Search

Khang D. Do

Examiner (ID: 9762, Phone: (571)270-7837 , Office: P/2492 )

Most Active Art Unit
2492
Art Unit(s)
2496, 2492
Total Applications
469
Issued Applications
388
Pending Applications
29
Abandoned Applications
66

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10409088 [patent_doc_number] => 20150294098 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-15 [patent_title] => 'INFORMATION PROCESSING DEVICE' [patent_app_type] => utility [patent_app_number] => 14/644523 [patent_app_country] => US [patent_app_date] => 2015-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8466 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644523 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/644523
Information processing device Mar 10, 2015 Issued
Array ( [id] => 11616632 [patent_doc_number] => 09654503 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-05-16 [patent_title] => 'Systems and methods for evaluating networks' [patent_app_type] => utility [patent_app_number] => 14/644691 [patent_app_country] => US [patent_app_date] => 2015-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 12615 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 304 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644691 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/644691
Systems and methods for evaluating networks Mar 10, 2015 Issued
Array ( [id] => 10410902 [patent_doc_number] => 20150295911 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-15 [patent_title] => 'APPARATUS AND METHOD FOR CONTROLLING AUTHORIZATION TO ACCESS RESOURCES IN A COMMUNICATION NETWORK' [patent_app_type] => utility [patent_app_number] => 14/644659 [patent_app_country] => US [patent_app_date] => 2015-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 10227 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644659 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/644659
APPARATUS AND METHOD FOR CONTROLLING AUTHORIZATION TO ACCESS RESOURCES IN A COMMUNICATION NETWORK Mar 10, 2015 Abandoned
Array ( [id] => 10379062 [patent_doc_number] => 20150264069 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'METHOD AND SYSTEM FOR DETECTING EXTERNAL CONTROL OF COMPROMISED HOSTS' [patent_app_type] => utility [patent_app_number] => 14/644177 [patent_app_country] => US [patent_app_date] => 2015-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 7545 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644177 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/644177
Method and system for detecting external control of compromised hosts Mar 9, 2015 Issued
Array ( [id] => 11565906 [patent_doc_number] => 09628512 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-04-18 [patent_title] => 'Malicious relay detection on networks' [patent_app_type] => utility [patent_app_number] => 14/644186 [patent_app_country] => US [patent_app_date] => 2015-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 8069 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 160 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644186 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/644186
Malicious relay detection on networks Mar 9, 2015 Issued
Array ( [id] => 11072409 [patent_doc_number] => 20160269374 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-09-15 [patent_title] => 'INTERNET OF THINGS GROUP FORMATION USING A KEY-BASED JOIN PROTOCOL' [patent_app_type] => utility [patent_app_number] => 14/643964 [patent_app_country] => US [patent_app_date] => 2015-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8724 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14643964 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/643964
Internet of things group formation using a key-based join protocol Mar 9, 2015 Issued
Array ( [id] => 10379063 [patent_doc_number] => 20150264070 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'METHOD AND SYSTEM FOR DETECTING ALGORITHM-GENERATED DOMAINS' [patent_app_type] => utility [patent_app_number] => 14/644194 [patent_app_country] => US [patent_app_date] => 2015-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 5920 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644194 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/644194
Method and system for detecting algorithm-generated domains Mar 9, 2015 Issued
Array ( [id] => 10379071 [patent_doc_number] => 20150264078 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'DETECTING NETWORK RECONNAISSANCE BY TRACKING INTRANET DARK-NET COMMUNICATIONS' [patent_app_type] => utility [patent_app_number] => 14/644182 [patent_app_country] => US [patent_app_date] => 2015-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 7264 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644182 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/644182
Detecting network reconnaissance by tracking intranet dark-net communications Mar 9, 2015 Issued
Array ( [id] => 11803371 [patent_doc_number] => 09544302 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-01-10 [patent_title] => 'Systems and methods for empowering IP practitioners' [patent_app_type] => utility [patent_app_number] => 14/629038 [patent_app_country] => US [patent_app_date] => 2015-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 4737 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 188 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14629038 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/629038
Systems and methods for empowering IP practitioners Feb 22, 2015 Issued
Array ( [id] => 11398882 [patent_doc_number] => 20170019420 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-19 [patent_title] => 'DEVICE AND METHOD FOR DETECTING MANIPULATION OF A PROGRAM CODE' [patent_app_type] => utility [patent_app_number] => 15/124758 [patent_app_country] => US [patent_app_date] => 2015-02-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4035 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15124758 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/124758
Device and method for detecting manipulation of a program code Feb 8, 2015 Issued
Array ( [id] => 11717293 [patent_doc_number] => 20170185792 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-06-29 [patent_title] => 'MOBILE TERMINAL, DISPLAYING SYSTEM, DISPLAY CONTROLLING METHOD, AND RECORDING MEDIUM' [patent_app_type] => utility [patent_app_number] => 15/129343 [patent_app_country] => US [patent_app_date] => 2015-01-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5132 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15129343 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/129343
MOBILE TERMINAL, DISPLAYING SYSTEM, DISPLAY CONTROLLING METHOD, AND RECORDING MEDIUM Jan 20, 2015 Abandoned
Array ( [id] => 13122987 [patent_doc_number] => 10079857 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-09-18 [patent_title] => Method of slowing down a communication in a network [patent_app_type] => utility [patent_app_number] => 15/107759 [patent_app_country] => US [patent_app_date] => 2014-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 6324 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 157 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15107759 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/107759
Method of slowing down a communication in a network Dec 15, 2014 Issued
Array ( [id] => 15137523 [patent_doc_number] => 10482234 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-11-19 [patent_title] => Controlling authorization within computer systems [patent_app_type] => utility [patent_app_number] => 15/107828 [patent_app_country] => US [patent_app_date] => 2014-12-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 15 [patent_no_of_words] => 8428 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 236 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15107828 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/107828
Controlling authorization within computer systems Dec 9, 2014 Issued
Array ( [id] => 15612671 [patent_doc_number] => 10587417 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-03-10 [patent_title] => Document encryption prompt method and system [patent_app_type] => utility [patent_app_number] => 15/108180 [patent_app_country] => US [patent_app_date] => 2014-11-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 6 [patent_no_of_words] => 3626 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 229 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15108180 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/108180
Document encryption prompt method and system Nov 24, 2014 Issued
Array ( [id] => 10742320 [patent_doc_number] => 20160088471 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-24 [patent_title] => 'SYSTEM FOR SECURELY ENTERING PARTICULAR INFORMATION AND METHOD THEREOF' [patent_app_type] => utility [patent_app_number] => 14/527755 [patent_app_country] => US [patent_app_date] => 2014-10-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8325 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14527755 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/527755
System for securely entering particular information and method thereof Oct 28, 2014 Issued
Array ( [id] => 11905180 [patent_doc_number] => 09774631 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-09-26 [patent_title] => 'TLS connection abandoning' [patent_app_type] => utility [patent_app_number] => 14/527475 [patent_app_country] => US [patent_app_date] => 2014-10-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 8258 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 231 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14527475 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/527475
TLS connection abandoning Oct 28, 2014 Issued
Array ( [id] => 10771342 [patent_doc_number] => 20160117497 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-04-28 [patent_title] => 'COMPUTING PLATFORM SECURITY METHODS AND APPARATUS' [patent_app_type] => utility [patent_app_number] => 14/523884 [patent_app_country] => US [patent_app_date] => 2014-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 31126 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14523884 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/523884
Computing platform security methods and apparatus Oct 24, 2014 Issued
Array ( [id] => 10771341 [patent_doc_number] => 20160117498 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-04-28 [patent_title] => 'COMPUTING PLATFORM SECURITY METHODS AND APPARATUS' [patent_app_type] => utility [patent_app_number] => 14/523886 [patent_app_country] => US [patent_app_date] => 2014-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 31126 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14523886 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/523886
Computing platform security methods and apparatus Oct 24, 2014 Issued
Array ( [id] => 10646202 [patent_doc_number] => 09363087 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-06-07 [patent_title] => 'End-to-end security for hardware running verified software' [patent_app_type] => utility [patent_app_number] => 14/505236 [patent_app_country] => US [patent_app_date] => 2014-10-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 15968 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 150 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14505236 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/505236
End-to-end security for hardware running verified software Oct 1, 2014 Issued
Array ( [id] => 10748389 [patent_doc_number] => 20160094539 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-31 [patent_title] => 'SYSTEMS AND METHODS FOR PERFORMING SINGLE SIGN-ON BY AN INTERMEDIARY DEVICE FOR A REMOTE DESKTOP SESSION OF A CLIENT' [patent_app_type] => utility [patent_app_number] => 14/502598 [patent_app_country] => US [patent_app_date] => 2014-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 22 [patent_figures_cnt] => 22 [patent_no_of_words] => 40188 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14502598 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/502598
Systems and methods for performing single sign-on by an intermediary device for a remote desktop session of a client Sep 29, 2014 Issued
Menu