
Trong H. Nguyen
Examiner (ID: 14030, Phone: (571)270-7312 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436 |
| Total Applications | 577 |
| Issued Applications | 433 |
| Pending Applications | 54 |
| Abandoned Applications | 113 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19482417
[patent_doc_number] => 20240330459
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-03
[patent_title] => METHODS AND SYSTEMS FOR PROTECTING COMPUTER SYSTEMS FROM ENCRYPTION-BASED MALWARE
[patent_app_type] => utility
[patent_app_number] => 18/194045
[patent_app_country] => US
[patent_app_date] => 2023-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4772
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18194045
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/194045 | METHODS AND SYSTEMS FOR PROTECTING COMPUTER SYSTEMS FROM ENCRYPTION-BASED MALWARE | Mar 30, 2023 | Pending |
Array
(
[id] => 19466662
[patent_doc_number] => 20240320332
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-09-26
[patent_title] => LIVE ATTACK SHADOW REPLAY OF SOFTWARE
[patent_app_type] => utility
[patent_app_number] => 18/186454
[patent_app_country] => US
[patent_app_date] => 2023-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6660
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18186454
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/186454 | Live attack shadow replay of software | Mar 19, 2023 | Issued |
Array
(
[id] => 18487181
[patent_doc_number] => 20230214527
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-07-06
[patent_title] => METHODS AND SYSTEMS FOR LEVERAGING EXISTING USER DATA TO VERIFY USER CREDENTIALS
[patent_app_type] => utility
[patent_app_number] => 18/183105
[patent_app_country] => US
[patent_app_date] => 2023-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9336
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18183105
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/183105 | Methods and systems for leveraging existing user data to verify user credentials | Mar 12, 2023 | Issued |
Array
(
[id] => 18489522
[patent_doc_number] => 20230216873
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-07-06
[patent_title] => DETECTION SYSTEM, DETECTION METHOD, AND RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 18/116152
[patent_app_country] => US
[patent_app_date] => 2023-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12943
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 61
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18116152
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/116152 | DETECTION SYSTEM, DETECTION METHOD, AND RECORDING MEDIUM | Feb 28, 2023 | Pending |
Array
(
[id] => 18474362
[patent_doc_number] => 20230208650
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-06-29
[patent_title] => INFORMATION PROCESSING METHOD, RECORDING MEDIUM, AND INFORMATION PROCESSING DEVICE
[patent_app_type] => utility
[patent_app_number] => 18/113728
[patent_app_country] => US
[patent_app_date] => 2023-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18314
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18113728
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/113728 | INFORMATION PROCESSING METHOD, RECORDING MEDIUM, AND INFORMATION PROCESSING DEVICE | Feb 23, 2023 | Pending |
Array
(
[id] => 19499429
[patent_doc_number] => 20240338447
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-10
[patent_title] => AUTOMATED ATTACK CHAIN FOLLOWING BY A THREAT ANALYSIS PLATFORM
[patent_app_type] => utility
[patent_app_number] => 18/162649
[patent_app_country] => US
[patent_app_date] => 2023-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14359
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18162649
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/162649 | Automated attack chain following by a threat analysis platform | Jan 30, 2023 | Issued |
Array
(
[id] => 19499429
[patent_doc_number] => 20240338447
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-10
[patent_title] => AUTOMATED ATTACK CHAIN FOLLOWING BY A THREAT ANALYSIS PLATFORM
[patent_app_type] => utility
[patent_app_number] => 18/162649
[patent_app_country] => US
[patent_app_date] => 2023-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14359
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18162649
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/162649 | Automated attack chain following by a threat analysis platform | Jan 30, 2023 | Issued |
Array
(
[id] => 19499429
[patent_doc_number] => 20240338447
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-10
[patent_title] => AUTOMATED ATTACK CHAIN FOLLOWING BY A THREAT ANALYSIS PLATFORM
[patent_app_type] => utility
[patent_app_number] => 18/162649
[patent_app_country] => US
[patent_app_date] => 2023-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14359
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18162649
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/162649 | Automated attack chain following by a threat analysis platform | Jan 30, 2023 | Issued |
Array
(
[id] => 19499429
[patent_doc_number] => 20240338447
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-10
[patent_title] => AUTOMATED ATTACK CHAIN FOLLOWING BY A THREAT ANALYSIS PLATFORM
[patent_app_type] => utility
[patent_app_number] => 18/162649
[patent_app_country] => US
[patent_app_date] => 2023-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14359
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18162649
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/162649 | Automated attack chain following by a threat analysis platform | Jan 30, 2023 | Issued |
Array
(
[id] => 19347749
[patent_doc_number] => 20240256713
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-01
[patent_title] => UPDATING ANNOTATED SOFTWARE OBJECTS
[patent_app_type] => utility
[patent_app_number] => 18/102929
[patent_app_country] => US
[patent_app_date] => 2023-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4508
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18102929
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/102929 | Updating annotated software objects | Jan 29, 2023 | Issued |
Array
(
[id] => 19347976
[patent_doc_number] => 20240256940
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-08-01
[patent_title] => QUANTUM SERVICE DISCOVERY
[patent_app_type] => utility
[patent_app_number] => 18/102008
[patent_app_country] => US
[patent_app_date] => 2023-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6191
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18102008
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/102008 | QUANTUM SERVICE DISCOVERY | Jan 25, 2023 | Pending |
Array
(
[id] => 18319773
[patent_doc_number] => 20230117901
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-04-20
[patent_title] => Forensic Data Collection and Analysis Utilizing Function Call Stacks
[patent_app_type] => utility
[patent_app_number] => 18/068832
[patent_app_country] => US
[patent_app_date] => 2022-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4271
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -1
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18068832
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/068832 | Forensic data collection and analysis utilizing function call stacks | Dec 19, 2022 | Issued |
Array
(
[id] => 18320192
[patent_doc_number] => 20230118320
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-04-20
[patent_title] => METHODS FOR SECURE DATA STORAGE
[patent_app_type] => utility
[patent_app_number] => 18/084393
[patent_app_country] => US
[patent_app_date] => 2022-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 43764
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18084393
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/084393 | METHODS FOR SECURE DATA STORAGE | Dec 18, 2022 | Abandoned |
Array
(
[id] => 20250028
[patent_doc_number] => 20250298897
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-09-25
[patent_title] => Security Scan With Backup
[patent_app_type] => utility
[patent_app_number] => 18/247241
[patent_app_country] => US
[patent_app_date] => 2022-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1080
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18247241
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/247241 | Security Scan With Backup | Dec 14, 2022 | Pending |
Array
(
[id] => 20250028
[patent_doc_number] => 20250298897
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-09-25
[patent_title] => Security Scan With Backup
[patent_app_type] => utility
[patent_app_number] => 18/247241
[patent_app_country] => US
[patent_app_date] => 2022-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1080
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18247241
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/247241 | Security Scan With Backup | Dec 14, 2022 | Pending |
Array
(
[id] => 18968325
[patent_doc_number] => 11902123
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-02-13
[patent_title] => Technologies for managing compromised sensors in virtualized environments
[patent_app_type] => utility
[patent_app_number] => 18/054095
[patent_app_country] => US
[patent_app_date] => 2022-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 13968
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18054095
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/054095 | Technologies for managing compromised sensors in virtualized environments | Nov 8, 2022 | Issued |
Array
(
[id] => 20190876
[patent_doc_number] => 12402010
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-08-26
[patent_title] => Providing a seamless login experience in a companion mobile application
[patent_app_type] => utility
[patent_app_number] => 18/051703
[patent_app_country] => US
[patent_app_date] => 2022-11-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 0
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18051703
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/051703 | Providing a seamless login experience in a companion mobile application | Oct 31, 2022 | Issued |
Array
(
[id] => 20145864
[patent_doc_number] => 12380207
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-08-05
[patent_title] => Virtual machine image management system
[patent_app_type] => utility
[patent_app_number] => 17/978637
[patent_app_country] => US
[patent_app_date] => 2022-11-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2404
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17978637
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/978637 | Virtual machine image management system | Oct 31, 2022 | Issued |
Array
(
[id] => 18162494
[patent_doc_number] => 20230029087
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-01-26
[patent_title] => SYSTEMS AND METHODS FOR MANAGING SECURE SHARING OF ONLINE DATA
[patent_app_type] => utility
[patent_app_number] => 17/938394
[patent_app_country] => US
[patent_app_date] => 2022-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5105
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17938394
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/938394 | Systems and methods for managing secure sharing of online data | Oct 5, 2022 | Issued |
Array
(
[id] => 19087071
[patent_doc_number] => 20240113872
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-04
[patent_title] => INDUSTRIAL AUTOMATION BLOCKCHAIN DATA MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 17/937002
[patent_app_country] => US
[patent_app_date] => 2022-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15855
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 75
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17937002
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/937002 | INDUSTRIAL AUTOMATION BLOCKCHAIN DATA MANAGEMENT | Sep 29, 2022 | Pending |