Search

Khang D. Do

Examiner (ID: 9762, Phone: (571)270-7837 , Office: P/2492 )

Most Active Art Unit
2492
Art Unit(s)
2496, 2492
Total Applications
469
Issued Applications
388
Pending Applications
29
Abandoned Applications
66

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 12224788 [patent_doc_number] => 20180063147 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-01 [patent_title] => 'NETWORK CONTENT RATING BASED ON PUBLIC RATING DATABASE' [patent_app_type] => utility [patent_app_number] => 15/246114 [patent_app_country] => US [patent_app_date] => 2016-08-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8846 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15246114 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/246114
NETWORK CONTENT RATING BASED ON PUBLIC RATING DATABASE Aug 23, 2016 Abandoned
Array ( [id] => 11556960 [patent_doc_number] => 20170103206 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-04-13 [patent_title] => 'METHOD AND APPARATUS FOR CAPTURING OPERATION IN A CONTAINER-BASED VIRTUALIZATION SYSTEM' [patent_app_type] => utility [patent_app_number] => 15/237940 [patent_app_country] => US [patent_app_date] => 2016-08-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5833 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15237940 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/237940
Method and apparatus for capturing operation in a container-based virtualization system Aug 15, 2016 Issued
Array ( [id] => 14400169 [patent_doc_number] => 10313384 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-06-04 [patent_title] => Mitigation of security risk vulnerabilities in an enterprise network [patent_app_type] => utility [patent_app_number] => 15/234980 [patent_app_country] => US [patent_app_date] => 2016-08-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 14 [patent_no_of_words] => 10326 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 146 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15234980 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/234980
Mitigation of security risk vulnerabilities in an enterprise network Aug 10, 2016 Issued
Array ( [id] => 14601737 [patent_doc_number] => 10354061 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-16 [patent_title] => Methods and systems for authenticating a headset for a transportation vehicle [patent_app_type] => utility [patent_app_number] => 15/218889 [patent_app_country] => US [patent_app_date] => 2016-07-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4901 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15218889 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/218889
Methods and systems for authenticating a headset for a transportation vehicle Jul 24, 2016 Issued
Array ( [id] => 11405847 [patent_doc_number] => 20170026385 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-26 [patent_title] => 'METHOD AND SYSTEM FOR PROXIMITY-BASED ACCESS CONTROL' [patent_app_type] => utility [patent_app_number] => 15/217171 [patent_app_country] => US [patent_app_date] => 2016-07-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5495 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15217171 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/217171
METHOD AND SYSTEM FOR PROXIMITY-BASED ACCESS CONTROL Jul 21, 2016 Abandoned
Array ( [id] => 17038931 [patent_doc_number] => 11096048 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-08-17 [patent_title] => Identity authentication method and communications terminal [patent_app_type] => utility [patent_app_number] => 16/313036 [patent_app_country] => US [patent_app_date] => 2016-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 11382 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 265 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16313036 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/313036
Identity authentication method and communications terminal Jun 29, 2016 Issued
Array ( [id] => 15377703 [patent_doc_number] => 10530587 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-01-07 [patent_title] => Web scale authentication [patent_app_type] => utility [patent_app_number] => 15/199097 [patent_app_country] => US [patent_app_date] => 2016-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 1 [patent_no_of_words] => 1961 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15199097 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/199097
Web scale authentication Jun 29, 2016 Issued
Array ( [id] => 11352749 [patent_doc_number] => 20160371489 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-22 [patent_title] => 'EVENT ANOMALY ANALYSIS AND PREDICTION' [patent_app_type] => utility [patent_app_number] => 15/184607 [patent_app_country] => US [patent_app_date] => 2016-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 12045 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15184607 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/184607
Event anomaly analysis and prediction Jun 15, 2016 Issued
Array ( [id] => 11110012 [patent_doc_number] => 20160306982 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-20 [patent_title] => 'SYSTEM AND METHOD FOR PROVIDING A CRYPTOGRAPHIC PLATFORM FOR EXCHANGING INFORMATION' [patent_app_type] => utility [patent_app_number] => 15/183708 [patent_app_country] => US [patent_app_date] => 2016-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 8315 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15183708 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/183708
System and method for providing a cryptographic platform for exchanging information Jun 14, 2016 Issued
Array ( [id] => 11338810 [patent_doc_number] => 20160364565 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-15 [patent_title] => 'AUTHENTICATION AND SECURE COMMUNICATION WITH APPLICATION EXTENSIONS' [patent_app_type] => utility [patent_app_number] => 15/179423 [patent_app_country] => US [patent_app_date] => 2016-06-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3303 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15179423 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/179423
Authentication and secure communication with application extensions Jun 9, 2016 Issued
Array ( [id] => 11761049 [patent_doc_number] => 20170207918 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-07-20 [patent_title] => 'CRYPTOGRAPHY ON AN ELLIPTICAL CURVE' [patent_app_type] => utility [patent_app_number] => 15/178528 [patent_app_country] => US [patent_app_date] => 2016-06-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6905 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178528 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/178528
CRYPTOGRAPHY ON AN ELLIPTICAL CURVE Jun 8, 2016 Abandoned
Array ( [id] => 11825590 [patent_doc_number] => 20170214527 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-07-27 [patent_title] => 'CRYPTOGRAPHY ON A SIMPLIFIED ELLIPTICAL CURVE' [patent_app_type] => utility [patent_app_number] => 15/178478 [patent_app_country] => US [patent_app_date] => 2016-06-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4822 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178478 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/178478
Cryptography on a simplified elliptical curve Jun 8, 2016 Issued
Array ( [id] => 13693709 [patent_doc_number] => 20170357809 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-12-14 [patent_title] => SYSTEMS AND METHODS FOR FLAW ATTRIBUTION AND CORRELATION [patent_app_type] => utility [patent_app_number] => 15/176911 [patent_app_country] => US [patent_app_date] => 2016-06-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5346 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -28 [patent_words_short_claim] => 84 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15176911 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/176911
Flaw attribution and correlation Jun 7, 2016 Issued
Array ( [id] => 14302901 [patent_doc_number] => 10291591 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-05-14 [patent_title] => Anti-eavesdropping system for mobile phone communication [patent_app_type] => utility [patent_app_number] => 15/166263 [patent_app_country] => US [patent_app_date] => 2016-05-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 7384 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 435 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15166263 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/166263
Anti-eavesdropping system for mobile phone communication May 26, 2016 Issued
Array ( [id] => 11709393 [patent_doc_number] => 20170177892 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-06-22 [patent_title] => 'MULTI-DOMAIN APPLICATION EXECUTION MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 15/164673 [patent_app_country] => US [patent_app_date] => 2016-05-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 11131 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15164673 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/164673
Multi-domain application execution management May 24, 2016 Issued
Array ( [id] => 12062831 [patent_doc_number] => 20170339175 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-11-23 [patent_title] => 'USING NATURAL LANGUAGE PROCESSING FOR DETECTION OF INTENDED OR UNEXPECTED APPLICATION BEHAVIOR' [patent_app_type] => utility [patent_app_number] => 15/159526 [patent_app_country] => US [patent_app_date] => 2016-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3693 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15159526 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/159526
Using natural language processing for detection of intended or unexpected application behavior May 18, 2016 Issued
Array ( [id] => 11426064 [patent_doc_number] => 20170034210 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-02-02 [patent_title] => 'CLIENT SIDE HUMAN USER INDICATOR' [patent_app_type] => utility [patent_app_number] => 15/147577 [patent_app_country] => US [patent_app_date] => 2016-05-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 7167 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15147577 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/147577
CLIENT SIDE HUMAN USER INDICATOR May 4, 2016 Abandoned
Array ( [id] => 11051824 [patent_doc_number] => 20160248784 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-08-25 [patent_title] => 'AUTHENTICATING APPARATUS, AUTHENTICATING SYSTEM AND STORAGE MEDIUM' [patent_app_type] => utility [patent_app_number] => 15/145113 [patent_app_country] => US [patent_app_date] => 2016-05-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 15340 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15145113 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/145113
Authenticating apparatus, authenticating system and storage medium May 2, 2016 Issued
Array ( [id] => 13272701 [patent_doc_number] => 10148442 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-12-04 [patent_title] => End-to-end security for hardware running verified software [patent_app_type] => utility [patent_app_number] => 15/144200 [patent_app_country] => US [patent_app_date] => 2016-05-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 14498 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15144200 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/144200
End-to-end security for hardware running verified software May 1, 2016 Issued
Array ( [id] => 11052248 [patent_doc_number] => 20160249209 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-08-25 [patent_title] => 'Negotiation Processing Method for Security Algorithm, Control Network Element, and Control System' [patent_app_type] => utility [patent_app_number] => 15/143095 [patent_app_country] => US [patent_app_date] => 2016-04-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 10669 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15143095 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/143095
Negotiation processing method for security algorithm, control network element, and control system Apr 28, 2016 Issued
Menu