
Khang D. Do
Examiner (ID: 9762, Phone: (571)270-7837 , Office: P/2492 )
| Most Active Art Unit | 2492 |
| Art Unit(s) | 2496, 2492 |
| Total Applications | 469 |
| Issued Applications | 388 |
| Pending Applications | 29 |
| Abandoned Applications | 66 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9960994
[patent_doc_number] => 09009217
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-04-14
[patent_title] => 'Interaction with a virtual network'
[patent_app_type] => utility
[patent_app_number] => 12/985979
[patent_app_country] => US
[patent_app_date] => 2011-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12528
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12985979
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/985979 | Interaction with a virtual network | Jan 5, 2011 | Issued |
Array
(
[id] => 11240844
[patent_doc_number] => 09467507
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-11
[patent_title] => 'Wireless network cloud computing resource management'
[patent_app_type] => utility
[patent_app_number] => 12/983672
[patent_app_country] => US
[patent_app_date] => 2011-01-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 13
[patent_no_of_words] => 9711
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12983672
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/983672 | Wireless network cloud computing resource management | Jan 2, 2011 | Issued |
Array
(
[id] => 8504848
[patent_doc_number] => 20120304256
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-29
[patent_title] => 'ELECTRONIC MAIL SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/502761
[patent_app_country] => US
[patent_app_date] => 2010-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2971
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13502761
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/502761 | ELECTRONIC MAIL SYSTEM AND METHOD | Oct 20, 2010 | Abandoned |
Array
(
[id] => 6131246
[patent_doc_number] => 20110087872
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-04-14
[patent_title] => 'Firmware Verified Boot'
[patent_app_type] => utility
[patent_app_number] => 12/903202
[patent_app_country] => US
[patent_app_date] => 2010-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 12676
[patent_no_of_claims] => 38
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0087/20110087872.pdf
[firstpage_image] =>[orig_patent_app_number] => 12903202
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/903202 | Firmware verified boot | Oct 11, 2010 | Issued |
Array
(
[id] => 8323019
[patent_doc_number] => 20120195431
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-08-02
[patent_title] => 'METHOD FOR OPERATING A NODE IN A WIRELESS SENSOR NETWORK'
[patent_app_type] => utility
[patent_app_number] => 13/499930
[patent_app_country] => US
[patent_app_date] => 2010-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5820
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13499930
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/499930 | METHOD FOR OPERATING A NODE IN A WIRELESS SENSOR NETWORK | Oct 6, 2010 | Abandoned |
Array
(
[id] => 9378912
[patent_doc_number] => 08683194
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-25
[patent_title] => 'Method and devices for secure communications in a telecommunications network'
[patent_app_type] => utility
[patent_app_number] => 13/497571
[patent_app_country] => US
[patent_app_date] => 2010-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 11822
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13497571
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/497571 | Method and devices for secure communications in a telecommunications network | Sep 27, 2010 | Issued |
Array
(
[id] => 9326208
[patent_doc_number] => 08661245
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-02-25
[patent_title] => 'Systems and methods for empowering IP practitioners'
[patent_app_type] => utility
[patent_app_number] => 12/891782
[patent_app_country] => US
[patent_app_date] => 2010-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4637
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12891782
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/891782 | Systems and methods for empowering IP practitioners | Sep 26, 2010 | Issued |
Array
(
[id] => 8315249
[patent_doc_number] => 20120192269
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-07-26
[patent_title] => 'METHOD FOR REMOTELY CONTROLLING THE EXECUTION OF AT LEAST ONE FUNCTION OF A COMPUTER SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/497679
[patent_app_country] => US
[patent_app_date] => 2010-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3557
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13497679
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/497679 | METHOD FOR REMOTELY CONTROLLING THE EXECUTION OF AT LEAST ONE FUNCTION OF A COMPUTER SYSTEM | Sep 20, 2010 | Abandoned |
Array
(
[id] => 8291579
[patent_doc_number] => 20120179918
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-07-12
[patent_title] => 'METHOD AND A SYSTEM FOR PROVIDING A DEPLOYMENT LIFECYCLE MANAGEMENT OF CRYPTOGRAPHIC OBJECTS'
[patent_app_type] => utility
[patent_app_number] => 13/497002
[patent_app_country] => US
[patent_app_date] => 2010-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4055
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13497002
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/497002 | METHOD AND A SYSTEM FOR PROVIDING A DEPLOYMENT LIFECYCLE MANAGEMENT OF CRYPTOGRAPHIC OBJECTS | Sep 16, 2010 | Abandoned |
Array
(
[id] => 10074470
[patent_doc_number] => 09112843
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-18
[patent_title] => 'Method and system for subscriber to log in internet content provider (ICP) website in identity/location separation network and login device thereof'
[patent_app_type] => utility
[patent_app_number] => 13/496720
[patent_app_country] => US
[patent_app_date] => 2010-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 4801
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 413
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13496720
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/496720 | Method and system for subscriber to log in internet content provider (ICP) website in identity/location separation network and login device thereof | Sep 8, 2010 | Issued |
Array
(
[id] => 6008870
[patent_doc_number] => 20110060901
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-10
[patent_title] => 'Cryptographic System for Performing Secure Iterative Matrix Inversions and Solving Systems of Linear Equations'
[patent_app_type] => utility
[patent_app_number] => 12/876229
[patent_app_country] => US
[patent_app_date] => 2010-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4907
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0060/20110060901.pdf
[firstpage_image] =>[orig_patent_app_number] => 12876229
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/876229 | Cryptographic System for Performing Secure Iterative Matrix Inversions and Solving Systems of Linear Equations | Sep 5, 2010 | Abandoned |
Array
(
[id] => 6006573
[patent_doc_number] => 20110058671
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-10
[patent_title] => 'SECURE PROTOCOL TERMINAL ADAPTER'
[patent_app_type] => utility
[patent_app_number] => 12/873885
[patent_app_country] => US
[patent_app_date] => 2010-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3436
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0058/20110058671.pdf
[firstpage_image] =>[orig_patent_app_number] => 12873885
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/873885 | SECURE PROTOCOL TERMINAL ADAPTER | Aug 31, 2010 | Abandoned |
Array
(
[id] => 6032649
[patent_doc_number] => 20110055929
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-03
[patent_title] => 'METHOD FOR PRODUCING AN IMAGE INTENDED FOR AN OPERATING SYSTEM CALLED OS IMAGE AND CORRESPONDING DEVICE'
[patent_app_type] => utility
[patent_app_number] => 12/873066
[patent_app_country] => US
[patent_app_date] => 2010-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1976
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0055/20110055929.pdf
[firstpage_image] =>[orig_patent_app_number] => 12873066
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/873066 | METHOD FOR PRODUCING AN IMAGE INTENDED FOR AN OPERATING SYSTEM CALLED OS IMAGE AND CORRESPONDING DEVICE | Aug 30, 2010 | Abandoned |
Array
(
[id] => 7786015
[patent_doc_number] => 20120047571
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-23
[patent_title] => 'SYSTEMS AND METHODS FOR DETECTING PRESELECTED QUERY TYPE WITHIN A DNS QUERY'
[patent_app_type] => utility
[patent_app_number] => 12/857742
[patent_app_country] => US
[patent_app_date] => 2010-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9922
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0047/20120047571.pdf
[firstpage_image] =>[orig_patent_app_number] => 12857742
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/857742 | SYSTEMS AND METHODS FOR DETECTING PRESELECTED QUERY TYPE WITHIN A DNS QUERY | Aug 16, 2010 | Abandoned |
Array
(
[id] => 8093423
[patent_doc_number] => 20120082307
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-05
[patent_title] => 'CRYPTOGRAPHY ON A ELLIPTICAL CURVE'
[patent_app_type] => utility
[patent_app_number] => 13/377404
[patent_app_country] => US
[patent_app_date] => 2010-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6829
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0082/20120082307.pdf
[firstpage_image] =>[orig_patent_app_number] => 13377404
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/377404 | Cryptography on a elliptical curve | Jun 14, 2010 | Issued |
Array
(
[id] => 8137533
[patent_doc_number] => 20120093309
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-19
[patent_title] => 'CRYPTOGRAPHY ON A SIMPLIFIED ELLIPTICAL CURVE'
[patent_app_type] => utility
[patent_app_number] => 13/377381
[patent_app_country] => US
[patent_app_date] => 2010-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4497
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0093/20120093309.pdf
[firstpage_image] =>[orig_patent_app_number] => 13377381
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/377381 | Cryptography on a simplified elliptical curve | Jun 14, 2010 | Issued |
Array
(
[id] => 8098501
[patent_doc_number] => 20120084865
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-05
[patent_title] => 'False Alarm Detection For Malware Scanning'
[patent_app_type] => utility
[patent_app_number] => 13/376862
[patent_app_country] => US
[patent_app_date] => 2010-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2566
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0084/20120084865.pdf
[firstpage_image] =>[orig_patent_app_number] => 13376862
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/376862 | False alarm detection for malware scanning | May 27, 2010 | Issued |
Array
(
[id] => 6647141
[patent_doc_number] => 20100174950
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-08
[patent_title] => 'METHOD AND SECURE MODULE FOR COMMUNICATION WITH HOST, METHOD AND APPARATUS FOR COMMUNICATION WITH SECURE MODULE, METHOD AND APPARATUS FOR CONTROLLING SECURE MODULE'
[patent_app_type] => utility
[patent_app_number] => 12/727859
[patent_app_country] => US
[patent_app_date] => 2010-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5596
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0174/20100174950.pdf
[firstpage_image] =>[orig_patent_app_number] => 12727859
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/727859 | METHOD AND SECURE MODULE FOR COMMUNICATION WITH HOST, METHOD AND APPARATUS FOR COMMUNICATION WITH SECURE MODULE, METHOD AND APPARATUS FOR CONTROLLING SECURE MODULE | Mar 18, 2010 | Abandoned |
Array
(
[id] => 7816974
[patent_doc_number] => 20120063594
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-03-15
[patent_title] => 'METHOD FOR CREATING ASYMMETRICAL CRYPTOGRAPHIC KEY PAIRS'
[patent_app_type] => utility
[patent_app_number] => 13/256364
[patent_app_country] => US
[patent_app_date] => 2010-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10139
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0063/20120063594.pdf
[firstpage_image] =>[orig_patent_app_number] => 13256364
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/256364 | Method for creating asymmetrical cryptographic key pairs | Mar 3, 2010 | Issued |
Array
(
[id] => 9458870
[patent_doc_number] => 08719897
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-05-06
[patent_title] => 'Access control method for tri-element peer authentication credible network connection structure'
[patent_app_type] => utility
[patent_app_number] => 13/377098
[patent_app_country] => US
[patent_app_date] => 2009-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 3050
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 330
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13377098
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/377098 | Access control method for tri-element peer authentication credible network connection structure | Dec 8, 2009 | Issued |