
Thu Nguyet T. Le
Examiner (ID: 7298, Phone: (571)270-1093 , Office: P/2162 )
| Most Active Art Unit | 2162 |
| Art Unit(s) | 2162, 2169 |
| Total Applications | 634 |
| Issued Applications | 503 |
| Pending Applications | 4 |
| Abandoned Applications | 130 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14799169
[patent_doc_number] => 10402589
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-09-03
[patent_title] => Method and system for securing cloud storage and databases from insider threats and optimizing performance
[patent_app_type] => utility
[patent_app_number] => 16/269948
[patent_app_country] => US
[patent_app_date] => 2019-02-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 8916
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 387
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16269948
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/269948 | Method and system for securing cloud storage and databases from insider threats and optimizing performance | Feb 6, 2019 | Issued |
Array
(
[id] => 14353051
[patent_doc_number] => 20190158499
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-23
[patent_title] => USAGE TRACKING IN HYBRID CLOUD COMPUTING SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 16/257968
[patent_app_country] => US
[patent_app_date] => 2019-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10062
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16257968
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/257968 | Usage tracking in hybrid cloud computing systems | Jan 24, 2019 | Issued |
Array
(
[id] => 15521607
[patent_doc_number] => 10567414
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-18
[patent_title] => Methods and apparatus for application isolation
[patent_app_type] => utility
[patent_app_number] => 16/250006
[patent_app_country] => US
[patent_app_date] => 2019-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 14
[patent_no_of_words] => 8532
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16250006
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/250006 | Methods and apparatus for application isolation | Jan 16, 2019 | Issued |
Array
(
[id] => 16219573
[patent_doc_number] => 10735405
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-04
[patent_title] => Private simultaneous authentication of equals
[patent_app_type] => utility
[patent_app_number] => 16/215577
[patent_app_country] => US
[patent_app_date] => 2018-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 15983
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16215577
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/215577 | Private simultaneous authentication of equals | Dec 9, 2018 | Issued |
Array
(
[id] => 15171735
[patent_doc_number] => 10491385
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-26
[patent_title] => Information processing system, information processing method, and recording medium for improving security of encrypted communications
[patent_app_type] => utility
[patent_app_number] => 16/213822
[patent_app_country] => US
[patent_app_date] => 2018-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 5529
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 281
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16213822
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/213822 | Information processing system, information processing method, and recording medium for improving security of encrypted communications | Dec 6, 2018 | Issued |
Array
(
[id] => 16419006
[patent_doc_number] => 10826920
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-11-03
[patent_title] => Signal distribution score for bot detection
[patent_app_type] => utility
[patent_app_number] => 16/204253
[patent_app_country] => US
[patent_app_date] => 2018-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 10300
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16204253
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/204253 | Signal distribution score for bot detection | Nov 28, 2018 | Issued |
Array
(
[id] => 16003365
[patent_doc_number] => 20200177553
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-04
[patent_title] => DIRECT PRODUCTION NETWORK ACCESS USING PRIVATE NETWORKS AND ENCAPSULATION
[patent_app_type] => utility
[patent_app_number] => 16/204125
[patent_app_country] => US
[patent_app_date] => 2018-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7386
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 271
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16204125
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/204125 | Direct production network access using private networks and encapsulation | Nov 28, 2018 | Issued |
Array
(
[id] => 16502065
[patent_doc_number] => 10867457
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-15
[patent_title] => Pharmaceutical transport system including electronic lock based pharmaceutical transport container and related methods
[patent_app_type] => utility
[patent_app_number] => 16/180718
[patent_app_country] => US
[patent_app_date] => 2018-11-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 2698
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16180718
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/180718 | Pharmaceutical transport system including electronic lock based pharmaceutical transport container and related methods | Nov 4, 2018 | Issued |
Array
(
[id] => 16279183
[patent_doc_number] => 10762214
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-09-01
[patent_title] => System and method for extracting information from binary files for vulnerability database queries
[patent_app_type] => utility
[patent_app_number] => 16/181300
[patent_app_country] => US
[patent_app_date] => 2018-11-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 5343
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16181300
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/181300 | System and method for extracting information from binary files for vulnerability database queries | Nov 4, 2018 | Issued |
Array
(
[id] => 14771719
[patent_doc_number] => 10397272
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-08-27
[patent_title] => Systems and methods of detecting email-based attacks through machine learning
[patent_app_type] => utility
[patent_app_number] => 16/168055
[patent_app_country] => US
[patent_app_date] => 2018-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 8732
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16168055
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/168055 | Systems and methods of detecting email-based attacks through machine learning | Oct 22, 2018 | Issued |
Array
(
[id] => 15377689
[patent_doc_number] => 10530580
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-01-07
[patent_title] => Enhance interactive electronic vault
[patent_app_type] => utility
[patent_app_number] => 16/166095
[patent_app_country] => US
[patent_app_date] => 2018-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 22049
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16166095
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/166095 | Enhance interactive electronic vault | Oct 19, 2018 | Issued |
Array
(
[id] => 15777797
[patent_doc_number] => 20200119916
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-16
[patent_title] => TRUSTLESS ACCOUNT RECOVERY
[patent_app_type] => utility
[patent_app_number] => 16/159611
[patent_app_country] => US
[patent_app_date] => 2018-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7813
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16159611
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/159611 | Trustless account recovery | Oct 12, 2018 | Issued |
Array
(
[id] => 16566245
[patent_doc_number] => 10891616
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-01-12
[patent_title] => System and method for effort-based user authentication
[patent_app_type] => utility
[patent_app_number] => 16/159560
[patent_app_country] => US
[patent_app_date] => 2018-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 9892
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16159560
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/159560 | System and method for effort-based user authentication | Oct 11, 2018 | Issued |
Array
(
[id] => 14361155
[patent_doc_number] => 10301867
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-28
[patent_title] => Trip anomaly detection system
[patent_app_type] => utility
[patent_app_number] => 16/150656
[patent_app_country] => US
[patent_app_date] => 2018-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 9835
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16150656
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/150656 | Trip anomaly detection system | Oct 2, 2018 | Issued |
Array
(
[id] => 16373311
[patent_doc_number] => 10805087
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-10-13
[patent_title] => Code signing method and system
[patent_app_type] => utility
[patent_app_number] => 16/147393
[patent_app_country] => US
[patent_app_date] => 2018-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 14091
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16147393
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/147393 | Code signing method and system | Sep 27, 2018 | Issued |
Array
(
[id] => 16325261
[patent_doc_number] => 10785243
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-09-22
[patent_title] => Identifying evidence of attacks by analyzing log text
[patent_app_type] => utility
[patent_app_number] => 16/147467
[patent_app_country] => US
[patent_app_date] => 2018-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4326
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16147467
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/147467 | Identifying evidence of attacks by analyzing log text | Sep 27, 2018 | Issued |
Array
(
[id] => 16250514
[patent_doc_number] => 10749900
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-18
[patent_title] => Deploying session initiation protocol application network security
[patent_app_type] => utility
[patent_app_number] => 16/146691
[patent_app_country] => US
[patent_app_date] => 2018-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11556
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16146691
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/146691 | Deploying session initiation protocol application network security | Sep 27, 2018 | Issued |
Array
(
[id] => 15080045
[patent_doc_number] => 10469535
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-11-05
[patent_title] => Systems and methods for network security
[patent_app_type] => utility
[patent_app_number] => 16/144725
[patent_app_country] => US
[patent_app_date] => 2018-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 3903
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16144725
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/144725 | Systems and methods for network security | Sep 26, 2018 | Issued |
Array
(
[id] => 15675253
[patent_doc_number] => 10601874
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-24
[patent_title] => System and apparatus for providing network security
[patent_app_type] => utility
[patent_app_number] => 16/134795
[patent_app_country] => US
[patent_app_date] => 2018-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7789
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16134795
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/134795 | System and apparatus for providing network security | Sep 17, 2018 | Issued |
Array
(
[id] => 15659577
[patent_doc_number] => 20200092319
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-19
[patent_title] => Cognitive Security Exposure Analysis and Resolution Based on Security Trends
[patent_app_type] => utility
[patent_app_number] => 16/133877
[patent_app_country] => US
[patent_app_date] => 2018-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15145
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16133877
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/133877 | Cognitive security exposure analysis and resolution based on security trends | Sep 17, 2018 | Issued |