Search

Nyca T. Nguyen

Examiner (ID: 8299, Phone: (571)272-7168 , Office: P/3764 )

Most Active Art Unit
3784
Art Unit(s)
3784, 3764, 3778
Total Applications
803
Issued Applications
532
Pending Applications
58
Abandoned Applications
237

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 8936008 [patent_doc_number] => 08495730 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-07-23 [patent_title] => 'Dynamically constructed capability for enforcing object access order' [patent_app_type] => utility [patent_app_number] => 12/577283 [patent_app_country] => US [patent_app_date] => 2009-10-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5556 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 208 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12577283 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/577283
Dynamically constructed capability for enforcing object access order Oct 11, 2009 Issued
Array ( [id] => 6124350 [patent_doc_number] => 20110085657 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-04-14 [patent_title] => 'Data Encryption to Provide Data Security and Memory Cell Bit Wear Leveling' [patent_app_type] => utility [patent_app_number] => 12/576544 [patent_app_country] => US [patent_app_date] => 2009-10-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5745 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0085/20110085657.pdf [firstpage_image] =>[orig_patent_app_number] => 12576544 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/576544
Data encryption to provide data security and memory cell bit wear leveling Oct 8, 2009 Issued
Array ( [id] => 8899744 [patent_doc_number] => 08479278 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-07-02 [patent_title] => 'Virtualized secure networking' [patent_app_type] => utility [patent_app_number] => 12/572506 [patent_app_country] => US [patent_app_date] => 2009-10-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 16 [patent_no_of_words] => 5158 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12572506 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/572506
Virtualized secure networking Oct 1, 2009 Issued
Array ( [id] => 8945227 [patent_doc_number] => 08498411 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-07-30 [patent_title] => 'Using multiples above two with running totals and reference values other than 0 and 2 (window size) in elliptic curve cryptography scalar multiplication acceleration tables' [patent_app_type] => utility [patent_app_number] => 12/569280 [patent_app_country] => US [patent_app_date] => 2009-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 9742 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 263 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12569280 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/569280
Using multiples above two with running totals and reference values other than 0 and 2 (window size) in elliptic curve cryptography scalar multiplication acceleration tables Sep 28, 2009 Issued
Array ( [id] => 8579641 [patent_doc_number] => 08345864 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-01-01 [patent_title] => 'Elliptic curve cryptography scalar multiplication with on demand acceleration table generation' [patent_app_type] => utility [patent_app_number] => 12/569284 [patent_app_country] => US [patent_app_date] => 2009-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 6501 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 427 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12569284 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/569284
Elliptic curve cryptography scalar multiplication with on demand acceleration table generation Sep 28, 2009 Issued
Array ( [id] => 8633160 [patent_doc_number] => 08365260 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-01-29 [patent_title] => 'Multi-variable challenge and response for content security' [patent_app_type] => utility [patent_app_number] => 12/567260 [patent_app_country] => US [patent_app_date] => 2009-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 6 [patent_no_of_words] => 2937 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 138 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12567260 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/567260
Multi-variable challenge and response for content security Sep 24, 2009 Issued
Array ( [id] => 7543080 [patent_doc_number] => 08060929 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-11-15 [patent_title] => 'Method and system for providing security to processors' [patent_app_type] => utility [patent_app_number] => 12/563511 [patent_app_country] => US [patent_app_date] => 2009-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 3113 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 178 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/060/08060929.pdf [firstpage_image] =>[orig_patent_app_number] => 12563511 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/563511
Method and system for providing security to processors Sep 20, 2009 Issued
Array ( [id] => 6228361 [patent_doc_number] => 20100058453 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-03-04 [patent_title] => 'IDENTIFICATION PROCESS OF APPLICATION OF DATA STORAGE AND IDENTIFICATION HARDWARE WITH IC CARD' [patent_app_type] => utility [patent_app_number] => 12/562109 [patent_app_country] => US [patent_app_date] => 2009-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 2740 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0058/20100058453.pdf [firstpage_image] =>[orig_patent_app_number] => 12562109 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/562109
IDENTIFICATION PROCESS OF APPLICATION OF DATA STORAGE AND IDENTIFICATION HARDWARE WITH IC CARD Sep 16, 2009 Abandoned
Array ( [id] => 6619885 [patent_doc_number] => 20100064129 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-03-11 [patent_title] => 'Network adapter and communication device' [patent_app_type] => utility [patent_app_number] => 12/584228 [patent_app_country] => US [patent_app_date] => 2009-09-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 21 [patent_no_of_words] => 7748 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0064/20100064129.pdf [firstpage_image] =>[orig_patent_app_number] => 12584228 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/584228
Network adapter and communication device Sep 1, 2009 Abandoned
Array ( [id] => 7756538 [patent_doc_number] => 08112639 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-02-07 [patent_title] => 'Methods, systems and computer program products for detecting tampering of electronic equipment based on constrained time to obtain computational result' [patent_app_type] => utility [patent_app_number] => 12/508125 [patent_app_country] => US [patent_app_date] => 2009-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 6 [patent_no_of_words] => 6541 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 148 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/112/08112639.pdf [firstpage_image] =>[orig_patent_app_number] => 12508125 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/508125
Methods, systems and computer program products for detecting tampering of electronic equipment based on constrained time to obtain computational result Jul 22, 2009 Issued
Array ( [id] => 8149549 [patent_doc_number] => 08166564 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-04-24 [patent_title] => 'Content distribution system, content distribution method, and client terminal' [patent_app_type] => utility [patent_app_number] => 12/504535 [patent_app_country] => US [patent_app_date] => 2009-07-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 12724 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/166/08166564.pdf [firstpage_image] =>[orig_patent_app_number] => 12504535 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/504535
Content distribution system, content distribution method, and client terminal Jul 15, 2009 Issued
Array ( [id] => 5494915 [patent_doc_number] => 20090262943 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-10-22 [patent_title] => 'KEY DERIVATION FUNCTIONS TO ENHANCE SECURITY' [patent_app_type] => utility [patent_app_number] => 12/492060 [patent_app_country] => US [patent_app_date] => 2009-06-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 7964 [patent_no_of_claims] => 79 [patent_no_of_ind_claims] => 10 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0262/20090262943.pdf [firstpage_image] =>[orig_patent_app_number] => 12492060 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/492060
Key derivation functions to enhance security Jun 24, 2009 Issued
Array ( [id] => 7529112 [patent_doc_number] => 08045716 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-10-25 [patent_title] => 'System and method for the concealment of device input parameters' [patent_app_type] => utility [patent_app_number] => 12/485416 [patent_app_country] => US [patent_app_date] => 2009-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 3780 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 131 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/045/08045716.pdf [firstpage_image] =>[orig_patent_app_number] => 12485416 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/485416
System and method for the concealment of device input parameters Jun 15, 2009 Issued
Array ( [id] => 9063200 [patent_doc_number] => 08549655 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-10-01 [patent_title] => 'Unit and method for secure processing of access controlled audio/video data' [patent_app_type] => utility [patent_app_number] => 12/995003 [patent_app_country] => US [patent_app_date] => 2009-05-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4582 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 196 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12995003 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/995003
Unit and method for secure processing of access controlled audio/video data May 27, 2009 Issued
Array ( [id] => 5554178 [patent_doc_number] => 20090288164 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-11-19 [patent_title] => 'DIGITAL FORENSIC ANALYSIS USING EMPIRICAL PRIVILEGE PROFILING (EPP) FOR FILTERING COLLECTED DATA' [patent_app_type] => utility [patent_app_number] => 12/469558 [patent_app_country] => US [patent_app_date] => 2009-05-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 26 [patent_figures_cnt] => 26 [patent_no_of_words] => 21889 [patent_no_of_claims] => 33 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0288/20090288164.pdf [firstpage_image] =>[orig_patent_app_number] => 12469558 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/469558
Digital forensic analysis using empirical privilege profiling (EPP) for filtering collected data May 19, 2009 Issued
Array ( [id] => 5390688 [patent_doc_number] => 20090208001 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-08-20 [patent_title] => 'Instant Messaging Private Tags' [patent_app_type] => utility [patent_app_number] => 12/434006 [patent_app_country] => US [patent_app_date] => 2009-05-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7056 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0208/20090208001.pdf [firstpage_image] =>[orig_patent_app_number] => 12434006 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/434006
Instant messaging private tags Apr 30, 2009 Issued
Array ( [id] => 5933313 [patent_doc_number] => 20110041188 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-02-17 [patent_title] => 'METHOD AND SYSTEM FOR PROTECTION OF COMPUTER APPLICATIONS AND SOFTWARE PRODUCTS AGAINST UNAUTHORIZED COPYING' [patent_app_type] => utility [patent_app_number] => 12/990166 [patent_app_country] => US [patent_app_date] => 2009-04-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2556 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0041/20110041188.pdf [firstpage_image] =>[orig_patent_app_number] => 12990166 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/990166
METHOD AND SYSTEM FOR PROTECTION OF COMPUTER APPLICATIONS AND SOFTWARE PRODUCTS AGAINST UNAUTHORIZED COPYING Apr 26, 2009 Abandoned
Array ( [id] => 7735032 [patent_doc_number] => 08104079 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-01-24 [patent_title] => 'Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth' [patent_app_type] => utility [patent_app_number] => 12/383289 [patent_app_country] => US [patent_app_date] => 2009-03-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13727 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 79 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/104/08104079.pdf [firstpage_image] =>[orig_patent_app_number] => 12383289 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/383289
Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth Mar 22, 2009 Issued
Array ( [id] => 7798421 [patent_doc_number] => 08127139 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-02-28 [patent_title] => 'Handheld devices and methods for extracting data' [patent_app_type] => utility [patent_app_number] => 12/405937 [patent_app_country] => US [patent_app_date] => 2009-03-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5937 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 86 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/127/08127139.pdf [firstpage_image] =>[orig_patent_app_number] => 12405937 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/405937
Handheld devices and methods for extracting data Mar 16, 2009 Issued
Array ( [id] => 7686155 [patent_doc_number] => 20090178136 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-07-09 [patent_title] => 'METHOD AND DEVICE FOR ENTERING A COMPUTER DATABASE PASSWORD' [patent_app_type] => utility [patent_app_number] => 12/400928 [patent_app_country] => US [patent_app_date] => 2009-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3440 [patent_no_of_claims] => 38 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0178/20090178136.pdf [firstpage_image] =>[orig_patent_app_number] => 12400928 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/400928
METHOD AND DEVICE FOR ENTERING A COMPUTER DATABASE PASSWORD Mar 9, 2009 Abandoned
Menu