Search

Khang D. Do

Examiner (ID: 9762, Phone: (571)270-7837 , Office: P/2492 )

Most Active Art Unit
2492
Art Unit(s)
2496, 2492
Total Applications
469
Issued Applications
388
Pending Applications
29
Abandoned Applications
66

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9960994 [patent_doc_number] => 09009217 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-04-14 [patent_title] => 'Interaction with a virtual network' [patent_app_type] => utility [patent_app_number] => 12/985979 [patent_app_country] => US [patent_app_date] => 2011-01-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 12528 [patent_no_of_claims] => 34 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 233 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12985979 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/985979
Interaction with a virtual network Jan 5, 2011 Issued
Array ( [id] => 11240844 [patent_doc_number] => 09467507 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-10-11 [patent_title] => 'Wireless network cloud computing resource management' [patent_app_type] => utility [patent_app_number] => 12/983672 [patent_app_country] => US [patent_app_date] => 2011-01-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 13 [patent_no_of_words] => 9711 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 255 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12983672 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/983672
Wireless network cloud computing resource management Jan 2, 2011 Issued
Array ( [id] => 8504848 [patent_doc_number] => 20120304256 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-11-29 [patent_title] => 'ELECTRONIC MAIL SYSTEM AND METHOD' [patent_app_type] => utility [patent_app_number] => 13/502761 [patent_app_country] => US [patent_app_date] => 2010-10-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 2971 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13502761 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/502761
ELECTRONIC MAIL SYSTEM AND METHOD Oct 20, 2010 Abandoned
Array ( [id] => 6131246 [patent_doc_number] => 20110087872 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-04-14 [patent_title] => 'Firmware Verified Boot' [patent_app_type] => utility [patent_app_number] => 12/903202 [patent_app_country] => US [patent_app_date] => 2010-10-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 12676 [patent_no_of_claims] => 38 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0087/20110087872.pdf [firstpage_image] =>[orig_patent_app_number] => 12903202 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/903202
Firmware verified boot Oct 11, 2010 Issued
Array ( [id] => 8323019 [patent_doc_number] => 20120195431 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-08-02 [patent_title] => 'METHOD FOR OPERATING A NODE IN A WIRELESS SENSOR NETWORK' [patent_app_type] => utility [patent_app_number] => 13/499930 [patent_app_country] => US [patent_app_date] => 2010-10-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5820 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13499930 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/499930
METHOD FOR OPERATING A NODE IN A WIRELESS SENSOR NETWORK Oct 6, 2010 Abandoned
Array ( [id] => 9378912 [patent_doc_number] => 08683194 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-03-25 [patent_title] => 'Method and devices for secure communications in a telecommunications network' [patent_app_type] => utility [patent_app_number] => 13/497571 [patent_app_country] => US [patent_app_date] => 2010-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 11822 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13497571 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/497571
Method and devices for secure communications in a telecommunications network Sep 27, 2010 Issued
Array ( [id] => 9326208 [patent_doc_number] => 08661245 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-02-25 [patent_title] => 'Systems and methods for empowering IP practitioners' [patent_app_type] => utility [patent_app_number] => 12/891782 [patent_app_country] => US [patent_app_date] => 2010-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 4637 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 214 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12891782 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/891782
Systems and methods for empowering IP practitioners Sep 26, 2010 Issued
Array ( [id] => 8315249 [patent_doc_number] => 20120192269 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-07-26 [patent_title] => 'METHOD FOR REMOTELY CONTROLLING THE EXECUTION OF AT LEAST ONE FUNCTION OF A COMPUTER SYSTEM' [patent_app_type] => utility [patent_app_number] => 13/497679 [patent_app_country] => US [patent_app_date] => 2010-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3557 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13497679 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/497679
METHOD FOR REMOTELY CONTROLLING THE EXECUTION OF AT LEAST ONE FUNCTION OF A COMPUTER SYSTEM Sep 20, 2010 Abandoned
Array ( [id] => 8291579 [patent_doc_number] => 20120179918 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-07-12 [patent_title] => 'METHOD AND A SYSTEM FOR PROVIDING A DEPLOYMENT LIFECYCLE MANAGEMENT OF CRYPTOGRAPHIC OBJECTS' [patent_app_type] => utility [patent_app_number] => 13/497002 [patent_app_country] => US [patent_app_date] => 2010-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4055 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13497002 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/497002
METHOD AND A SYSTEM FOR PROVIDING A DEPLOYMENT LIFECYCLE MANAGEMENT OF CRYPTOGRAPHIC OBJECTS Sep 16, 2010 Abandoned
Array ( [id] => 10074470 [patent_doc_number] => 09112843 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-08-18 [patent_title] => 'Method and system for subscriber to log in internet content provider (ICP) website in identity/location separation network and login device thereof' [patent_app_type] => utility [patent_app_number] => 13/496720 [patent_app_country] => US [patent_app_date] => 2010-09-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 3 [patent_no_of_words] => 4801 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 413 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13496720 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/496720
Method and system for subscriber to log in internet content provider (ICP) website in identity/location separation network and login device thereof Sep 8, 2010 Issued
Array ( [id] => 6008870 [patent_doc_number] => 20110060901 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-10 [patent_title] => 'Cryptographic System for Performing Secure Iterative Matrix Inversions and Solving Systems of Linear Equations' [patent_app_type] => utility [patent_app_number] => 12/876229 [patent_app_country] => US [patent_app_date] => 2010-09-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4907 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0060/20110060901.pdf [firstpage_image] =>[orig_patent_app_number] => 12876229 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/876229
Cryptographic System for Performing Secure Iterative Matrix Inversions and Solving Systems of Linear Equations Sep 5, 2010 Abandoned
Array ( [id] => 6006573 [patent_doc_number] => 20110058671 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-10 [patent_title] => 'SECURE PROTOCOL TERMINAL ADAPTER' [patent_app_type] => utility [patent_app_number] => 12/873885 [patent_app_country] => US [patent_app_date] => 2010-09-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3436 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0058/20110058671.pdf [firstpage_image] =>[orig_patent_app_number] => 12873885 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/873885
SECURE PROTOCOL TERMINAL ADAPTER Aug 31, 2010 Abandoned
Array ( [id] => 6032649 [patent_doc_number] => 20110055929 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-03 [patent_title] => 'METHOD FOR PRODUCING AN IMAGE INTENDED FOR AN OPERATING SYSTEM CALLED OS IMAGE AND CORRESPONDING DEVICE' [patent_app_type] => utility [patent_app_number] => 12/873066 [patent_app_country] => US [patent_app_date] => 2010-08-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 1976 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0055/20110055929.pdf [firstpage_image] =>[orig_patent_app_number] => 12873066 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/873066
METHOD FOR PRODUCING AN IMAGE INTENDED FOR AN OPERATING SYSTEM CALLED OS IMAGE AND CORRESPONDING DEVICE Aug 30, 2010 Abandoned
Array ( [id] => 7786015 [patent_doc_number] => 20120047571 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-02-23 [patent_title] => 'SYSTEMS AND METHODS FOR DETECTING PRESELECTED QUERY TYPE WITHIN A DNS QUERY' [patent_app_type] => utility [patent_app_number] => 12/857742 [patent_app_country] => US [patent_app_date] => 2010-08-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9922 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0047/20120047571.pdf [firstpage_image] =>[orig_patent_app_number] => 12857742 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/857742
SYSTEMS AND METHODS FOR DETECTING PRESELECTED QUERY TYPE WITHIN A DNS QUERY Aug 16, 2010 Abandoned
Array ( [id] => 8093423 [patent_doc_number] => 20120082307 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-05 [patent_title] => 'CRYPTOGRAPHY ON A ELLIPTICAL CURVE' [patent_app_type] => utility [patent_app_number] => 13/377404 [patent_app_country] => US [patent_app_date] => 2010-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6829 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0082/20120082307.pdf [firstpage_image] =>[orig_patent_app_number] => 13377404 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/377404
Cryptography on a elliptical curve Jun 14, 2010 Issued
Array ( [id] => 8137533 [patent_doc_number] => 20120093309 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-19 [patent_title] => 'CRYPTOGRAPHY ON A SIMPLIFIED ELLIPTICAL CURVE' [patent_app_type] => utility [patent_app_number] => 13/377381 [patent_app_country] => US [patent_app_date] => 2010-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 4497 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0093/20120093309.pdf [firstpage_image] =>[orig_patent_app_number] => 13377381 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/377381
Cryptography on a simplified elliptical curve Jun 14, 2010 Issued
Array ( [id] => 8098501 [patent_doc_number] => 20120084865 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-05 [patent_title] => 'False Alarm Detection For Malware Scanning' [patent_app_type] => utility [patent_app_number] => 13/376862 [patent_app_country] => US [patent_app_date] => 2010-05-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 2566 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0084/20120084865.pdf [firstpage_image] =>[orig_patent_app_number] => 13376862 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/376862
False alarm detection for malware scanning May 27, 2010 Issued
Array ( [id] => 6647141 [patent_doc_number] => 20100174950 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-08 [patent_title] => 'METHOD AND SECURE MODULE FOR COMMUNICATION WITH HOST, METHOD AND APPARATUS FOR COMMUNICATION WITH SECURE MODULE, METHOD AND APPARATUS FOR CONTROLLING SECURE MODULE' [patent_app_type] => utility [patent_app_number] => 12/727859 [patent_app_country] => US [patent_app_date] => 2010-03-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5596 [patent_no_of_claims] => 34 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0174/20100174950.pdf [firstpage_image] =>[orig_patent_app_number] => 12727859 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/727859
METHOD AND SECURE MODULE FOR COMMUNICATION WITH HOST, METHOD AND APPARATUS FOR COMMUNICATION WITH SECURE MODULE, METHOD AND APPARATUS FOR CONTROLLING SECURE MODULE Mar 18, 2010 Abandoned
Array ( [id] => 7816974 [patent_doc_number] => 20120063594 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-03-15 [patent_title] => 'METHOD FOR CREATING ASYMMETRICAL CRYPTOGRAPHIC KEY PAIRS' [patent_app_type] => utility [patent_app_number] => 13/256364 [patent_app_country] => US [patent_app_date] => 2010-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10139 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0063/20120063594.pdf [firstpage_image] =>[orig_patent_app_number] => 13256364 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/256364
Method for creating asymmetrical cryptographic key pairs Mar 3, 2010 Issued
Array ( [id] => 9458870 [patent_doc_number] => 08719897 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-05-06 [patent_title] => 'Access control method for tri-element peer authentication credible network connection structure' [patent_app_type] => utility [patent_app_number] => 13/377098 [patent_app_country] => US [patent_app_date] => 2009-12-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 4 [patent_no_of_words] => 3050 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 330 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13377098 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/377098
Access control method for tri-element peer authentication credible network connection structure Dec 8, 2009 Issued
Menu