
Trong H. Nguyen
Examiner (ID: 115, Phone: (571)270-7312 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436 |
| Total Applications | 590 |
| Issued Applications | 446 |
| Pending Applications | 42 |
| Abandoned Applications | 113 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13365813
[patent_doc_number] => 20180234447
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-16
[patent_title] => SYSTEM AND METHODS FOR DETECTING BOTS REAL-TIME
[patent_app_type] => utility
[patent_app_number] => 15/750236
[patent_app_country] => US
[patent_app_date] => 2016-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5211
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 62
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15750236
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/750236 | System and methods for detecting bots real-time | Aug 3, 2016 | Issued |
Array
(
[id] => 13175837
[patent_doc_number] => 10104048
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-16
[patent_title] => Method and system for secure key generation over an insecure shared communication medium
[patent_app_type] => utility
[patent_app_number] => 15/211533
[patent_app_country] => US
[patent_app_date] => 2016-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12198
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 393
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15211533
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/211533 | Method and system for secure key generation over an insecure shared communication medium | Jul 14, 2016 | Issued |
Array
(
[id] => 11447050
[patent_doc_number] => 20170048071
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'Secure Key Storage Systems, Methods and Apparatuses'
[patent_app_type] => utility
[patent_app_number] => 15/210508
[patent_app_country] => US
[patent_app_date] => 2016-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8142
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 11
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15210508
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/210508 | Secure key storage systems, methods and apparatuses | Jul 13, 2016 | Issued |
Array
(
[id] => 15141797
[patent_doc_number] => 10484401
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-19
[patent_title] => In-vehicle network attack detection method and apparatus
[patent_app_type] => utility
[patent_app_number] => 15/202255
[patent_app_country] => US
[patent_app_date] => 2016-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 6246
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 267
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15202255
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/202255 | In-vehicle network attack detection method and apparatus | Jul 4, 2016 | Issued |
Array
(
[id] => 15172157
[patent_doc_number] => 10491598
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-26
[patent_title] => Multi-factor authentication to access services
[patent_app_type] => utility
[patent_app_number] => 15/199661
[patent_app_country] => US
[patent_app_date] => 2016-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 15809
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15199661
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/199661 | Multi-factor authentication to access services | Jun 29, 2016 | Issued |
Array
(
[id] => 13696763
[patent_doc_number] => 20170359336
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => Preventing Unauthorized Access to Secured Information Systems Based on Contextual Login Information
[patent_app_type] => utility
[patent_app_number] => 15/176956
[patent_app_country] => US
[patent_app_date] => 2016-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14053
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 349
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15176956
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/176956 | Preventing unauthorized access to secured information systems based on contextual login information | Jun 7, 2016 | Issued |
Array
(
[id] => 15236179
[patent_doc_number] => 10505828
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-10
[patent_title] => Technologies for managing compromised sensors in virtualized environments
[patent_app_type] => utility
[patent_app_number] => 15/171763
[patent_app_country] => US
[patent_app_date] => 2016-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 13934
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15171763
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/171763 | Technologies for managing compromised sensors in virtualized environments | Jun 1, 2016 | Issued |
Array
(
[id] => 14335047
[patent_doc_number] => 10298557
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-21
[patent_title] => Method of sharing key between devices using physical access restriction
[patent_app_type] => utility
[patent_app_number] => 15/146962
[patent_app_country] => US
[patent_app_date] => 2016-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 25788
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15146962
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/146962 | Method of sharing key between devices using physical access restriction | May 4, 2016 | Issued |
Array
(
[id] => 11072459
[patent_doc_number] => 20160269423
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-15
[patent_title] => 'Methods and systems for malware analysis'
[patent_app_type] => utility
[patent_app_number] => 15/138919
[patent_app_country] => US
[patent_app_date] => 2016-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5044
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15138919
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/138919 | Methods and systems for malware analysis | Apr 25, 2016 | Abandoned |
Array
(
[id] => 11118976
[patent_doc_number] => 20160315950
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-27
[patent_title] => 'Apparatus and Method for Enabling Safe Handling of Malware'
[patent_app_type] => utility
[patent_app_number] => 15/134846
[patent_app_country] => US
[patent_app_date] => 2016-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6147
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15134846
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/134846 | Apparatus and method for enabling safe handling of malware | Apr 20, 2016 | Issued |
Array
(
[id] => 11682302
[patent_doc_number] => 09680852
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-06-13
[patent_title] => 'Recursive multi-layer examination for computer network security remediation'
[patent_app_type] => utility
[patent_app_number] => 15/090523
[patent_app_country] => US
[patent_app_date] => 2016-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11143
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 408
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15090523
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/090523 | Recursive multi-layer examination for computer network security remediation | Apr 3, 2016 | Issued |
Array
(
[id] => 12576609
[patent_doc_number] => 10021143
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-10
[patent_title] => Method and apparatus for multi-tenancy secrets management in multiple data security jurisdiction zones
[patent_app_type] => utility
[patent_app_number] => 15/014900
[patent_app_country] => US
[patent_app_date] => 2016-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 17308
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 355
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15014900
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/014900 | Method and apparatus for multi-tenancy secrets management in multiple data security jurisdiction zones | Feb 2, 2016 | Issued |
Array
(
[id] => 12592863
[patent_doc_number] => 20180089450
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-29
[patent_title] => TAXONOMY-FACILITATED ACTIONS FOR CONTENT
[patent_app_type] => utility
[patent_app_number] => 15/201085
[patent_app_country] => US
[patent_app_date] => 2016-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6499
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -30
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15201085
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/201085 | TAXONOMY-FACILITATED ACTIONS FOR CONTENT | Feb 1, 2016 | Abandoned |
Array
(
[id] => 13110179
[patent_doc_number] => 10073743
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-11
[patent_title] => Data storage arrangement and key distribution
[patent_app_type] => utility
[patent_app_number] => 14/977202
[patent_app_country] => US
[patent_app_date] => 2015-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3454
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14977202
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/977202 | Data storage arrangement and key distribution | Dec 20, 2015 | Issued |
Array
(
[id] => 11651933
[patent_doc_number] => 20170147834
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-25
[patent_title] => 'IDENTIFYING QUERY PATTERNS AND ASSOCIATED AGGREGATE STATISTICS AMONG SEARCH QUERIES'
[patent_app_type] => utility
[patent_app_number] => 14/950052
[patent_app_country] => US
[patent_app_date] => 2015-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8051
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14950052
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/950052 | Identifying query patterns and associated aggregate statistics among search queries | Nov 23, 2015 | Issued |
Array
(
[id] => 11027861
[patent_doc_number] => 20160224817
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-04
[patent_title] => 'ELECTRONIC DEVICE HAVING FINGERPRINT RECOGNITION FUNCTION'
[patent_app_type] => utility
[patent_app_number] => 14/948594
[patent_app_country] => US
[patent_app_date] => 2015-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4543
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14948594
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/948594 | ELECTRONIC DEVICE HAVING FINGERPRINT RECOGNITION FUNCTION | Nov 22, 2015 | Abandoned |
Array
(
[id] => 10803890
[patent_doc_number] => 20160150047
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'GATEWAY FOR CLOUD-BASED SECURE STORAGE'
[patent_app_type] => utility
[patent_app_number] => 14/949370
[patent_app_country] => US
[patent_app_date] => 2015-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 31
[patent_no_of_words] => 23865
[patent_no_of_claims] => 87
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14949370
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/949370 | Gateway for cloud-based secure storage | Nov 22, 2015 | Issued |
Array
(
[id] => 14066061
[patent_doc_number] => 10237351
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-19
[patent_title] => Sub-networks based security method, apparatus and product
[patent_app_type] => utility
[patent_app_number] => 14/949292
[patent_app_country] => US
[patent_app_date] => 2015-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7846
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 321
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14949292
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/949292 | Sub-networks based security method, apparatus and product | Nov 22, 2015 | Issued |
Array
(
[id] => 15893117
[patent_doc_number] => 10652931
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-12
[patent_title] => Automatic network connection data synchronization for authorized personal devices
[patent_app_type] => utility
[patent_app_number] => 14/885207
[patent_app_country] => US
[patent_app_date] => 2015-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6049
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 305
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14885207
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/885207 | Automatic network connection data synchronization for authorized personal devices | Oct 15, 2015 | Issued |
Array
(
[id] => 11817155
[patent_doc_number] => 09721108
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-01
[patent_title] => 'Tailored protection of personally identifiable information'
[patent_app_type] => utility
[patent_app_number] => 14/874493
[patent_app_country] => US
[patent_app_date] => 2015-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 9908
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14874493
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/874493 | Tailored protection of personally identifiable information | Oct 4, 2015 | Issued |