
Khang D. Do
Examiner (ID: 9762, Phone: (571)270-7837 , Office: P/2492 )
| Most Active Art Unit | 2492 |
| Art Unit(s) | 2496, 2492 |
| Total Applications | 469 |
| Issued Applications | 388 |
| Pending Applications | 29 |
| Abandoned Applications | 66 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12224788
[patent_doc_number] => 20180063147
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-01
[patent_title] => 'NETWORK CONTENT RATING BASED ON PUBLIC RATING DATABASE'
[patent_app_type] => utility
[patent_app_number] => 15/246114
[patent_app_country] => US
[patent_app_date] => 2016-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8846
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15246114
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/246114 | NETWORK CONTENT RATING BASED ON PUBLIC RATING DATABASE | Aug 23, 2016 | Abandoned |
Array
(
[id] => 11556960
[patent_doc_number] => 20170103206
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-13
[patent_title] => 'METHOD AND APPARATUS FOR CAPTURING OPERATION IN A CONTAINER-BASED VIRTUALIZATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/237940
[patent_app_country] => US
[patent_app_date] => 2016-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5833
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15237940
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/237940 | Method and apparatus for capturing operation in a container-based virtualization system | Aug 15, 2016 | Issued |
Array
(
[id] => 14400169
[patent_doc_number] => 10313384
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-06-04
[patent_title] => Mitigation of security risk vulnerabilities in an enterprise network
[patent_app_type] => utility
[patent_app_number] => 15/234980
[patent_app_country] => US
[patent_app_date] => 2016-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 10326
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15234980
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/234980 | Mitigation of security risk vulnerabilities in an enterprise network | Aug 10, 2016 | Issued |
Array
(
[id] => 14601737
[patent_doc_number] => 10354061
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-16
[patent_title] => Methods and systems for authenticating a headset for a transportation vehicle
[patent_app_type] => utility
[patent_app_number] => 15/218889
[patent_app_country] => US
[patent_app_date] => 2016-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4901
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15218889
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/218889 | Methods and systems for authenticating a headset for a transportation vehicle | Jul 24, 2016 | Issued |
Array
(
[id] => 11405847
[patent_doc_number] => 20170026385
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-26
[patent_title] => 'METHOD AND SYSTEM FOR PROXIMITY-BASED ACCESS CONTROL'
[patent_app_type] => utility
[patent_app_number] => 15/217171
[patent_app_country] => US
[patent_app_date] => 2016-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5495
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15217171
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/217171 | METHOD AND SYSTEM FOR PROXIMITY-BASED ACCESS CONTROL | Jul 21, 2016 | Abandoned |
Array
(
[id] => 17038931
[patent_doc_number] => 11096048
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-17
[patent_title] => Identity authentication method and communications terminal
[patent_app_type] => utility
[patent_app_number] => 16/313036
[patent_app_country] => US
[patent_app_date] => 2016-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 11382
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16313036
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/313036 | Identity authentication method and communications terminal | Jun 29, 2016 | Issued |
Array
(
[id] => 15377703
[patent_doc_number] => 10530587
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-07
[patent_title] => Web scale authentication
[patent_app_type] => utility
[patent_app_number] => 15/199097
[patent_app_country] => US
[patent_app_date] => 2016-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 1961
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15199097
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/199097 | Web scale authentication | Jun 29, 2016 | Issued |
Array
(
[id] => 11352749
[patent_doc_number] => 20160371489
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'EVENT ANOMALY ANALYSIS AND PREDICTION'
[patent_app_type] => utility
[patent_app_number] => 15/184607
[patent_app_country] => US
[patent_app_date] => 2016-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12045
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15184607
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/184607 | Event anomaly analysis and prediction | Jun 15, 2016 | Issued |
Array
(
[id] => 11110012
[patent_doc_number] => 20160306982
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-20
[patent_title] => 'SYSTEM AND METHOD FOR PROVIDING A CRYPTOGRAPHIC PLATFORM FOR EXCHANGING INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 15/183708
[patent_app_country] => US
[patent_app_date] => 2016-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8315
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15183708
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/183708 | System and method for providing a cryptographic platform for exchanging information | Jun 14, 2016 | Issued |
Array
(
[id] => 11338810
[patent_doc_number] => 20160364565
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'AUTHENTICATION AND SECURE COMMUNICATION WITH APPLICATION EXTENSIONS'
[patent_app_type] => utility
[patent_app_number] => 15/179423
[patent_app_country] => US
[patent_app_date] => 2016-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3303
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15179423
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/179423 | Authentication and secure communication with application extensions | Jun 9, 2016 | Issued |
Array
(
[id] => 11761049
[patent_doc_number] => 20170207918
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-20
[patent_title] => 'CRYPTOGRAPHY ON AN ELLIPTICAL CURVE'
[patent_app_type] => utility
[patent_app_number] => 15/178528
[patent_app_country] => US
[patent_app_date] => 2016-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6905
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178528
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/178528 | CRYPTOGRAPHY ON AN ELLIPTICAL CURVE | Jun 8, 2016 | Abandoned |
Array
(
[id] => 11825590
[patent_doc_number] => 20170214527
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-27
[patent_title] => 'CRYPTOGRAPHY ON A SIMPLIFIED ELLIPTICAL CURVE'
[patent_app_type] => utility
[patent_app_number] => 15/178478
[patent_app_country] => US
[patent_app_date] => 2016-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4822
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178478
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/178478 | Cryptography on a simplified elliptical curve | Jun 8, 2016 | Issued |
Array
(
[id] => 13693709
[patent_doc_number] => 20170357809
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => SYSTEMS AND METHODS FOR FLAW ATTRIBUTION AND CORRELATION
[patent_app_type] => utility
[patent_app_number] => 15/176911
[patent_app_country] => US
[patent_app_date] => 2016-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5346
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -28
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15176911
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/176911 | Flaw attribution and correlation | Jun 7, 2016 | Issued |
Array
(
[id] => 14302901
[patent_doc_number] => 10291591
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-14
[patent_title] => Anti-eavesdropping system for mobile phone communication
[patent_app_type] => utility
[patent_app_number] => 15/166263
[patent_app_country] => US
[patent_app_date] => 2016-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7384
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 435
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15166263
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/166263 | Anti-eavesdropping system for mobile phone communication | May 26, 2016 | Issued |
Array
(
[id] => 11709393
[patent_doc_number] => 20170177892
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-22
[patent_title] => 'MULTI-DOMAIN APPLICATION EXECUTION MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 15/164673
[patent_app_country] => US
[patent_app_date] => 2016-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11131
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15164673
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/164673 | Multi-domain application execution management | May 24, 2016 | Issued |
Array
(
[id] => 12062831
[patent_doc_number] => 20170339175
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-23
[patent_title] => 'USING NATURAL LANGUAGE PROCESSING FOR DETECTION OF INTENDED OR UNEXPECTED APPLICATION BEHAVIOR'
[patent_app_type] => utility
[patent_app_number] => 15/159526
[patent_app_country] => US
[patent_app_date] => 2016-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3693
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15159526
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/159526 | Using natural language processing for detection of intended or unexpected application behavior | May 18, 2016 | Issued |
Array
(
[id] => 11426064
[patent_doc_number] => 20170034210
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-02
[patent_title] => 'CLIENT SIDE HUMAN USER INDICATOR'
[patent_app_type] => utility
[patent_app_number] => 15/147577
[patent_app_country] => US
[patent_app_date] => 2016-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7167
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15147577
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/147577 | CLIENT SIDE HUMAN USER INDICATOR | May 4, 2016 | Abandoned |
Array
(
[id] => 11051824
[patent_doc_number] => 20160248784
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-25
[patent_title] => 'AUTHENTICATING APPARATUS, AUTHENTICATING SYSTEM AND STORAGE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 15/145113
[patent_app_country] => US
[patent_app_date] => 2016-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 15340
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15145113
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/145113 | Authenticating apparatus, authenticating system and storage medium | May 2, 2016 | Issued |
Array
(
[id] => 13272701
[patent_doc_number] => 10148442
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-04
[patent_title] => End-to-end security for hardware running verified software
[patent_app_type] => utility
[patent_app_number] => 15/144200
[patent_app_country] => US
[patent_app_date] => 2016-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 14498
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15144200
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/144200 | End-to-end security for hardware running verified software | May 1, 2016 | Issued |
Array
(
[id] => 11052248
[patent_doc_number] => 20160249209
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-25
[patent_title] => 'Negotiation Processing Method for Security Algorithm, Control Network Element, and Control System'
[patent_app_type] => utility
[patent_app_number] => 15/143095
[patent_app_country] => US
[patent_app_date] => 2016-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10669
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15143095
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/143095 | Negotiation processing method for security algorithm, control network element, and control system | Apr 28, 2016 | Issued |