Phuong K Dinh
Examiner (ID: 7763, Phone: (571)272-2090 , Office: P/2831 )
Most Active Art Unit | 2831 |
Art Unit(s) | 2833, 2839, 2831 |
Total Applications | 2690 |
Issued Applications | 2317 |
Pending Applications | 91 |
Abandoned Applications | 282 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 6254296
[patent_doc_number] => 20100138931
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-03
[patent_title] => 'METHOD AND SYSTEM FOR REAL TIME CLASSIFICATION OF EVENTS IN COMPUTER INTEGRITY SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 12/628431
[patent_app_country] => US
[patent_app_date] => 2009-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 11675
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0138/20100138931.pdf
[firstpage_image] =>[orig_patent_app_number] => 12628431
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/628431 | Method and system for real time classification of events in computer integrity system | Nov 30, 2009 | Issued |
Array
(
[id] => 6384173
[patent_doc_number] => 20100077213
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-03-25
[patent_title] => 'TRUSTED NETWORK CONNECT SYSTEM BASED ON TRI-ELEMENT PEER AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 12/628903
[patent_app_country] => US
[patent_app_date] => 2009-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3718
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0077/20100077213.pdf
[firstpage_image] =>[orig_patent_app_number] => 12628903
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/628903 | Trusted network connect system based on tri-element peer authentication | Nov 30, 2009 | Issued |
Array
(
[id] => 8873216
[patent_doc_number] => 08468605
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-06-18
[patent_title] => 'Identifying security vulnerability in computer software'
[patent_app_type] => utility
[patent_app_number] => 12/627351
[patent_app_country] => US
[patent_app_date] => 2009-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3077
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 17
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12627351
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/627351 | Identifying security vulnerability in computer software | Nov 29, 2009 | Issued |
Array
(
[id] => 8247317
[patent_doc_number] => 08205258
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-06-19
[patent_title] => 'Methods and apparatus for detecting web threat infection chains'
[patent_app_type] => utility
[patent_app_number] => 12/627152
[patent_app_country] => US
[patent_app_date] => 2009-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 5001
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/205/08205258.pdf
[firstpage_image] =>[orig_patent_app_number] => 12627152
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/627152 | Methods and apparatus for detecting web threat infection chains | Nov 29, 2009 | Issued |
Array
(
[id] => 8365509
[patent_doc_number] => 08254580
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-08-28
[patent_title] => 'Key distribution in a hierarchy of nodes'
[patent_app_type] => utility
[patent_app_number] => 12/627526
[patent_app_country] => US
[patent_app_date] => 2009-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11499
[patent_no_of_claims] => 40
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12627526
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/627526 | Key distribution in a hierarchy of nodes | Nov 29, 2009 | Issued |
Array
(
[id] => 6303577
[patent_doc_number] => 20100162379
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-24
[patent_title] => 'UNSOLICITED COMMUNICATION MITIGATION'
[patent_app_type] => utility
[patent_app_number] => 12/627140
[patent_app_country] => US
[patent_app_date] => 2009-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4983
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0162/20100162379.pdf
[firstpage_image] =>[orig_patent_app_number] => 12627140
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/627140 | UNSOLICITED COMMUNICATION MITIGATION | Nov 29, 2009 | Abandoned |
Array
(
[id] => 6409379
[patent_doc_number] => 20100180116
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-15
[patent_title] => 'INTRUSION-TOLERANT GROUP MANAGEMENT FOR MOBILE AD-HOC NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 12/611493
[patent_app_country] => US
[patent_app_date] => 2009-11-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9930
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0180/20100180116.pdf
[firstpage_image] =>[orig_patent_app_number] => 12611493
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/611493 | Intrusion-tolerant group management for mobile ad-hoc networks | Nov 2, 2009 | Issued |
Array
(
[id] => 6333700
[patent_doc_number] => 20100115608
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-05-06
[patent_title] => 'IMAGE PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND COMPUTER-READABLE STORAGE MEDIUM STORING PROGRAM FOR IMPLEMENTING THE METHOD'
[patent_app_type] => utility
[patent_app_number] => 12/611450
[patent_app_country] => US
[patent_app_date] => 2009-11-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 8074
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0115/20100115608.pdf
[firstpage_image] =>[orig_patent_app_number] => 12611450
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/611450 | IMAGE PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND COMPUTER-READABLE STORAGE MEDIUM STORING PROGRAM FOR IMPLEMENTING THE METHOD | Nov 2, 2009 | Abandoned |
Array
(
[id] => 4540069
[patent_doc_number] => 07953982
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-05-31
[patent_title] => 'Method of authenticating digital signature'
[patent_app_type] => utility
[patent_app_number] => 12/608911
[patent_app_country] => US
[patent_app_date] => 2009-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 28
[patent_no_of_words] => 30721
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/953/07953982.pdf
[firstpage_image] =>[orig_patent_app_number] => 12608911
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/608911 | Method of authenticating digital signature | Oct 28, 2009 | Issued |
Array
(
[id] => 7679371
[patent_doc_number] => 20100107216
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-29
[patent_title] => 'INFORMATION PROCESSING DEVICE AND MEMORY MANAGEMENT METHOD'
[patent_app_type] => utility
[patent_app_number] => 12/582884
[patent_app_country] => US
[patent_app_date] => 2009-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4631
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0107/20100107216.pdf
[firstpage_image] =>[orig_patent_app_number] => 12582884
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/582884 | Information processing device and memory management method | Oct 20, 2009 | Issued |
Array
(
[id] => 7719059
[patent_doc_number] => 08095992
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-01-10
[patent_title] => 'Systems and methods for media authentication'
[patent_app_type] => utility
[patent_app_number] => 12/460158
[patent_app_country] => US
[patent_app_date] => 2009-07-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 12225
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/095/08095992.pdf
[firstpage_image] =>[orig_patent_app_number] => 12460158
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/460158 | Systems and methods for media authentication | Jul 12, 2009 | Issued |
Array
(
[id] => 8633186
[patent_doc_number] => 08365286
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-01-29
[patent_title] => 'Method and system for classification of software using characteristics and combinations of such characteristics'
[patent_app_type] => utility
[patent_app_number] => 12/413823
[patent_app_country] => US
[patent_app_date] => 2009-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 11059
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12413823
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/413823 | Method and system for classification of software using characteristics and combinations of such characteristics | Mar 29, 2009 | Issued |
Array
(
[id] => 201203
[patent_doc_number] => 07640596
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2009-12-29
[patent_title] => 'Mobile device for preventing illegal distribution of digital data contents and operating method thereof'
[patent_app_type] => utility
[patent_app_number] => 12/406809
[patent_app_country] => US
[patent_app_date] => 2009-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 5
[patent_no_of_words] => 2917
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/640/07640596.pdf
[firstpage_image] =>[orig_patent_app_number] => 12406809
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/406809 | Mobile device for preventing illegal distribution of digital data contents and operating method thereof | Mar 17, 2009 | Issued |
Array
(
[id] => 5393403
[patent_doc_number] => 20090210716
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-08-20
[patent_title] => 'Direct anonymous attestation using bilinear maps'
[patent_app_type] => utility
[patent_app_number] => 12/322368
[patent_app_country] => US
[patent_app_date] => 2009-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 7100
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0210/20090210716.pdf
[firstpage_image] =>[orig_patent_app_number] => 12322368
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/322368 | Direct anonymous attestation using bilinear maps | Jan 29, 2009 | Issued |
Array
(
[id] => 6219374
[patent_doc_number] => 20100054469
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-03-04
[patent_title] => 'Method and apparatus for synthesizing copy protection for reducing/defeating the effectiveness or capability of a circumvention device'
[patent_app_type] => utility
[patent_app_number] => 12/322004
[patent_app_country] => US
[patent_app_date] => 2009-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 10965
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0054/20100054469.pdf
[firstpage_image] =>[orig_patent_app_number] => 12322004
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/322004 | Method and apparatus for synthesizing copy protection for reducing/defeating the effectiveness or capability of a circumvention device | Jan 27, 2009 | Issued |
Array
(
[id] => 7753600
[patent_doc_number] => 20120027198
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-02
[patent_title] => 'System and method for cryptographic communications using permutation'
[patent_app_type] => utility
[patent_app_number] => 12/321936
[patent_app_country] => US
[patent_app_date] => 2009-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4723
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0027/20120027198.pdf
[firstpage_image] =>[orig_patent_app_number] => 12321936
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/321936 | System and method for cryptographic communications using permutation | Jan 26, 2009 | Abandoned |
Array
(
[id] => 5356414
[patent_doc_number] => 20090187758
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-07-23
[patent_title] => 'Data communication system and data transmitting apparatus'
[patent_app_type] => utility
[patent_app_number] => 12/321053
[patent_app_country] => US
[patent_app_date] => 2009-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 10613
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0187/20090187758.pdf
[firstpage_image] =>[orig_patent_app_number] => 12321053
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/321053 | Data communication system controlling available addressees for data based on preselected security level of user and addressee location | Jan 14, 2009 | Issued |
Array
(
[id] => 6453351
[patent_doc_number] => 20100154061
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-17
[patent_title] => 'SYSTEM AND METHOD FOR IDENTIFYING MALICIOUS ACTIVITIES THROUGH NON-LOGGED-IN HOST USAGE'
[patent_app_type] => utility
[patent_app_number] => 12/335824
[patent_app_country] => US
[patent_app_date] => 2008-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5555
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0154/20100154061.pdf
[firstpage_image] =>[orig_patent_app_number] => 12335824
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/335824 | SYSTEM AND METHOD FOR IDENTIFYING MALICIOUS ACTIVITIES THROUGH NON-LOGGED-IN HOST USAGE | Dec 15, 2008 | Abandoned |
Array
(
[id] => 8022663
[patent_doc_number] => 08140850
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-03-20
[patent_title] => 'Systems and methods for watermarking software and other media'
[patent_app_type] => utility
[patent_app_number] => 12/330482
[patent_app_country] => US
[patent_app_date] => 2008-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 35
[patent_no_of_words] => 32011
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/140/08140850.pdf
[firstpage_image] =>[orig_patent_app_number] => 12330482
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/330482 | Systems and methods for watermarking software and other media | Dec 7, 2008 | Issued |
Array
(
[id] => 5302160
[patent_doc_number] => 20090296812
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-03
[patent_title] => 'FAST ENCODING METHOD AND SYSTEM USING ADAPTIVE INTRA PREDICTION'
[patent_app_type] => utility
[patent_app_number] => 12/262006
[patent_app_country] => US
[patent_app_date] => 2008-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6104
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0296/20090296812.pdf
[firstpage_image] =>[orig_patent_app_number] => 12262006
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/262006 | Fast encoding method and system using adaptive intra prediction | Oct 29, 2008 | Issued |