Search

Nyca T. Nguyen

Examiner (ID: 8299, Phone: (571)272-7168 , Office: P/3764 )

Most Active Art Unit
3784
Art Unit(s)
3784, 3764, 3778
Total Applications
803
Issued Applications
532
Pending Applications
58
Abandoned Applications
237

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 5226697 [patent_doc_number] => 20070255964 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-11-01 [patent_title] => 'System and method of implementing security for a docked data processing system' [patent_app_type] => utility [patent_app_number] => 11/412814 [patent_app_country] => US [patent_app_date] => 2006-04-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 1810 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0255/20070255964.pdf [firstpage_image] =>[orig_patent_app_number] => 11412814 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/412814
System and method of implementing security for a docked data processing system Apr 26, 2006 Abandoned
Array ( [id] => 5693239 [patent_doc_number] => 20060153385 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-07-13 [patent_title] => 'Auto configuration of portable computers for use in wireless local area networks' [patent_app_type] => utility [patent_app_number] => 11/373896 [patent_app_country] => US [patent_app_date] => 2006-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 7312 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0153/20060153385.pdf [firstpage_image] =>[orig_patent_app_number] => 11373896 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/373896
Auto configuration of portable computers for use in wireless local area networks Mar 12, 2006 Abandoned
Array ( [id] => 355976 [patent_doc_number] => 07493653 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2009-02-17 [patent_title] => 'Auto configuration of portable computers for use in wireless local area networks' [patent_app_type] => utility [patent_app_number] => 11/374457 [patent_app_country] => US [patent_app_date] => 2006-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 7338 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 53 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/493/07493653.pdf [firstpage_image] =>[orig_patent_app_number] => 11374457 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/374457
Auto configuration of portable computers for use in wireless local area networks Mar 12, 2006 Issued
Array ( [id] => 213528 [patent_doc_number] => 07624448 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2009-11-24 [patent_title] => 'Intelligent intrusion detection system utilizing enhanced graph-matching of network activity with context data' [patent_app_type] => utility [patent_app_number] => 11/367943 [patent_app_country] => US [patent_app_date] => 2006-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 18 [patent_no_of_words] => 14494 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 9 [patent_words_short_claim] => 60 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/624/07624448.pdf [firstpage_image] =>[orig_patent_app_number] => 11367943 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/367943
Intelligent intrusion detection system utilizing enhanced graph-matching of network activity with context data Mar 3, 2006 Issued
Array ( [id] => 8945978 [patent_doc_number] => 08499165 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-07-30 [patent_title] => 'System and method for biometric verification in a delivery process' [patent_app_type] => utility [patent_app_number] => 11/366864 [patent_app_country] => US [patent_app_date] => 2006-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 2860 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11366864 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/366864
System and method for biometric verification in a delivery process Feb 28, 2006 Issued
Array ( [id] => 5114927 [patent_doc_number] => 20070198843 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-08-23 [patent_title] => 'System, method, and computer program product for secure input for mobile devices' [patent_app_type] => utility [patent_app_number] => 11/359155 [patent_app_country] => US [patent_app_date] => 2006-02-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2495 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0198/20070198843.pdf [firstpage_image] =>[orig_patent_app_number] => 11359155 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/359155
System, method, and computer program product for secure input for mobile devices Feb 21, 2006 Issued
Array ( [id] => 4580349 [patent_doc_number] => 07848515 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-12-07 [patent_title] => 'Encryption protection method' [patent_app_type] => utility [patent_app_number] => 11/358979 [patent_app_country] => US [patent_app_date] => 2006-02-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 4703 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 226 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/848/07848515.pdf [firstpage_image] =>[orig_patent_app_number] => 11358979 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/358979
Encryption protection method Feb 21, 2006 Issued
Array ( [id] => 5621071 [patent_doc_number] => 20060190606 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-08-24 [patent_title] => 'Data transfer security' [patent_app_type] => utility [patent_app_number] => 11/357947 [patent_app_country] => US [patent_app_date] => 2006-02-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 12292 [patent_no_of_claims] => 56 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0190/20060190606.pdf [firstpage_image] =>[orig_patent_app_number] => 11357947 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/357947
Data transfer security Feb 21, 2006 Issued
Array ( [id] => 66447 [patent_doc_number] => 07765399 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-07-27 [patent_title] => 'Computer architecture for a handheld electronic device' [patent_app_type] => utility [patent_app_number] => 11/359224 [patent_app_country] => US [patent_app_date] => 2006-02-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 4973 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 218 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/765/07765399.pdf [firstpage_image] =>[orig_patent_app_number] => 11359224 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/359224
Computer architecture for a handheld electronic device Feb 21, 2006 Issued
Array ( [id] => 10861023 [patent_doc_number] => 08887241 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-11-11 [patent_title] => 'Virtual roles' [patent_app_type] => utility [patent_app_number] => 11/359212 [patent_app_country] => US [patent_app_date] => 2006-02-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3019 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 137 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11359212 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/359212
Virtual roles Feb 21, 2006 Issued
Array ( [id] => 28806 [patent_doc_number] => 07797747 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2010-09-14 [patent_title] => 'Detection of malicious code in non-paged pool unused pages' [patent_app_type] => utility [patent_app_number] => 11/359235 [patent_app_country] => US [patent_app_date] => 2006-02-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6450 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/797/07797747.pdf [firstpage_image] =>[orig_patent_app_number] => 11359235 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/359235
Detection of malicious code in non-paged pool unused pages Feb 20, 2006 Issued
Array ( [id] => 7690173 [patent_doc_number] => 20070233860 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-10-04 [patent_title] => 'Methods and systems for exchanging security information via peer-to-peer wireless networks' [patent_app_type] => utility [patent_app_number] => 11/359208 [patent_app_country] => US [patent_app_date] => 2006-02-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10910 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0233/20070233860.pdf [firstpage_image] =>[orig_patent_app_number] => 11359208 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/359208
Methods and systems for exchanging security information via peer-to-peer wireless networks Feb 20, 2006 Issued
Array ( [id] => 8273124 [patent_doc_number] => 08214634 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-07-03 [patent_title] => 'Establishing trust via aggregate peer ranking' [patent_app_type] => utility [patent_app_number] => 11/359238 [patent_app_country] => US [patent_app_date] => 2006-02-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 2751 [patent_no_of_claims] => 31 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 134 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11359238 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/359238
Establishing trust via aggregate peer ranking Feb 20, 2006 Issued
Array ( [id] => 5916712 [patent_doc_number] => 20060129841 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-06-15 [patent_title] => 'Method and system for user registration using coded marks' [patent_app_type] => utility [patent_app_number] => 11/349143 [patent_app_country] => US [patent_app_date] => 2006-02-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 48 [patent_figures_cnt] => 48 [patent_no_of_words] => 27664 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0129/20060129841.pdf [firstpage_image] =>[orig_patent_app_number] => 11349143 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/349143
Method and system for user registration using coded marks Feb 7, 2006 Issued
Array ( [id] => 593813 [patent_doc_number] => 07461270 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2008-12-02 [patent_title] => 'Methods and systems for promoting security in a computer system employing attached storage devices' [patent_app_type] => utility [patent_app_number] => 11/346118 [patent_app_country] => US [patent_app_date] => 2006-02-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6702 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 114 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/461/07461270.pdf [firstpage_image] =>[orig_patent_app_number] => 11346118 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/346118
Methods and systems for promoting security in a computer system employing attached storage devices Feb 1, 2006 Issued
Array ( [id] => 37559 [patent_doc_number] => 07793093 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-09-07 [patent_title] => 'Communications state transition monitoring method and communications state transition monitoring device utilizing the same' [patent_app_type] => utility [patent_app_number] => 11/334562 [patent_app_country] => US [patent_app_date] => 2006-01-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 13 [patent_no_of_words] => 8012 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 9 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/793/07793093.pdf [firstpage_image] =>[orig_patent_app_number] => 11334562 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/334562
Communications state transition monitoring method and communications state transition monitoring device utilizing the same Jan 18, 2006 Issued
Array ( [id] => 4647197 [patent_doc_number] => 08024811 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-09-20 [patent_title] => 'System and method for secure PIN exchange' [patent_app_type] => utility [patent_app_number] => 11/334436 [patent_app_country] => US [patent_app_date] => 2006-01-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6645 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 41 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/024/08024811.pdf [firstpage_image] =>[orig_patent_app_number] => 11334436 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/334436
System and method for secure PIN exchange Jan 18, 2006 Issued
Array ( [id] => 8246300 [patent_doc_number] => 08204232 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-06-19 [patent_title] => 'Accelerated verification of digital signatures and public keys' [patent_app_type] => utility [patent_app_number] => 11/333296 [patent_app_country] => US [patent_app_date] => 2006-01-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 10822 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 223 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/204/08204232.pdf [firstpage_image] =>[orig_patent_app_number] => 11333296 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/333296
Accelerated verification of digital signatures and public keys Jan 17, 2006 Issued
Array ( [id] => 5042257 [patent_doc_number] => 20070094539 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-04-26 [patent_title] => 'Computer virus check method in a storage system' [patent_app_type] => utility [patent_app_number] => 11/333285 [patent_app_country] => US [patent_app_date] => 2006-01-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 11515 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0094/20070094539.pdf [firstpage_image] =>[orig_patent_app_number] => 11333285 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/333285
Computer virus check method in a storage system Jan 17, 2006 Issued
Array ( [id] => 5190895 [patent_doc_number] => 20070169204 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-07-19 [patent_title] => 'System and method for dynamic security access' [patent_app_type] => utility [patent_app_number] => 11/333438 [patent_app_country] => US [patent_app_date] => 2006-01-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5367 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0169/20070169204.pdf [firstpage_image] =>[orig_patent_app_number] => 11333438 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/333438
System and method for dynamic security access Jan 16, 2006 Abandoned
Menu