
Khang D. Do
Examiner (ID: 9762, Phone: (571)270-7837 , Office: P/2492 )
| Most Active Art Unit | 2492 |
| Art Unit(s) | 2496, 2492 |
| Total Applications | 469 |
| Issued Applications | 388 |
| Pending Applications | 29 |
| Abandoned Applications | 66 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16439317
[patent_doc_number] => 20200356643
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-12
[patent_title] => END-POINT MEDIA WATERMARKING
[patent_app_type] => utility
[patent_app_number] => 16/405130
[patent_app_country] => US
[patent_app_date] => 2019-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11691
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16405130
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/405130 | End-point media watermarking | May 6, 2019 | Issued |
Array
(
[id] => 17861890
[patent_doc_number] => 11443048
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-13
[patent_title] => Install-time procedural content generation for encrypted packages
[patent_app_type] => utility
[patent_app_number] => 16/404617
[patent_app_country] => US
[patent_app_date] => 2019-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13716
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16404617
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/404617 | Install-time procedural content generation for encrypted packages | May 5, 2019 | Issued |
Array
(
[id] => 18132188
[patent_doc_number] => 11558408
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-17
[patent_title] => Anomaly detection based on evaluation of user behavior using multi-context machine learning
[patent_app_type] => utility
[patent_app_number] => 16/402500
[patent_app_country] => US
[patent_app_date] => 2019-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7512
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 263
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16402500
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/402500 | Anomaly detection based on evaluation of user behavior using multi-context machine learning | May 2, 2019 | Issued |
Array
(
[id] => 18372652
[patent_doc_number] => 11652839
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-05-16
[patent_title] => Aviation system assessment platform for system-level security and safety
[patent_app_type] => utility
[patent_app_number] => 16/401592
[patent_app_country] => US
[patent_app_date] => 2019-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 18900
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16401592
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/401592 | Aviation system assessment platform for system-level security and safety | May 1, 2019 | Issued |
Array
(
[id] => 18175960
[patent_doc_number] => 11575688
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-02-07
[patent_title] => Method of malware characterization and prediction
[patent_app_type] => utility
[patent_app_number] => 16/402219
[patent_app_country] => US
[patent_app_date] => 2019-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 9583
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16402219
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/402219 | Method of malware characterization and prediction | May 1, 2019 | Issued |
Array
(
[id] => 14786943
[patent_doc_number] => 20190268369
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-29
[patent_title] => Selectively Choosing Between Actual-Attack and Simulation/Evaluation for Validating a Vulnerability of a Network Node During Execution of a Penetration Testing Campaign
[patent_app_type] => utility
[patent_app_number] => 16/400938
[patent_app_country] => US
[patent_app_date] => 2019-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 26659
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16400938
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/400938 | Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign | Apr 30, 2019 | Issued |
Array
(
[id] => 17311168
[patent_doc_number] => 11212299
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-12-28
[patent_title] => System and method for monitoring security attack chains
[patent_app_type] => utility
[patent_app_number] => 16/401052
[patent_app_country] => US
[patent_app_date] => 2019-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8782
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16401052
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/401052 | System and method for monitoring security attack chains | Apr 30, 2019 | Issued |
Array
(
[id] => 17942754
[patent_doc_number] => 11477226
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-18
[patent_title] => Online system identification for data reliability enhancement
[patent_app_type] => utility
[patent_app_number] => 16/392734
[patent_app_country] => US
[patent_app_date] => 2019-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10298
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 281
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16392734
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/392734 | Online system identification for data reliability enhancement | Apr 23, 2019 | Issued |
Array
(
[id] => 17629415
[patent_doc_number] => 20220164430
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-05-26
[patent_title] => Method For Identifying And Authenticating A User Profile
[patent_app_type] => utility
[patent_app_number] => 17/602794
[patent_app_country] => US
[patent_app_date] => 2019-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1411
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17602794
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/602794 | Method For Identifying And Authenticating A User Profile | Apr 15, 2019 | Abandoned |
Array
(
[id] => 14679035
[patent_doc_number] => 20190238632
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-01
[patent_title] => WIRELESS NETWORK CLOUD COMPUTING RESOURCE MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 16/380937
[patent_app_country] => US
[patent_app_date] => 2019-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9717
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16380937
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/380937 | Wireless network cloud computing resource management | Apr 9, 2019 | Issued |
Array
(
[id] => 14658271
[patent_doc_number] => 20190236264
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-01
[patent_title] => METHODS AND SYSTEMS FOR AUTHENTICATING A HEADSET FOR A TRANSPORTATION VEHICLE
[patent_app_type] => utility
[patent_app_number] => 16/374687
[patent_app_country] => US
[patent_app_date] => 2019-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4947
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16374687
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/374687 | Methods and systems for authenticating a headset for a transportation vehicle | Apr 2, 2019 | Issued |
Array
(
[id] => 18132181
[patent_doc_number] => 11558401
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-01-17
[patent_title] => Multi-vector malware detection data sharing system for improved detection
[patent_app_type] => utility
[patent_app_number] => 16/353982
[patent_app_country] => US
[patent_app_date] => 2019-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 16563
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16353982
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/353982 | Multi-vector malware detection data sharing system for improved detection | Mar 13, 2019 | Issued |
Array
(
[id] => 16988737
[patent_doc_number] => 11075932
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-27
[patent_title] => Appliance extension for remote communication with a cyber security appliance
[patent_app_type] => utility
[patent_app_number] => 16/278998
[patent_app_country] => US
[patent_app_date] => 2019-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13052
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 392
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16278998
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/278998 | Appliance extension for remote communication with a cyber security appliance | Feb 18, 2019 | Issued |
Array
(
[id] => 17788844
[patent_doc_number] => 11411990
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-09
[patent_title] => Early detection of potentially-compromised email accounts
[patent_app_type] => utility
[patent_app_number] => 16/277468
[patent_app_country] => US
[patent_app_date] => 2019-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4076
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16277468
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/277468 | Early detection of potentially-compromised email accounts | Feb 14, 2019 | Issued |
Array
(
[id] => 17926840
[patent_doc_number] => 11470113
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-10-11
[patent_title] => Method to eliminate data theft through a phishing website
[patent_app_type] => utility
[patent_app_number] => 16/277624
[patent_app_country] => US
[patent_app_date] => 2019-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2153
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 324
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16277624
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/277624 | Method to eliminate data theft through a phishing website | Feb 14, 2019 | Issued |
Array
(
[id] => 16846983
[patent_doc_number] => 11019095
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-25
[patent_title] => Ransomware detection using file replication logs
[patent_app_type] => utility
[patent_app_number] => 16/261682
[patent_app_country] => US
[patent_app_date] => 2019-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6013
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16261682
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/261682 | Ransomware detection using file replication logs | Jan 29, 2019 | Issued |
Array
(
[id] => 17824765
[patent_doc_number] => 11429713
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-08-30
[patent_title] => Artificial intelligence modeling for cyber-attack simulation protocols
[patent_app_type] => utility
[patent_app_number] => 16/256810
[patent_app_country] => US
[patent_app_date] => 2019-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9305
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16256810
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/256810 | Artificial intelligence modeling for cyber-attack simulation protocols | Jan 23, 2019 | Issued |
Array
(
[id] => 15654731
[patent_doc_number] => 20200089896
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-19
[patent_title] => ENCRYPTED LOG AGGREGATION
[patent_app_type] => utility
[patent_app_number] => 16/249952
[patent_app_country] => US
[patent_app_date] => 2019-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6435
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16249952
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/249952 | Encrypted log aggregation | Jan 16, 2019 | Issued |
Array
(
[id] => 17033826
[patent_doc_number] => 11095651
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-17
[patent_title] => Communication apparatus and non-transitory computer readable storage medium
[patent_app_type] => utility
[patent_app_number] => 16/247882
[patent_app_country] => US
[patent_app_date] => 2019-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 8639
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16247882
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/247882 | Communication apparatus and non-transitory computer readable storage medium | Jan 14, 2019 | Issued |
Array
(
[id] => 17019380
[patent_doc_number] => 11089036
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-10
[patent_title] => Identifying security risks and fraud attacks using authentication from a network of websites
[patent_app_type] => utility
[patent_app_number] => 16/233464
[patent_app_country] => US
[patent_app_date] => 2018-12-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 9216
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16233464
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/233464 | Identifying security risks and fraud attacks using authentication from a network of websites | Dec 26, 2018 | Issued |