
Khang D. Do
Examiner (ID: 9762, Phone: (571)270-7837 , Office: P/2492 )
| Most Active Art Unit | 2492 |
| Art Unit(s) | 2496, 2492 |
| Total Applications | 469 |
| Issued Applications | 388 |
| Pending Applications | 29 |
| Abandoned Applications | 66 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10409088
[patent_doc_number] => 20150294098
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-15
[patent_title] => 'INFORMATION PROCESSING DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/644523
[patent_app_country] => US
[patent_app_date] => 2015-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8466
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644523
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/644523 | Information processing device | Mar 10, 2015 | Issued |
Array
(
[id] => 11616632
[patent_doc_number] => 09654503
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-05-16
[patent_title] => 'Systems and methods for evaluating networks'
[patent_app_type] => utility
[patent_app_number] => 14/644691
[patent_app_country] => US
[patent_app_date] => 2015-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12615
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 304
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644691
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/644691 | Systems and methods for evaluating networks | Mar 10, 2015 | Issued |
Array
(
[id] => 10410902
[patent_doc_number] => 20150295911
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-15
[patent_title] => 'APPARATUS AND METHOD FOR CONTROLLING AUTHORIZATION TO ACCESS RESOURCES IN A COMMUNICATION NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/644659
[patent_app_country] => US
[patent_app_date] => 2015-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10227
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644659
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/644659 | APPARATUS AND METHOD FOR CONTROLLING AUTHORIZATION TO ACCESS RESOURCES IN A COMMUNICATION NETWORK | Mar 10, 2015 | Abandoned |
Array
(
[id] => 10379062
[patent_doc_number] => 20150264069
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'METHOD AND SYSTEM FOR DETECTING EXTERNAL CONTROL OF COMPROMISED HOSTS'
[patent_app_type] => utility
[patent_app_number] => 14/644177
[patent_app_country] => US
[patent_app_date] => 2015-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7545
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644177
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/644177 | Method and system for detecting external control of compromised hosts | Mar 9, 2015 | Issued |
Array
(
[id] => 11565906
[patent_doc_number] => 09628512
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-18
[patent_title] => 'Malicious relay detection on networks'
[patent_app_type] => utility
[patent_app_number] => 14/644186
[patent_app_country] => US
[patent_app_date] => 2015-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 8069
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644186
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/644186 | Malicious relay detection on networks | Mar 9, 2015 | Issued |
Array
(
[id] => 11072409
[patent_doc_number] => 20160269374
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-15
[patent_title] => 'INTERNET OF THINGS GROUP FORMATION USING A KEY-BASED JOIN PROTOCOL'
[patent_app_type] => utility
[patent_app_number] => 14/643964
[patent_app_country] => US
[patent_app_date] => 2015-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8724
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14643964
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/643964 | Internet of things group formation using a key-based join protocol | Mar 9, 2015 | Issued |
Array
(
[id] => 10379063
[patent_doc_number] => 20150264070
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'METHOD AND SYSTEM FOR DETECTING ALGORITHM-GENERATED DOMAINS'
[patent_app_type] => utility
[patent_app_number] => 14/644194
[patent_app_country] => US
[patent_app_date] => 2015-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5920
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644194
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/644194 | Method and system for detecting algorithm-generated domains | Mar 9, 2015 | Issued |
Array
(
[id] => 10379071
[patent_doc_number] => 20150264078
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'DETECTING NETWORK RECONNAISSANCE BY TRACKING INTRANET DARK-NET COMMUNICATIONS'
[patent_app_type] => utility
[patent_app_number] => 14/644182
[patent_app_country] => US
[patent_app_date] => 2015-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 7264
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644182
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/644182 | Detecting network reconnaissance by tracking intranet dark-net communications | Mar 9, 2015 | Issued |
Array
(
[id] => 11803371
[patent_doc_number] => 09544302
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-01-10
[patent_title] => 'Systems and methods for empowering IP practitioners'
[patent_app_type] => utility
[patent_app_number] => 14/629038
[patent_app_country] => US
[patent_app_date] => 2015-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4737
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14629038
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/629038 | Systems and methods for empowering IP practitioners | Feb 22, 2015 | Issued |
Array
(
[id] => 11398882
[patent_doc_number] => 20170019420
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-19
[patent_title] => 'DEVICE AND METHOD FOR DETECTING MANIPULATION OF A PROGRAM CODE'
[patent_app_type] => utility
[patent_app_number] => 15/124758
[patent_app_country] => US
[patent_app_date] => 2015-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4035
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15124758
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/124758 | Device and method for detecting manipulation of a program code | Feb 8, 2015 | Issued |
Array
(
[id] => 11717293
[patent_doc_number] => 20170185792
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-29
[patent_title] => 'MOBILE TERMINAL, DISPLAYING SYSTEM, DISPLAY CONTROLLING METHOD, AND RECORDING MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 15/129343
[patent_app_country] => US
[patent_app_date] => 2015-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5132
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15129343
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/129343 | MOBILE TERMINAL, DISPLAYING SYSTEM, DISPLAY CONTROLLING METHOD, AND RECORDING MEDIUM | Jan 20, 2015 | Abandoned |
Array
(
[id] => 13122987
[patent_doc_number] => 10079857
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-18
[patent_title] => Method of slowing down a communication in a network
[patent_app_type] => utility
[patent_app_number] => 15/107759
[patent_app_country] => US
[patent_app_date] => 2014-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6324
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15107759
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/107759 | Method of slowing down a communication in a network | Dec 15, 2014 | Issued |
Array
(
[id] => 15137523
[patent_doc_number] => 10482234
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-19
[patent_title] => Controlling authorization within computer systems
[patent_app_type] => utility
[patent_app_number] => 15/107828
[patent_app_country] => US
[patent_app_date] => 2014-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 15
[patent_no_of_words] => 8428
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15107828
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/107828 | Controlling authorization within computer systems | Dec 9, 2014 | Issued |
Array
(
[id] => 15612671
[patent_doc_number] => 10587417
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-10
[patent_title] => Document encryption prompt method and system
[patent_app_type] => utility
[patent_app_number] => 15/108180
[patent_app_country] => US
[patent_app_date] => 2014-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 6
[patent_no_of_words] => 3626
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15108180
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/108180 | Document encryption prompt method and system | Nov 24, 2014 | Issued |
Array
(
[id] => 10742320
[patent_doc_number] => 20160088471
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'SYSTEM FOR SECURELY ENTERING PARTICULAR INFORMATION AND METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/527755
[patent_app_country] => US
[patent_app_date] => 2014-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8325
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14527755
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/527755 | System for securely entering particular information and method thereof | Oct 28, 2014 | Issued |
Array
(
[id] => 11905180
[patent_doc_number] => 09774631
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-26
[patent_title] => 'TLS connection abandoning'
[patent_app_type] => utility
[patent_app_number] => 14/527475
[patent_app_country] => US
[patent_app_date] => 2014-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 8258
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14527475
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/527475 | TLS connection abandoning | Oct 28, 2014 | Issued |
Array
(
[id] => 10771342
[patent_doc_number] => 20160117497
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'COMPUTING PLATFORM SECURITY METHODS AND APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 14/523884
[patent_app_country] => US
[patent_app_date] => 2014-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 31126
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14523884
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/523884 | Computing platform security methods and apparatus | Oct 24, 2014 | Issued |
Array
(
[id] => 10771341
[patent_doc_number] => 20160117498
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'COMPUTING PLATFORM SECURITY METHODS AND APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 14/523886
[patent_app_country] => US
[patent_app_date] => 2014-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 31126
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14523886
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/523886 | Computing platform security methods and apparatus | Oct 24, 2014 | Issued |
Array
(
[id] => 10646202
[patent_doc_number] => 09363087
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-07
[patent_title] => 'End-to-end security for hardware running verified software'
[patent_app_type] => utility
[patent_app_number] => 14/505236
[patent_app_country] => US
[patent_app_date] => 2014-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 15968
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14505236
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/505236 | End-to-end security for hardware running verified software | Oct 1, 2014 | Issued |
Array
(
[id] => 10748389
[patent_doc_number] => 20160094539
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-31
[patent_title] => 'SYSTEMS AND METHODS FOR PERFORMING SINGLE SIGN-ON BY AN INTERMEDIARY DEVICE FOR A REMOTE DESKTOP SESSION OF A CLIENT'
[patent_app_type] => utility
[patent_app_number] => 14/502598
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 40188
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14502598
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/502598 | Systems and methods for performing single sign-on by an intermediary device for a remote desktop session of a client | Sep 29, 2014 | Issued |