
Trong H. Nguyen
Examiner (ID: 14030, Phone: (571)270-7312 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436 |
| Total Applications | 577 |
| Issued Applications | 433 |
| Pending Applications | 54 |
| Abandoned Applications | 113 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16783340
[patent_doc_number] => 20210120419
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-22
[patent_title] => A METHOD FOR MANAGING THE REPUTATION LEVEL OF A COMMUNICATION DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/606492
[patent_app_country] => US
[patent_app_date] => 2018-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4768
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16606492
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/606492 | Method for managing the reputation level of a communication device | Apr 10, 2018 | Issued |
Array
(
[id] => 16501663
[patent_doc_number] => 10867051
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-12-15
[patent_title] => System and method of automated design of hardware and software systems and complexes
[patent_app_type] => utility
[patent_app_number] => 15/948397
[patent_app_country] => US
[patent_app_date] => 2018-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 7581
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 308
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15948397
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/948397 | System and method of automated design of hardware and software systems and complexes | Apr 8, 2018 | Issued |
Array
(
[id] => 19488227
[patent_doc_number] => 12107964
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-10-01
[patent_title] => Technique for computing a block in a blockchain network
[patent_app_type] => utility
[patent_app_number] => 17/043027
[patent_app_country] => US
[patent_app_date] => 2018-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 16
[patent_no_of_words] => 10772
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17043027
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/043027 | Technique for computing a block in a blockchain network | Mar 28, 2018 | Issued |
Array
(
[id] => 13952381
[patent_doc_number] => 10211980
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-02-19
[patent_title] => Method for lattice-based decryption of data
[patent_app_type] => utility
[patent_app_number] => 15/938500
[patent_app_country] => US
[patent_app_date] => 2018-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3157
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 219
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15938500
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/938500 | Method for lattice-based decryption of data | Mar 27, 2018 | Issued |
Array
(
[id] => 16434053
[patent_doc_number] => 10834158
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-11-10
[patent_title] => Encoding identifiers into customized manifest data
[patent_app_type] => utility
[patent_app_number] => 15/934291
[patent_app_country] => US
[patent_app_date] => 2018-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 9153
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 208
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15934291
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/934291 | Encoding identifiers into customized manifest data | Mar 22, 2018 | Issued |
Array
(
[id] => 14907469
[patent_doc_number] => 20190297500
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-26
[patent_title] => Network Authentication Via Encrypted Network Access Packages
[patent_app_type] => utility
[patent_app_number] => 15/927747
[patent_app_country] => US
[patent_app_date] => 2018-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12188
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15927747
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/927747 | Network authentication via encrypted network access packages | Mar 20, 2018 | Issued |
Array
(
[id] => 15923953
[patent_doc_number] => 10659231
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-19
[patent_title] => Identity authentication using a wearable device
[patent_app_type] => utility
[patent_app_number] => 15/920087
[patent_app_country] => US
[patent_app_date] => 2018-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9684
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 297
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15920087
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/920087 | Identity authentication using a wearable device | Mar 12, 2018 | Issued |
Array
(
[id] => 17166954
[patent_doc_number] => 11153069
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-19
[patent_title] => Data authentication using a blockchain approach
[patent_app_type] => utility
[patent_app_number] => 15/906016
[patent_app_country] => US
[patent_app_date] => 2018-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 15
[patent_no_of_words] => 15573
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 337
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15906016
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/906016 | Data authentication using a blockchain approach | Feb 26, 2018 | Issued |
Array
(
[id] => 16895287
[patent_doc_number] => 11036841
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-06-15
[patent_title] => Systems and methods for detecting unauthorized use of an application
[patent_app_type] => utility
[patent_app_number] => 15/904807
[patent_app_country] => US
[patent_app_date] => 2018-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8069
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15904807
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/904807 | Systems and methods for detecting unauthorized use of an application | Feb 25, 2018 | Issued |
Array
(
[id] => 14400053
[patent_doc_number] => 10313326
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-04
[patent_title] => Systems and methods for managing secure sharing of online advertising data
[patent_app_type] => utility
[patent_app_number] => 15/903490
[patent_app_country] => US
[patent_app_date] => 2018-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5120
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 290
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15903490
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/903490 | Systems and methods for managing secure sharing of online advertising data | Feb 22, 2018 | Issued |
Array
(
[id] => 16433743
[patent_doc_number] => 10833847
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-10
[patent_title] => Cryptographic hash generated using data parallel instructions
[patent_app_type] => utility
[patent_app_number] => 15/902820
[patent_app_country] => US
[patent_app_date] => 2018-02-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10897
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15902820
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/902820 | Cryptographic hash generated using data parallel instructions | Feb 21, 2018 | Issued |
Array
(
[id] => 14678907
[patent_doc_number] => 20190238568
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-01
[patent_title] => Identifying Artificial Artifacts in Input Data to Detect Adversarial Attacks
[patent_app_type] => utility
[patent_app_number] => 15/885935
[patent_app_country] => US
[patent_app_date] => 2018-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15414
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15885935
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/885935 | Identifying artificial artifacts in input data to detect adversarial attacks | Jan 31, 2018 | Issued |
Array
(
[id] => 16737925
[patent_doc_number] => 10963578
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-30
[patent_title] => Methods and systems for preventing transmission of sensitive data from a remote computer device
[patent_app_type] => utility
[patent_app_number] => 15/886376
[patent_app_country] => US
[patent_app_date] => 2018-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7219
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 335
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15886376
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/886376 | Methods and systems for preventing transmission of sensitive data from a remote computer device | Jan 31, 2018 | Issued |
Array
(
[id] => 16610450
[patent_doc_number] => 10911481
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-02
[patent_title] => Malware-infected device identifications
[patent_app_type] => utility
[patent_app_number] => 15/884988
[patent_app_country] => US
[patent_app_date] => 2018-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 6127
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15884988
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/884988 | Malware-infected device identifications | Jan 30, 2018 | Issued |
Array
(
[id] => 17106537
[patent_doc_number] => 11126755
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-21
[patent_title] => Object signatures in object stores
[patent_app_type] => utility
[patent_app_number] => 15/884164
[patent_app_country] => US
[patent_app_date] => 2018-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 13768
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 244
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15884164
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/884164 | Object signatures in object stores | Jan 29, 2018 | Issued |
Array
(
[id] => 14139469
[patent_doc_number] => 20190104124
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-04
[patent_title] => SYSTEMS AND METHODS FOR PRIVACY-PROTECTING HYBRID CLOUD AND PREMISE STREAM PROCESSING
[patent_app_type] => utility
[patent_app_number] => 15/882665
[patent_app_country] => US
[patent_app_date] => 2018-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5915
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15882665
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/882665 | Systems and methods for privacy-protecting hybrid cloud and premise stream processing | Jan 28, 2018 | Issued |
Array
(
[id] => 13336275
[patent_doc_number] => 20180219676
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-02
[patent_title] => MANAGING SMART APPLIANCES USING BLOCKCHAIN TECHNOLOGY
[patent_app_type] => utility
[patent_app_number] => 15/881705
[patent_app_country] => US
[patent_app_date] => 2018-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12882
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15881705
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/881705 | MANAGING SMART APPLIANCES USING BLOCKCHAIN TECHNOLOGY | Jan 25, 2018 | Abandoned |
Array
(
[id] => 16575518
[patent_doc_number] => 10897453
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-01-19
[patent_title] => Providing networking and security to workloads via a control virtual private cloud shared across multiple virtual private clouds
[patent_app_type] => utility
[patent_app_number] => 15/881710
[patent_app_country] => US
[patent_app_date] => 2018-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6602
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 299
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15881710
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/881710 | Providing networking and security to workloads via a control virtual private cloud shared across multiple virtual private clouds | Jan 25, 2018 | Issued |
Array
(
[id] => 16416548
[patent_doc_number] => 10824440
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-03
[patent_title] => Deriving personalized experiences of smart environments
[patent_app_type] => utility
[patent_app_number] => 15/874395
[patent_app_country] => US
[patent_app_date] => 2018-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10656
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15874395
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/874395 | Deriving personalized experiences of smart environments | Jan 17, 2018 | Issued |
Array
(
[id] => 17033620
[patent_doc_number] => 11095444
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-17
[patent_title] => Method and computer for cryptographically protecting control communication in and/or service access to IT systems, in particular in connection with the diagnosis and configuration in an automation, control or supervisory system
[patent_app_type] => utility
[patent_app_number] => 16/483915
[patent_app_country] => US
[patent_app_date] => 2018-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5388
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 377
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16483915
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/483915 | Method and computer for cryptographically protecting control communication in and/or service access to IT systems, in particular in connection with the diagnosis and configuration in an automation, control or supervisory system | Jan 10, 2018 | Issued |