
Khang D. Do
Examiner (ID: 9762, Phone: (571)270-7837 , Office: P/2492 )
| Most Active Art Unit | 2492 |
| Art Unit(s) | 2496, 2492 |
| Total Applications | 469 |
| Issued Applications | 388 |
| Pending Applications | 29 |
| Abandoned Applications | 66 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11253813
[patent_doc_number] => 09479332
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-25
[patent_title] => 'Key revocation in system on chip devices'
[patent_app_type] => utility
[patent_app_number] => 13/997263
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6023
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13997263
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/997263 | Key revocation in system on chip devices | Mar 14, 2013 | Issued |
Array
(
[id] => 10569512
[patent_doc_number] => 09292683
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-22
[patent_title] => 'Computing device security'
[patent_app_type] => utility
[patent_app_number] => 13/977020
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4441
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13977020
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/977020 | Computing device security | Mar 14, 2013 | Issued |
Array
(
[id] => 10166421
[patent_doc_number] => 09197660
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-24
[patent_title] => 'Generic privilege escalation prevention'
[patent_app_type] => utility
[patent_app_number] => 13/977014
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 7549
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13977014
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/977014 | Generic privilege escalation prevention | Mar 14, 2013 | Issued |
Array
(
[id] => 10151099
[patent_doc_number] => 09183391
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-10
[patent_title] => 'Managing device driver cross ring accesses'
[patent_app_type] => utility
[patent_app_number] => 13/997790
[patent_app_country] => US
[patent_app_date] => 2013-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 10181
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13997790
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/997790 | Managing device driver cross ring accesses | Mar 12, 2013 | Issued |
Array
(
[id] => 10151087
[patent_doc_number] => 09183379
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-10
[patent_title] => 'Preventing malicious instruction execution'
[patent_app_type] => utility
[patent_app_number] => 13/991291
[patent_app_country] => US
[patent_app_date] => 2013-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7436
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13991291
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/991291 | Preventing malicious instruction execution | Mar 11, 2013 | Issued |
Array
(
[id] => 9814844
[patent_doc_number] => 20150026790
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-22
[patent_title] => 'Method for Computer Access Control by Means of Mobile End Device'
[patent_app_type] => utility
[patent_app_number] => 14/381650
[patent_app_country] => US
[patent_app_date] => 2013-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2911
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14381650
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/381650 | Method for computer access control by means of mobile end device | Feb 25, 2013 | Issued |
Array
(
[id] => 8893728
[patent_doc_number] => 20130166912
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-27
[patent_title] => 'INFORMATION PROCESSING APPARATUS AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/770002
[patent_app_country] => US
[patent_app_date] => 2013-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5753
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13770002
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/770002 | Information processing apparatus and method | Feb 18, 2013 | Issued |
Array
(
[id] => 11782789
[patent_doc_number] => 09392017
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'Methods, systems, and media for inhibiting attacks on embedded devices'
[patent_app_type] => utility
[patent_app_number] => 14/379166
[patent_app_country] => US
[patent_app_date] => 2013-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 11157
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14379166
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/379166 | Methods, systems, and media for inhibiting attacks on embedded devices | Feb 14, 2013 | Issued |
Array
(
[id] => 9774361
[patent_doc_number] => 20140298024
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-02
[patent_title] => 'Method for granting access to a network and device for implementing this method'
[patent_app_type] => utility
[patent_app_number] => 13/717840
[patent_app_country] => US
[patent_app_date] => 2012-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3104
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13717840
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/717840 | Method for granting access to a network and device for implementing this method | Dec 17, 2012 | Abandoned |
Array
(
[id] => 10107536
[patent_doc_number] => 09143325
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-22
[patent_title] => 'Masking with shared random bits'
[patent_app_type] => utility
[patent_app_number] => 13/715579
[patent_app_country] => US
[patent_app_date] => 2012-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 6297
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13715579
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/715579 | Masking with shared random bits | Dec 13, 2012 | Issued |
Array
(
[id] => 8831981
[patent_doc_number] => 20130133026
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-23
[patent_title] => 'SYSTEM, METHOD, AND APPARATUS FOR DATA, DATA STRUCTURE, OR ENCRYPTION COGNITION INCORPORATING AUTONOMOUS SECURITY PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 13/714393
[patent_app_country] => US
[patent_app_date] => 2012-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 21901
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13714393
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/714393 | SYSTEM, METHOD, AND APPARATUS FOR DATA, DATA STRUCTURE, OR ENCRYPTION COGNITION INCORPORATING AUTONOMOUS SECURITY PROTECTION | Dec 12, 2012 | Abandoned |
Array
(
[id] => 9520877
[patent_doc_number] => 20140157369
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-05
[patent_title] => 'METHOD, APPARATUS AND COMPUTER PROGRAM FOR CONTROLLING ACCESS TO CONTENT IN A COMMUNICATIONS NETWORK'
[patent_app_type] => utility
[patent_app_number] => 13/714229
[patent_app_country] => US
[patent_app_date] => 2012-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7419
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13714229
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/714229 | METHOD, APPARATUS AND COMPUTER PROGRAM FOR CONTROLLING ACCESS TO CONTENT IN A COMMUNICATIONS NETWORK | Dec 12, 2012 | Abandoned |
Array
(
[id] => 10124534
[patent_doc_number] => 09158894
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-13
[patent_title] => 'Apparatus and method for analyzing rule-based security event association'
[patent_app_type] => utility
[patent_app_number] => 13/714362
[patent_app_country] => US
[patent_app_date] => 2012-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 3779
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13714362
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/714362 | Apparatus and method for analyzing rule-based security event association | Dec 12, 2012 | Issued |
Array
(
[id] => 10901825
[patent_doc_number] => 08925071
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-30
[patent_title] => 'Geometrical pattern based application passcode'
[patent_app_type] => utility
[patent_app_number] => 13/712932
[patent_app_country] => US
[patent_app_date] => 2012-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 15
[patent_no_of_words] => 8485
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 252
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13712932
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/712932 | Geometrical pattern based application passcode | Dec 11, 2012 | Issued |
Array
(
[id] => 10879695
[patent_doc_number] => 08904494
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-02
[patent_title] => 'System and method to facilitate compliance with COPPA for website registration'
[patent_app_type] => utility
[patent_app_number] => 13/712793
[patent_app_country] => US
[patent_app_date] => 2012-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7288
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 381
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13712793
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/712793 | System and method to facilitate compliance with COPPA for website registration | Dec 11, 2012 | Issued |
Array
(
[id] => 8746543
[patent_doc_number] => 20130086260
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-04
[patent_title] => 'Automatic Generation of User Account Policies Based on Configuration Management Database Information'
[patent_app_type] => utility
[patent_app_number] => 13/685766
[patent_app_country] => US
[patent_app_date] => 2012-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11308
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13685766
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/685766 | Automatic generation of user account policies based on configuration management database information | Nov 26, 2012 | Issued |
Array
(
[id] => 9147303
[patent_doc_number] => 20130301826
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-14
[patent_title] => 'SYSTEM, METHOD, AND PROGRAM FOR PROTECTING CRYPTOGRAPHIC ALGORITHMS FROM SIDE-CHANNEL ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 13/466444
[patent_app_country] => US
[patent_app_date] => 2012-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9693
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13466444
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/466444 | SYSTEM, METHOD, AND PROGRAM FOR PROTECTING CRYPTOGRAPHIC ALGORITHMS FROM SIDE-CHANNEL ATTACKS | May 7, 2012 | Abandoned |
Array
(
[id] => 8455277
[patent_doc_number] => 20120266223
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-18
[patent_title] => 'METHOD AND APPARATUS FOR PROVIDING MACHINE-TO-MACHINE SERVICE'
[patent_app_type] => utility
[patent_app_number] => 13/447599
[patent_app_country] => US
[patent_app_date] => 2012-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7938
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13447599
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/447599 | Method and apparatus for providing machine-to-machine service | Apr 15, 2012 | Issued |
Array
(
[id] => 10841607
[patent_doc_number] => 08869309
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-10-21
[patent_title] => 'Dynamically reconfigurable 2D topology communication and verification scheme'
[patent_app_type] => utility
[patent_app_number] => 14/111109
[patent_app_country] => US
[patent_app_date] => 2012-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 13197
[patent_no_of_claims] => 41
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14111109
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/111109 | Dynamically reconfigurable 2D topology communication and verification scheme | Apr 11, 2012 | Issued |
Array
(
[id] => 10164254
[patent_doc_number] => 09195476
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-24
[patent_title] => 'System and method for aggressive self-modification in dynamic function call systems'
[patent_app_type] => utility
[patent_app_number] => 13/500155
[patent_app_country] => US
[patent_app_date] => 2012-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 15
[patent_no_of_words] => 7777
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13500155
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/500155 | System and method for aggressive self-modification in dynamic function call systems | Apr 3, 2012 | Issued |