![](/images/general/no_picture/200_user.png)
Phuc T Dang
Examiner (ID: 4741, Phone: (571)272-1776 , Office: P/2892 )
Most Active Art Unit | 2892 |
Art Unit(s) | 2897, 2892, 2823, 2818 |
Total Applications | 3206 |
Issued Applications | 2961 |
Pending Applications | 111 |
Abandoned Applications | 134 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 17977624
[patent_doc_number] => 11494486
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-11-08
[patent_title] => Continuously habituating elicitation strategies for social-engineering-attacks (CHESS)
[patent_app_type] => utility
[patent_app_number] => 16/684382
[patent_app_country] => US
[patent_app_date] => 2019-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 10415
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 42
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16684382
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/684382 | Continuously habituating elicitation strategies for social-engineering-attacks (CHESS) | Nov 13, 2019 | Issued |
Array
(
[id] => 17340309
[patent_doc_number] => 20220006640
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-01-06
[patent_title] => BLOCKCHAIN WITH NON-TURING COMPLETE SYSTEM GUARDS
[patent_app_type] => utility
[patent_app_number] => 17/292707
[patent_app_country] => US
[patent_app_date] => 2019-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3407
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 66
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17292707
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/292707 | BLOCKCHAIN WITH NON-TURING COMPLETE SYSTEM GUARDS | Nov 6, 2019 | Pending |
Array
(
[id] => 18638383
[patent_doc_number] => 11762988
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-09-19
[patent_title] => Restricting access to transactions based on information requirements
[patent_app_type] => utility
[patent_app_number] => 16/591190
[patent_app_country] => US
[patent_app_date] => 2019-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9476
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 634
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16591190
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/591190 | Restricting access to transactions based on information requirements | Oct 1, 2019 | Issued |
Array
(
[id] => 16714426
[patent_doc_number] => 20210081573
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-18
[patent_title] => MERGED SURFACE FAST SCAN TECHNIQUE FOR GENERATING A REFERENCE EMI FINGERPRINT TO DETECT UNWANTED COMPONENTS IN ELECTRONIC SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 16/572439
[patent_app_country] => US
[patent_app_date] => 2019-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4899
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16572439
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/572439 | MERGED SURFACE FAST SCAN TECHNIQUE FOR GENERATING A REFERENCE EMI FINGERPRINT TO DETECT UNWANTED COMPONENTS IN ELECTRONIC SYSTEMS | Sep 15, 2019 | Abandoned |
Array
(
[id] => 16117103
[patent_doc_number] => 20200210574
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-02
[patent_title] => SYSTEM AND METHOD FOR VERIFYING DIGITAL SIGNATURES OF FILES
[patent_app_type] => utility
[patent_app_number] => 16/563107
[patent_app_country] => US
[patent_app_date] => 2019-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7316
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16563107
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/563107 | SYSTEM AND METHOD FOR VERIFYING DIGITAL SIGNATURES OF FILES | Sep 5, 2019 | Abandoned |
Array
(
[id] => 15595173
[patent_doc_number] => 20200074121
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => Cryptographic Operation Processing Methods, Apparatuses, and Systems
[patent_app_type] => utility
[patent_app_number] => 16/554241
[patent_app_country] => US
[patent_app_date] => 2019-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19518
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16554241
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/554241 | Cryptographic Operation Processing Methods, Apparatuses, and Systems | Aug 27, 2019 | Abandoned |
Array
(
[id] => 16630613
[patent_doc_number] => 20210049266
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-18
[patent_title] => SYSTEM AND METHOD FOR TRIGGERING AND DETECTING HARDWARE TROJANS
[patent_app_type] => utility
[patent_app_number] => 16/540904
[patent_app_country] => US
[patent_app_date] => 2019-08-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9541
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 55
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16540904
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/540904 | System and method for triggering and detecting hardware trojans | Aug 13, 2019 | Issued |
Array
(
[id] => 15459805
[patent_doc_number] => 20200042727
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-06
[patent_title] => INFORMATION PROVISION APPARATUS AND INFORMATION PROVISION METHOD
[patent_app_type] => utility
[patent_app_number] => 16/520307
[patent_app_country] => US
[patent_app_date] => 2019-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8524
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16520307
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/520307 | Information provision apparatus and information provision method | Jul 22, 2019 | Issued |
Array
(
[id] => 17809641
[patent_doc_number] => 20220261476
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-18
[patent_title] => SECURITY MANAGEMENT DEVICE, SECURITY MANAGEMENT METHOD AND NON-TRANSITORY COMPUTER-READABLE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 17/626975
[patent_app_country] => US
[patent_app_date] => 2019-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7402
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17626975
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/626975 | SECURITY MANAGEMENT DEVICE, SECURITY MANAGEMENT METHOD AND NON-TRANSITORY COMPUTER-READABLE MEDIUM | Jul 21, 2019 | Pending |
Array
(
[id] => 15871315
[patent_doc_number] => 20200143061
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => METHOD AND APPARATUS FOR TRACKING LOCATION OF INPUT DATA THAT CAUSES BINARY VULNERABILITY
[patent_app_type] => utility
[patent_app_number] => 16/517452
[patent_app_country] => US
[patent_app_date] => 2019-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7344
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16517452
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/517452 | METHOD AND APPARATUS FOR TRACKING LOCATION OF INPUT DATA THAT CAUSES BINARY VULNERABILITY | Jul 18, 2019 | Abandoned |
Array
(
[id] => 19167372
[patent_doc_number] => 11983277
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-05-14
[patent_title] => Identifying a security vulnerability in a computer system
[patent_app_type] => utility
[patent_app_number] => 16/513454
[patent_app_country] => US
[patent_app_date] => 2019-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3231
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16513454
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/513454 | Identifying a security vulnerability in a computer system | Jul 15, 2019 | Issued |
Array
(
[id] => 15353301
[patent_doc_number] => 20200014542
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-09
[patent_title] => DETECTION OF ANOMALIES IN A COMPUTER SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/460800
[patent_app_country] => US
[patent_app_date] => 2019-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15003
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16460800
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/460800 | DETECTION OF ANOMALIES IN A COMPUTER SYSTEM | Jul 1, 2019 | Abandoned |
Array
(
[id] => 15413119
[patent_doc_number] => 20200026882
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-23
[patent_title] => METHODS AND SYSTEMS FOR ACTIVATING MEASUREMENT BASED ON A TRUSTED CARD
[patent_app_type] => utility
[patent_app_number] => 16/460907
[patent_app_country] => US
[patent_app_date] => 2019-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17034
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16460907
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/460907 | METHODS AND SYSTEMS FOR ACTIVATING MEASUREMENT BASED ON A TRUSTED CARD | Jul 1, 2019 | Abandoned |
Array
(
[id] => 17559936
[patent_doc_number] => 11316667
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-04-26
[patent_title] => Key exchange using pre-generated key pairs
[patent_app_type] => utility
[patent_app_number] => 16/452188
[patent_app_country] => US
[patent_app_date] => 2019-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9321
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 320
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16452188
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/452188 | Key exchange using pre-generated key pairs | Jun 24, 2019 | Issued |
Array
(
[id] => 17530952
[patent_doc_number] => 11303670
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-04-12
[patent_title] => Pre-filtering detection of an injected script on a webpage accessed by a computing device
[patent_app_type] => utility
[patent_app_number] => 16/435179
[patent_app_country] => US
[patent_app_date] => 2019-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6890
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16435179
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/435179 | Pre-filtering detection of an injected script on a webpage accessed by a computing device | Jun 6, 2019 | Issued |
Array
(
[id] => 17054592
[patent_doc_number] => 20210264026
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-08-26
[patent_title] => UNAUTHORIZED COMMUNICATION DETECTION DEVICE, UNAUTHORIZED COMMUNICATION DETECTION METHOD AND MANUFACTURING SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/973898
[patent_app_country] => US
[patent_app_date] => 2019-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10435
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16973898
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/973898 | UNAUTHORIZED COMMUNICATION DETECTION DEVICE, UNAUTHORIZED COMMUNICATION DETECTION METHOD AND MANUFACTURING SYSTEM | Jun 6, 2019 | Pending |
Array
(
[id] => 15152413
[patent_doc_number] => 20190354684
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-21
[patent_title] => Secure Computing Systems and Methods
[patent_app_type] => utility
[patent_app_number] => 16/415869
[patent_app_country] => US
[patent_app_date] => 2019-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9813
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 69
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16415869
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/415869 | Secure Computing Systems and Methods | May 16, 2019 | Abandoned |
Array
(
[id] => 16122617
[patent_doc_number] => 20200213331
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-02
[patent_title] => DATA SERVICE SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/409822
[patent_app_country] => US
[patent_app_date] => 2019-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12810
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16409822
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/409822 | Data service system | May 11, 2019 | Issued |
Array
(
[id] => 17180365
[patent_doc_number] => 11157609
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-10-26
[patent_title] => Apparatus, system, and method for secure execution of unsigned scripts
[patent_app_type] => utility
[patent_app_number] => 16/408376
[patent_app_country] => US
[patent_app_date] => 2019-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10451
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 277
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16408376
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/408376 | Apparatus, system, and method for secure execution of unsigned scripts | May 8, 2019 | Issued |
Array
(
[id] => 15261855
[patent_doc_number] => 20190379661
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-12
[patent_title] => INFORMATION PROCESSING SYSTEM AND CONTROL METHOD THEREFOR
[patent_app_type] => utility
[patent_app_number] => 16/407927
[patent_app_country] => US
[patent_app_date] => 2019-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11851
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16407927
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/407927 | INFORMATION PROCESSING SYSTEM AND CONTROL METHOD THEREFOR | May 8, 2019 | Abandoned |