
Khang D. Do
Examiner (ID: 9762, Phone: (571)270-7837 , Office: P/2492 )
| Most Active Art Unit | 2492 |
| Art Unit(s) | 2496, 2492 |
| Total Applications | 469 |
| Issued Applications | 388 |
| Pending Applications | 29 |
| Abandoned Applications | 66 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13669553
[patent_doc_number] => 10164970
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-12-25
[patent_title] => Secure cross-domain page generation
[patent_app_type] => utility
[patent_app_number] => 15/806734
[patent_app_country] => US
[patent_app_date] => 2017-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 12193
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15806734
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/806734 | Secure cross-domain page generation | Nov 7, 2017 | Issued |
Array
(
[id] => 15017559
[patent_doc_number] => 10454954
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Automated detection of phishing campaigns via social media
[patent_app_type] => utility
[patent_app_number] => 15/805046
[patent_app_country] => US
[patent_app_date] => 2017-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8349
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15805046
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/805046 | Automated detection of phishing campaigns via social media | Nov 5, 2017 | Issued |
Array
(
[id] => 15236481
[patent_doc_number] => 10505981
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-10
[patent_title] => Techniques for detecting malicious behavior using an accomplice model
[patent_app_type] => utility
[patent_app_number] => 15/803736
[patent_app_country] => US
[patent_app_date] => 2017-11-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 13524
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15803736
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/803736 | Techniques for detecting malicious behavior using an accomplice model | Nov 2, 2017 | Issued |
Array
(
[id] => 16355479
[patent_doc_number] => 10795991
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-10-06
[patent_title] => Enterprise search
[patent_app_type] => utility
[patent_app_number] => 15/803669
[patent_app_country] => US
[patent_app_date] => 2017-11-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11233
[patent_no_of_claims] => 59
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15803669
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/803669 | Enterprise search | Nov 2, 2017 | Issued |
Array
(
[id] => 14239929
[patent_doc_number] => 20190132137
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-02
[patent_title] => LOW NOISE PHYSICALLY UNCLONABLE FUNCTION (PUF) CELL
[patent_app_type] => utility
[patent_app_number] => 15/802354
[patent_app_country] => US
[patent_app_date] => 2017-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6392
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 48
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15802354
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/802354 | LOW NOISE PHYSICALLY UNCLONABLE FUNCTION (PUF) CELL | Nov 1, 2017 | Abandoned |
Array
(
[id] => 14239909
[patent_doc_number] => 20190132127
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-02
[patent_title] => POSTPONING ENTROPY DEPLETION IN KEY MANAGEMENT SYSTEMS WITH HARDWARE SECURITY MODULES
[patent_app_type] => utility
[patent_app_number] => 15/800173
[patent_app_country] => US
[patent_app_date] => 2017-11-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9247
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15800173
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/800173 | Postponing entropy depletion in key management systems with hardware security modules | Oct 31, 2017 | Issued |
Array
(
[id] => 12190092
[patent_doc_number] => 20180049028
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-15
[patent_title] => 'Method and System for Authenticating an Individual\'s Geo-Location Via a Communication Network and Applications Using the Same'
[patent_app_type] => utility
[patent_app_number] => 15/790328
[patent_app_country] => US
[patent_app_date] => 2017-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 10133
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15790328
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/790328 | Method and system for authenticating an individual's geo-location via a communication network and applications using the same | Oct 22, 2017 | Issued |
Array
(
[id] => 14022925
[patent_doc_number] => 20190073456
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-07
[patent_title] => METHOD AND SYSTEM FOR CONTROLLING ACCESS TO ELECTRONIC DEVICE
[patent_app_type] => utility
[patent_app_number] => 15/791254
[patent_app_country] => US
[patent_app_date] => 2017-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1755
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15791254
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/791254 | METHOD AND SYSTEM FOR CONTROLLING ACCESS TO ELECTRONIC DEVICE | Oct 22, 2017 | Abandoned |
Array
(
[id] => 14127413
[patent_doc_number] => 10250585
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-04-02
[patent_title] => Identity migration between organizations
[patent_app_type] => utility
[patent_app_number] => 15/784740
[patent_app_country] => US
[patent_app_date] => 2017-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6227
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15784740
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/784740 | Identity migration between organizations | Oct 15, 2017 | Issued |
Array
(
[id] => 12130161
[patent_doc_number] => 20180013747
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-11
[patent_title] => 'Controlling Access to Resources on a Network'
[patent_app_type] => utility
[patent_app_number] => 15/713750
[patent_app_country] => US
[patent_app_date] => 2017-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7322
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15713750
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/713750 | Controlling access to resources on a network | Sep 24, 2017 | Issued |
Array
(
[id] => 17639111
[patent_doc_number] => 11349852
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-31
[patent_title] => Apparatus and methods for network-based line-rate detection of unknown malware
[patent_app_type] => utility
[patent_app_number] => 16/329514
[patent_app_country] => US
[patent_app_date] => 2017-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 8960
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16329514
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/329514 | Apparatus and methods for network-based line-rate detection of unknown malware | Aug 29, 2017 | Issued |
Array
(
[id] => 13696443
[patent_doc_number] => 20170359176
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => CRYPTOGRAPHY ON AN ELLIPTICAL CURVE
[patent_app_type] => utility
[patent_app_number] => 15/671064
[patent_app_country] => US
[patent_app_date] => 2017-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6424
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 317
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15671064
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/671064 | Cryptography on an elliptical curve | Aug 6, 2017 | Issued |
Array
(
[id] => 16265622
[patent_doc_number] => 10757076
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-25
[patent_title] => Enhanced network processing of virtual node data packets
[patent_app_type] => utility
[patent_app_number] => 15/655422
[patent_app_country] => US
[patent_app_date] => 2017-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7046
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15655422
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/655422 | Enhanced network processing of virtual node data packets | Jul 19, 2017 | Issued |
Array
(
[id] => 11998294
[patent_doc_number] => 20170302449
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-19
[patent_title] => 'SECURE APP-TO-APP COMMUNICATION'
[patent_app_type] => utility
[patent_app_number] => 15/639012
[patent_app_country] => US
[patent_app_date] => 2017-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 10512
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15639012
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/639012 | Secure app-to-app communication | Jun 29, 2017 | Issued |
Array
(
[id] => 13787837
[patent_doc_number] => 20190007457
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-03
[patent_title] => Access Policies Based on HDFS Extended Attributes
[patent_app_type] => utility
[patent_app_number] => 15/640248
[patent_app_country] => US
[patent_app_date] => 2017-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4867
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15640248
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/640248 | Access policies based on HDFS extended attributes | Jun 29, 2017 | Issued |
Array
(
[id] => 11982019
[patent_doc_number] => 20170286172
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-05
[patent_title] => 'COMPUTING PLATFORM SECURITY METHODS AND APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 15/632235
[patent_app_country] => US
[patent_app_date] => 2017-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 31164
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15632235
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/632235 | Computing platform security methods and apparatus | Jun 22, 2017 | Issued |
Array
(
[id] => 13083703
[patent_doc_number] => 10061919
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-28
[patent_title] => Computing platform security methods and apparatus
[patent_app_type] => utility
[patent_app_number] => 15/632237
[patent_app_country] => US
[patent_app_date] => 2017-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 30249
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15632237
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/632237 | Computing platform security methods and apparatus | Jun 22, 2017 | Issued |
Array
(
[id] => 16200976
[patent_doc_number] => 10726143
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-07-28
[patent_title] => Staggered secure data receipt
[patent_app_type] => utility
[patent_app_number] => 15/616314
[patent_app_country] => US
[patent_app_date] => 2017-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7257
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 70
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15616314
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/616314 | Staggered secure data receipt | Jun 6, 2017 | Issued |
Array
(
[id] => 15017001
[patent_doc_number] => 10454672
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Systems and methods for preventing session fixation over a domain portal
[patent_app_type] => utility
[patent_app_number] => 15/605563
[patent_app_country] => US
[patent_app_date] => 2017-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8952
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15605563
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/605563 | Systems and methods for preventing session fixation over a domain portal | May 24, 2017 | Issued |
Array
(
[id] => 13541519
[patent_doc_number] => 20180322306
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-08
[patent_title] => Techniques and Architectures for Selective Obfuscation of Personally Identifiable Information (PII) in Environments Capable of Replicating Data
[patent_app_type] => utility
[patent_app_number] => 15/600521
[patent_app_country] => US
[patent_app_date] => 2017-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6078
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15600521
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/600521 | Techniques and architectures for selective obfuscation of personally identifiable information (PII) in environments capable of replicating data | May 18, 2017 | Issued |