Search

Khang D. Do

Examiner (ID: 9762, Phone: (571)270-7837 , Office: P/2492 )

Most Active Art Unit
2492
Art Unit(s)
2496, 2492
Total Applications
469
Issued Applications
388
Pending Applications
29
Abandoned Applications
66

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11253813 [patent_doc_number] => 09479332 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-10-25 [patent_title] => 'Key revocation in system on chip devices' [patent_app_type] => utility [patent_app_number] => 13/997263 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6023 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13997263 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/997263
Key revocation in system on chip devices Mar 14, 2013 Issued
Array ( [id] => 10569512 [patent_doc_number] => 09292683 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-03-22 [patent_title] => 'Computing device security' [patent_app_type] => utility [patent_app_number] => 13/977020 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4441 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 95 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13977020 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/977020
Computing device security Mar 14, 2013 Issued
Array ( [id] => 10166421 [patent_doc_number] => 09197660 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-24 [patent_title] => 'Generic privilege escalation prevention' [patent_app_type] => utility [patent_app_number] => 13/977014 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 7549 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 93 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13977014 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/977014
Generic privilege escalation prevention Mar 14, 2013 Issued
Array ( [id] => 10151099 [patent_doc_number] => 09183391 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-10 [patent_title] => 'Managing device driver cross ring accesses' [patent_app_type] => utility [patent_app_number] => 13/997790 [patent_app_country] => US [patent_app_date] => 2013-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 10181 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13997790 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/997790
Managing device driver cross ring accesses Mar 12, 2013 Issued
Array ( [id] => 10151087 [patent_doc_number] => 09183379 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-10 [patent_title] => 'Preventing malicious instruction execution' [patent_app_type] => utility [patent_app_number] => 13/991291 [patent_app_country] => US [patent_app_date] => 2013-03-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7436 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 111 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13991291 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/991291
Preventing malicious instruction execution Mar 11, 2013 Issued
Array ( [id] => 9814844 [patent_doc_number] => 20150026790 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-22 [patent_title] => 'Method for Computer Access Control by Means of Mobile End Device' [patent_app_type] => utility [patent_app_number] => 14/381650 [patent_app_country] => US [patent_app_date] => 2013-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 2911 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14381650 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/381650
Method for computer access control by means of mobile end device Feb 25, 2013 Issued
Array ( [id] => 8893728 [patent_doc_number] => 20130166912 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-06-27 [patent_title] => 'INFORMATION PROCESSING APPARATUS AND METHOD' [patent_app_type] => utility [patent_app_number] => 13/770002 [patent_app_country] => US [patent_app_date] => 2013-02-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5753 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13770002 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/770002
Information processing apparatus and method Feb 18, 2013 Issued
Array ( [id] => 11782789 [patent_doc_number] => 09392017 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-07-12 [patent_title] => 'Methods, systems, and media for inhibiting attacks on embedded devices' [patent_app_type] => utility [patent_app_number] => 14/379166 [patent_app_country] => US [patent_app_date] => 2013-02-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 11157 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 223 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14379166 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/379166
Methods, systems, and media for inhibiting attacks on embedded devices Feb 14, 2013 Issued
Array ( [id] => 9774361 [patent_doc_number] => 20140298024 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-10-02 [patent_title] => 'Method for granting access to a network and device for implementing this method' [patent_app_type] => utility [patent_app_number] => 13/717840 [patent_app_country] => US [patent_app_date] => 2012-12-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3104 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13717840 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/717840
Method for granting access to a network and device for implementing this method Dec 17, 2012 Abandoned
Array ( [id] => 10107536 [patent_doc_number] => 09143325 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-09-22 [patent_title] => 'Masking with shared random bits' [patent_app_type] => utility [patent_app_number] => 13/715579 [patent_app_country] => US [patent_app_date] => 2012-12-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 6297 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 109 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13715579 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/715579
Masking with shared random bits Dec 13, 2012 Issued
Array ( [id] => 8831981 [patent_doc_number] => 20130133026 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-05-23 [patent_title] => 'SYSTEM, METHOD, AND APPARATUS FOR DATA, DATA STRUCTURE, OR ENCRYPTION COGNITION INCORPORATING AUTONOMOUS SECURITY PROTECTION' [patent_app_type] => utility [patent_app_number] => 13/714393 [patent_app_country] => US [patent_app_date] => 2012-12-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 25 [patent_figures_cnt] => 25 [patent_no_of_words] => 21901 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13714393 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/714393
SYSTEM, METHOD, AND APPARATUS FOR DATA, DATA STRUCTURE, OR ENCRYPTION COGNITION INCORPORATING AUTONOMOUS SECURITY PROTECTION Dec 12, 2012 Abandoned
Array ( [id] => 9520877 [patent_doc_number] => 20140157369 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-06-05 [patent_title] => 'METHOD, APPARATUS AND COMPUTER PROGRAM FOR CONTROLLING ACCESS TO CONTENT IN A COMMUNICATIONS NETWORK' [patent_app_type] => utility [patent_app_number] => 13/714229 [patent_app_country] => US [patent_app_date] => 2012-12-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7419 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13714229 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/714229
METHOD, APPARATUS AND COMPUTER PROGRAM FOR CONTROLLING ACCESS TO CONTENT IN A COMMUNICATIONS NETWORK Dec 12, 2012 Abandoned
Array ( [id] => 10124534 [patent_doc_number] => 09158894 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-13 [patent_title] => 'Apparatus and method for analyzing rule-based security event association' [patent_app_type] => utility [patent_app_number] => 13/714362 [patent_app_country] => US [patent_app_date] => 2012-12-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 3779 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13714362 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/714362
Apparatus and method for analyzing rule-based security event association Dec 12, 2012 Issued
Array ( [id] => 10901825 [patent_doc_number] => 08925071 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-12-30 [patent_title] => 'Geometrical pattern based application passcode' [patent_app_type] => utility [patent_app_number] => 13/712932 [patent_app_country] => US [patent_app_date] => 2012-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 15 [patent_no_of_words] => 8485 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 252 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13712932 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/712932
Geometrical pattern based application passcode Dec 11, 2012 Issued
Array ( [id] => 10879695 [patent_doc_number] => 08904494 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-12-02 [patent_title] => 'System and method to facilitate compliance with COPPA for website registration' [patent_app_type] => utility [patent_app_number] => 13/712793 [patent_app_country] => US [patent_app_date] => 2012-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 7288 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 381 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13712793 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/712793
System and method to facilitate compliance with COPPA for website registration Dec 11, 2012 Issued
Array ( [id] => 8746543 [patent_doc_number] => 20130086260 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-04-04 [patent_title] => 'Automatic Generation of User Account Policies Based on Configuration Management Database Information' [patent_app_type] => utility [patent_app_number] => 13/685766 [patent_app_country] => US [patent_app_date] => 2012-11-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 11308 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13685766 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/685766
Automatic generation of user account policies based on configuration management database information Nov 26, 2012 Issued
Array ( [id] => 9147303 [patent_doc_number] => 20130301826 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-11-14 [patent_title] => 'SYSTEM, METHOD, AND PROGRAM FOR PROTECTING CRYPTOGRAPHIC ALGORITHMS FROM SIDE-CHANNEL ATTACKS' [patent_app_type] => utility [patent_app_number] => 13/466444 [patent_app_country] => US [patent_app_date] => 2012-05-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9693 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13466444 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/466444
SYSTEM, METHOD, AND PROGRAM FOR PROTECTING CRYPTOGRAPHIC ALGORITHMS FROM SIDE-CHANNEL ATTACKS May 7, 2012 Abandoned
Array ( [id] => 8455277 [patent_doc_number] => 20120266223 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-10-18 [patent_title] => 'METHOD AND APPARATUS FOR PROVIDING MACHINE-TO-MACHINE SERVICE' [patent_app_type] => utility [patent_app_number] => 13/447599 [patent_app_country] => US [patent_app_date] => 2012-04-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 7938 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13447599 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/447599
Method and apparatus for providing machine-to-machine service Apr 15, 2012 Issued
Array ( [id] => 10841607 [patent_doc_number] => 08869309 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-10-21 [patent_title] => 'Dynamically reconfigurable 2D topology communication and verification scheme' [patent_app_type] => utility [patent_app_number] => 14/111109 [patent_app_country] => US [patent_app_date] => 2012-04-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 22 [patent_figures_cnt] => 22 [patent_no_of_words] => 13197 [patent_no_of_claims] => 41 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 144 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14111109 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/111109
Dynamically reconfigurable 2D topology communication and verification scheme Apr 11, 2012 Issued
Array ( [id] => 10164254 [patent_doc_number] => 09195476 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-24 [patent_title] => 'System and method for aggressive self-modification in dynamic function call systems' [patent_app_type] => utility [patent_app_number] => 13/500155 [patent_app_country] => US [patent_app_date] => 2012-04-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 15 [patent_no_of_words] => 7777 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 184 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13500155 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/500155
System and method for aggressive self-modification in dynamic function call systems Apr 3, 2012 Issued
Menu