-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 4580 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0094/20070094497.pdf [firstpage_image] =>[orig_patent_app_number] => 11256224 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/256224
Secure authentication with voiced responses from a telecommunications terminal Oct 20, 2005 Issued
Array ( [id] => 5150786 [patent_doc_number] => 20070050846 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-03-01 [patent_title] => 'Logging method, system, and device with analytical capabilities for the network traffic' [patent_app_type] => utility [patent_app_number] => 11/213719 [patent_app_country] => US [patent_app_date] => 2005-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 7492 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0050/20070050846.pdf [firstpage_image] =>[orig_patent_app_number] => 11213719 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/213719
Logging method, system, and device with analytical capabilities for the network traffic Aug 29, 2005 Abandoned
Array ( [id] => 5144067 [patent_doc_number] => 20070006283 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-01-04 [patent_title] => 'Identifying dependencies of an application upon a given security context' [patent_app_type] => utility [patent_app_number] => 11/214125 [patent_app_country] => US [patent_app_date] => 2005-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 7370 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0006/20070006283.pdf [firstpage_image] =>[orig_patent_app_number] => 11214125 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/214125
Identifying dependencies of an application upon a given security context Aug 28, 2005 Issued
Array ( [id] => 8158238 [patent_doc_number] => 08171299 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-05-01 [patent_title] => 'Data communication apparatus, data communication method, data communication program, and storage medium storing the program' [patent_app_type] => utility [patent_app_number] => 11/214009 [patent_app_country] => US [patent_app_date] => 2005-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 11768 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 244 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/171/08171299.pdf [firstpage_image] =>[orig_patent_app_number] => 11214009 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/214009
Data communication apparatus, data communication method, data communication program, and storage medium storing the program Aug 28, 2005 Issued
Array ( [id] => 48195 [patent_doc_number] => 07784101 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-08-24 [patent_title] => 'Identifying dependencies of an application upon a given security context' [patent_app_type] => utility [patent_app_number] => 11/214123 [patent_app_country] => US [patent_app_date] => 2005-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 7369 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 159 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/784/07784101.pdf [firstpage_image] =>[orig_patent_app_number] => 11214123 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/214123
Identifying dependencies of an application upon a given security context Aug 28, 2005 Issued
Menu