
Nyca T. Nguyen
Examiner (ID: 8299, Phone: (571)272-7168 , Office: P/3764 )
| Most Active Art Unit | 3784 |
| Art Unit(s) | 3784, 3764, 3778 |
| Total Applications | 803 |
| Issued Applications | 532 |
| Pending Applications | 58 |
| Abandoned Applications | 237 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 8936008
[patent_doc_number] => 08495730
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-23
[patent_title] => 'Dynamically constructed capability for enforcing object access order'
[patent_app_type] => utility
[patent_app_number] => 12/577283
[patent_app_country] => US
[patent_app_date] => 2009-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5556
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 208
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12577283
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/577283 | Dynamically constructed capability for enforcing object access order | Oct 11, 2009 | Issued |
Array
(
[id] => 6124350
[patent_doc_number] => 20110085657
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-04-14
[patent_title] => 'Data Encryption to Provide Data Security and Memory Cell Bit Wear Leveling'
[patent_app_type] => utility
[patent_app_number] => 12/576544
[patent_app_country] => US
[patent_app_date] => 2009-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5745
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0085/20110085657.pdf
[firstpage_image] =>[orig_patent_app_number] => 12576544
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/576544 | Data encryption to provide data security and memory cell bit wear leveling | Oct 8, 2009 | Issued |
Array
(
[id] => 8899744
[patent_doc_number] => 08479278
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-02
[patent_title] => 'Virtualized secure networking'
[patent_app_type] => utility
[patent_app_number] => 12/572506
[patent_app_country] => US
[patent_app_date] => 2009-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 16
[patent_no_of_words] => 5158
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12572506
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/572506 | Virtualized secure networking | Oct 1, 2009 | Issued |
Array
(
[id] => 8945227
[patent_doc_number] => 08498411
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-07-30
[patent_title] => 'Using multiples above two with running totals and reference values other than 0 and 2 (window size) in elliptic curve cryptography scalar multiplication acceleration tables'
[patent_app_type] => utility
[patent_app_number] => 12/569280
[patent_app_country] => US
[patent_app_date] => 2009-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 9742
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 263
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12569280
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/569280 | Using multiples above two with running totals and reference values other than 0 and 2 (window size) in elliptic curve cryptography scalar multiplication acceleration tables | Sep 28, 2009 | Issued |
Array
(
[id] => 8579641
[patent_doc_number] => 08345864
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-01-01
[patent_title] => 'Elliptic curve cryptography scalar multiplication with on demand acceleration table generation'
[patent_app_type] => utility
[patent_app_number] => 12/569284
[patent_app_country] => US
[patent_app_date] => 2009-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6501
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 427
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12569284
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/569284 | Elliptic curve cryptography scalar multiplication with on demand acceleration table generation | Sep 28, 2009 | Issued |
Array
(
[id] => 8633160
[patent_doc_number] => 08365260
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-01-29
[patent_title] => 'Multi-variable challenge and response for content security'
[patent_app_type] => utility
[patent_app_number] => 12/567260
[patent_app_country] => US
[patent_app_date] => 2009-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 2937
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12567260
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/567260 | Multi-variable challenge and response for content security | Sep 24, 2009 | Issued |
Array
(
[id] => 7543080
[patent_doc_number] => 08060929
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-11-15
[patent_title] => 'Method and system for providing security to processors'
[patent_app_type] => utility
[patent_app_number] => 12/563511
[patent_app_country] => US
[patent_app_date] => 2009-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 3113
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/060/08060929.pdf
[firstpage_image] =>[orig_patent_app_number] => 12563511
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/563511 | Method and system for providing security to processors | Sep 20, 2009 | Issued |
Array
(
[id] => 6228361
[patent_doc_number] => 20100058453
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-03-04
[patent_title] => 'IDENTIFICATION PROCESS OF APPLICATION OF DATA STORAGE AND IDENTIFICATION HARDWARE WITH IC CARD'
[patent_app_type] => utility
[patent_app_number] => 12/562109
[patent_app_country] => US
[patent_app_date] => 2009-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 2740
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0058/20100058453.pdf
[firstpage_image] =>[orig_patent_app_number] => 12562109
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/562109 | IDENTIFICATION PROCESS OF APPLICATION OF DATA STORAGE AND IDENTIFICATION HARDWARE WITH IC CARD | Sep 16, 2009 | Abandoned |
Array
(
[id] => 6619885
[patent_doc_number] => 20100064129
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-03-11
[patent_title] => 'Network adapter and communication device'
[patent_app_type] => utility
[patent_app_number] => 12/584228
[patent_app_country] => US
[patent_app_date] => 2009-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 7748
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0064/20100064129.pdf
[firstpage_image] =>[orig_patent_app_number] => 12584228
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/584228 | Network adapter and communication device | Sep 1, 2009 | Abandoned |
Array
(
[id] => 7756538
[patent_doc_number] => 08112639
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-02-07
[patent_title] => 'Methods, systems and computer program products for detecting tampering of electronic equipment based on constrained time to obtain computational result'
[patent_app_type] => utility
[patent_app_number] => 12/508125
[patent_app_country] => US
[patent_app_date] => 2009-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 6541
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/112/08112639.pdf
[firstpage_image] =>[orig_patent_app_number] => 12508125
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/508125 | Methods, systems and computer program products for detecting tampering of electronic equipment based on constrained time to obtain computational result | Jul 22, 2009 | Issued |
Array
(
[id] => 8149549
[patent_doc_number] => 08166564
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-04-24
[patent_title] => 'Content distribution system, content distribution method, and client terminal'
[patent_app_type] => utility
[patent_app_number] => 12/504535
[patent_app_country] => US
[patent_app_date] => 2009-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12724
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/166/08166564.pdf
[firstpage_image] =>[orig_patent_app_number] => 12504535
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/504535 | Content distribution system, content distribution method, and client terminal | Jul 15, 2009 | Issued |
Array
(
[id] => 5494915
[patent_doc_number] => 20090262943
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-10-22
[patent_title] => 'KEY DERIVATION FUNCTIONS TO ENHANCE SECURITY'
[patent_app_type] => utility
[patent_app_number] => 12/492060
[patent_app_country] => US
[patent_app_date] => 2009-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 7964
[patent_no_of_claims] => 79
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0262/20090262943.pdf
[firstpage_image] =>[orig_patent_app_number] => 12492060
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/492060 | Key derivation functions to enhance security | Jun 24, 2009 | Issued |
Array
(
[id] => 7529112
[patent_doc_number] => 08045716
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-10-25
[patent_title] => 'System and method for the concealment of device input parameters'
[patent_app_type] => utility
[patent_app_number] => 12/485416
[patent_app_country] => US
[patent_app_date] => 2009-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 3780
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/045/08045716.pdf
[firstpage_image] =>[orig_patent_app_number] => 12485416
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/485416 | System and method for the concealment of device input parameters | Jun 15, 2009 | Issued |
Array
(
[id] => 9063200
[patent_doc_number] => 08549655
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-10-01
[patent_title] => 'Unit and method for secure processing of access controlled audio/video data'
[patent_app_type] => utility
[patent_app_number] => 12/995003
[patent_app_country] => US
[patent_app_date] => 2009-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4582
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12995003
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/995003 | Unit and method for secure processing of access controlled audio/video data | May 27, 2009 | Issued |
Array
(
[id] => 5554178
[patent_doc_number] => 20090288164
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-11-19
[patent_title] => 'DIGITAL FORENSIC ANALYSIS USING EMPIRICAL PRIVILEGE PROFILING (EPP) FOR FILTERING COLLECTED DATA'
[patent_app_type] => utility
[patent_app_number] => 12/469558
[patent_app_country] => US
[patent_app_date] => 2009-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 26
[patent_no_of_words] => 21889
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0288/20090288164.pdf
[firstpage_image] =>[orig_patent_app_number] => 12469558
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/469558 | Digital forensic analysis using empirical privilege profiling (EPP) for filtering collected data | May 19, 2009 | Issued |
Array
(
[id] => 5390688
[patent_doc_number] => 20090208001
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-08-20
[patent_title] => 'Instant Messaging Private Tags'
[patent_app_type] => utility
[patent_app_number] => 12/434006
[patent_app_country] => US
[patent_app_date] => 2009-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7056
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0208/20090208001.pdf
[firstpage_image] =>[orig_patent_app_number] => 12434006
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/434006 | Instant messaging private tags | Apr 30, 2009 | Issued |
Array
(
[id] => 5933313
[patent_doc_number] => 20110041188
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-02-17
[patent_title] => 'METHOD AND SYSTEM FOR PROTECTION OF COMPUTER APPLICATIONS AND SOFTWARE PRODUCTS AGAINST UNAUTHORIZED COPYING'
[patent_app_type] => utility
[patent_app_number] => 12/990166
[patent_app_country] => US
[patent_app_date] => 2009-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2556
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0041/20110041188.pdf
[firstpage_image] =>[orig_patent_app_number] => 12990166
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/990166 | METHOD AND SYSTEM FOR PROTECTION OF COMPUTER APPLICATIONS AND SOFTWARE PRODUCTS AGAINST UNAUTHORIZED COPYING | Apr 26, 2009 | Abandoned |
Array
(
[id] => 7735032
[patent_doc_number] => 08104079
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-01-24
[patent_title] => 'Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth'
[patent_app_type] => utility
[patent_app_number] => 12/383289
[patent_app_country] => US
[patent_app_date] => 2009-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13727
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 79
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/104/08104079.pdf
[firstpage_image] =>[orig_patent_app_number] => 12383289
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/383289 | Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth | Mar 22, 2009 | Issued |
Array
(
[id] => 7798421
[patent_doc_number] => 08127139
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-02-28
[patent_title] => 'Handheld devices and methods for extracting data'
[patent_app_type] => utility
[patent_app_number] => 12/405937
[patent_app_country] => US
[patent_app_date] => 2009-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5937
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/127/08127139.pdf
[firstpage_image] =>[orig_patent_app_number] => 12405937
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/405937 | Handheld devices and methods for extracting data | Mar 16, 2009 | Issued |
Array
(
[id] => 7686155
[patent_doc_number] => 20090178136
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-07-09
[patent_title] => 'METHOD AND DEVICE FOR ENTERING A COMPUTER DATABASE PASSWORD'
[patent_app_type] => utility
[patent_app_number] => 12/400928
[patent_app_country] => US
[patent_app_date] => 2009-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3440
[patent_no_of_claims] => 38
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0178/20090178136.pdf
[firstpage_image] =>[orig_patent_app_number] => 12400928
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/400928 | METHOD AND DEVICE FOR ENTERING A COMPUTER DATABASE PASSWORD | Mar 9, 2009 | Abandoned |