
Phy Anh Tran Vu
Examiner (ID: 7507, Phone: (571)270-7317 , Office: P/2438 )
| Most Active Art Unit | 2438 |
| Art Unit(s) | 2437, 2438 |
| Total Applications | 420 |
| Issued Applications | 276 |
| Pending Applications | 52 |
| Abandoned Applications | 108 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 4498901
[patent_doc_number] => 07886143
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-02-08
[patent_title] => 'Multi-data rate cryptography architecture for network security'
[patent_app_type] => utility
[patent_app_number] => 11/607747
[patent_app_country] => US
[patent_app_date] => 2006-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 16780
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/886/07886143.pdf
[firstpage_image] =>[orig_patent_app_number] => 11607747
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/607747 | Multi-data rate cryptography architecture for network security | Nov 29, 2006 | Issued |
Array
(
[id] => 5375902
[patent_doc_number] => 20090313463
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-17
[patent_title] => 'DATA MATCHING USING DATA CLUSTERS'
[patent_app_type] => utility
[patent_app_number] => 12/084472
[patent_app_country] => US
[patent_app_date] => 2006-11-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5488
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0313/20090313463.pdf
[firstpage_image] =>[orig_patent_app_number] => 12084472
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/084472 | DATA MATCHING USING DATA CLUSTERS | Oct 31, 2006 | Abandoned |
Array
(
[id] => 9077743
[patent_doc_number] => 08555335
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-10-08
[patent_title] => 'Securing distributed application information delivery'
[patent_app_type] => utility
[patent_app_number] => 11/555610
[patent_app_country] => US
[patent_app_date] => 2006-11-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 8957
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11555610
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/555610 | Securing distributed application information delivery | Oct 31, 2006 | Issued |
Array
(
[id] => 4905803
[patent_doc_number] => 20080115217
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-05-15
[patent_title] => 'Method and apparatus for protection of a computer system from malicious code attacks'
[patent_app_type] => utility
[patent_app_number] => 11/590421
[patent_app_country] => US
[patent_app_date] => 2006-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6515
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0115/20080115217.pdf
[firstpage_image] =>[orig_patent_app_number] => 11590421
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/590421 | Method and apparatus for protection of a computer system from malicious code attacks | Oct 30, 2006 | Abandoned |
Array
(
[id] => 9302411
[patent_doc_number] => 08650656
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-02-11
[patent_title] => 'Method and apparatus for user authentication'
[patent_app_type] => utility
[patent_app_number] => 11/589550
[patent_app_country] => US
[patent_app_date] => 2006-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2458
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11589550
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/589550 | Method and apparatus for user authentication | Oct 29, 2006 | Issued |
Array
(
[id] => 4984606
[patent_doc_number] => 20070089165
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-04-19
[patent_title] => 'Method and System for Network Security Control'
[patent_app_type] => utility
[patent_app_number] => 11/549186
[patent_app_country] => US
[patent_app_date] => 2006-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 10844
[patent_no_of_claims] => 40
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0089/20070089165.pdf
[firstpage_image] =>[orig_patent_app_number] => 11549186
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/549186 | Method and System for Network Security Control | Oct 12, 2006 | Abandoned |
Array
(
[id] => 5248710
[patent_doc_number] => 20070244944
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-10-18
[patent_title] => 'METHOD OF PROCESSING INFORMATION TO BE CONFIDENTIALLY TRANSMITTED'
[patent_app_type] => utility
[patent_app_number] => 11/548251
[patent_app_country] => US
[patent_app_date] => 2006-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7533
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0244/20070244944.pdf
[firstpage_image] =>[orig_patent_app_number] => 11548251
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/548251 | Method of processing information to be confidentially transmitted | Oct 9, 2006 | Issued |
Array
(
[id] => 8810035
[patent_doc_number] => 08447700
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-05-21
[patent_title] => 'Transaction authorization service'
[patent_app_type] => utility
[patent_app_number] => 11/546534
[patent_app_country] => US
[patent_app_date] => 2006-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 17
[patent_no_of_words] => 15825
[patent_no_of_claims] => 72
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11546534
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/546534 | Transaction authorization service | Oct 9, 2006 | Issued |
Array
(
[id] => 8308963
[patent_doc_number] => 08230514
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-07-24
[patent_title] => 'Method for preventing key logger from hacking data typed on keyboard through authorization of keyboard data'
[patent_app_type] => utility
[patent_app_number] => 11/913898
[patent_app_country] => US
[patent_app_date] => 2006-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3290
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11913898
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/913898 | Method for preventing key logger from hacking data typed on keyboard through authorization of keyboard data | Sep 28, 2006 | Issued |
Array
(
[id] => 8809371
[patent_doc_number] => 08447033
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-05-21
[patent_title] => 'Method for protecting broadcast frame'
[patent_app_type] => utility
[patent_app_number] => 11/521600
[patent_app_country] => US
[patent_app_date] => 2006-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 2509
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11521600
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/521600 | Method for protecting broadcast frame | Sep 14, 2006 | Issued |
Array
(
[id] => 5108753
[patent_doc_number] => 20070067631
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-03-22
[patent_title] => 'Method for authentication'
[patent_app_type] => utility
[patent_app_number] => 11/519929
[patent_app_country] => US
[patent_app_date] => 2006-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2663
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0067/20070067631.pdf
[firstpage_image] =>[orig_patent_app_number] => 11519929
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/519929 | Method for authentication | Sep 12, 2006 | Abandoned |
Array
(
[id] => 5467433
[patent_doc_number] => 20090327633
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-31
[patent_title] => 'Verifying data integrity in a data storage device'
[patent_app_type] => utility
[patent_app_number] => 11/516846
[patent_app_country] => US
[patent_app_date] => 2006-09-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5901
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0327/20090327633.pdf
[firstpage_image] =>[orig_patent_app_number] => 11516846
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/516846 | Verifying data integrity in a data storage device | Sep 6, 2006 | Issued |
Array
(
[id] => 5042438
[patent_doc_number] => 20070094720
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-04-26
[patent_title] => 'Security system'
[patent_app_type] => utility
[patent_app_number] => 11/514353
[patent_app_country] => US
[patent_app_date] => 2006-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2493
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 19
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0094/20070094720.pdf
[firstpage_image] =>[orig_patent_app_number] => 11514353
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/514353 | Security system | Aug 31, 2006 | Abandoned |
Array
(
[id] => 5017678
[patent_doc_number] => 20070260887
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-08
[patent_title] => 'Biometric authentication device and computer product'
[patent_app_type] => utility
[patent_app_number] => 11/509565
[patent_app_country] => US
[patent_app_date] => 2006-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7061
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0260/20070260887.pdf
[firstpage_image] =>[orig_patent_app_number] => 11509565
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/509565 | Biometric authentication device and computer product | Aug 24, 2006 | Issued |
Array
(
[id] => 4990980
[patent_doc_number] => 20070157321
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-07-05
[patent_title] => 'Method to improve the integrity of internet programs, websites and software'
[patent_app_type] => utility
[patent_app_number] => 11/509279
[patent_app_country] => US
[patent_app_date] => 2006-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5115
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0157/20070157321.pdf
[firstpage_image] =>[orig_patent_app_number] => 11509279
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/509279 | Method to improve the integrity of internet programs, websites and software | Aug 23, 2006 | Abandoned |
Array
(
[id] => 5114938
[patent_doc_number] => 20070198854
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-08-23
[patent_title] => 'Data protection apparatus, data protection method, and program product therefor'
[patent_app_type] => utility
[patent_app_number] => 11/507539
[patent_app_country] => US
[patent_app_date] => 2006-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6699
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0198/20070198854.pdf
[firstpage_image] =>[orig_patent_app_number] => 11507539
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/507539 | Data protection apparatus, data protection method, and program product therefor | Aug 21, 2006 | Abandoned |
Array
(
[id] => 9301274
[patent_doc_number] => 08649513
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-11
[patent_title] => 'Method for converting non copy protected data into copy protected data'
[patent_app_type] => utility
[patent_app_number] => 11/438312
[patent_app_country] => US
[patent_app_date] => 2006-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 9096
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 341
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11438312
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/438312 | Method for converting non copy protected data into copy protected data | May 22, 2006 | Issued |
Array
(
[id] => 5078780
[patent_doc_number] => 20070122004
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-05-31
[patent_title] => 'Privacy-enhanced e-passport authentication protocol'
[patent_app_type] => utility
[patent_app_number] => 11/436986
[patent_app_country] => US
[patent_app_date] => 2006-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1508
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0122/20070122004.pdf
[firstpage_image] =>[orig_patent_app_number] => 11436986
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/436986 | Privacy-enhanced e-passport authentication protocol | May 18, 2006 | Issued |
Array
(
[id] => 5030018
[patent_doc_number] => 20070271465
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-22
[patent_title] => 'Method of Authentication by Challenge-Response and Picturized-Text Recognition'
[patent_app_type] => utility
[patent_app_number] => 11/383702
[patent_app_country] => US
[patent_app_date] => 2006-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 2413
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0271/20070271465.pdf
[firstpage_image] =>[orig_patent_app_number] => 11383702
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/383702 | Method of Authentication by Challenge-Response and Picturized-Text Recognition | May 15, 2006 | Abandoned |
Array
(
[id] => 5030151
[patent_doc_number] => 20070271598
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-22
[patent_title] => 'Systems and methods for user access authentication based on network access point'
[patent_app_type] => utility
[patent_app_number] => 11/435043
[patent_app_country] => US
[patent_app_date] => 2006-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7203
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0271/20070271598.pdf
[firstpage_image] =>[orig_patent_app_number] => 11435043
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/435043 | Systems and methods for user access authentication based on network access point | May 15, 2006 | Issued |