
Trong H. Nguyen
Examiner (ID: 14030, Phone: (571)270-7312 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2436 |
| Total Applications | 577 |
| Issued Applications | 433 |
| Pending Applications | 54 |
| Abandoned Applications | 113 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19259694
[patent_doc_number] => 12019748
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-06-25
[patent_title] => Application migration for cloud data management and ransomware recovery
[patent_app_type] => utility
[patent_app_number] => 17/322356
[patent_app_country] => US
[patent_app_date] => 2021-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 65
[patent_figures_cnt] => 73
[patent_no_of_words] => 46786
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 260
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17322356
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/322356 | Application migration for cloud data management and ransomware recovery | May 16, 2021 | Issued |
Array
(
[id] => 17796829
[patent_doc_number] => 20220255921
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-11
[patent_title] => COMPUTER-IMPLEMENTED SYSTEM AND AUTHENTICATION METHOD
[patent_app_type] => utility
[patent_app_number] => 17/613630
[patent_app_country] => US
[patent_app_date] => 2021-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5070
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17613630
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/613630 | Computer-implemented system and authentication method | May 12, 2021 | Issued |
Array
(
[id] => 17054586
[patent_doc_number] => 20210264020
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-08-26
[patent_title] => TECHNOLOGY TO CONTROL SYSTEM CALL INVOCATIONS WITHIN A SINGLE ADDRESS SPACE
[patent_app_type] => utility
[patent_app_number] => 17/314349
[patent_app_country] => US
[patent_app_date] => 2021-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8245
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17314349
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/314349 | TECHNOLOGY TO CONTROL SYSTEM CALL INVOCATIONS WITHIN A SINGLE ADDRESS SPACE | May 6, 2021 | Abandoned |
Array
(
[id] => 17992171
[patent_doc_number] => 20220358208
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-11-10
[patent_title] => SYSTEMS AND METHODS FOR ENABLING ACCELERATOR-BASED SECURE EXECUTION ZONES
[patent_app_type] => utility
[patent_app_number] => 17/313873
[patent_app_country] => US
[patent_app_date] => 2021-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7204
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17313873
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/313873 | SYSTEMS AND METHODS FOR ENABLING ACCELERATOR-BASED SECURE EXECUTION ZONES | May 5, 2021 | Abandoned |
Array
(
[id] => 18409895
[patent_doc_number] => 20230171248
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-06-01
[patent_title] => PASSWORD RECOVERY METHOD AND SYSTEM, AND CLOUD SERVER AND ELECTRONIC DEVICE
[patent_app_type] => utility
[patent_app_number] => 17/920879
[patent_app_country] => US
[patent_app_date] => 2021-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6634
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17920879
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/920879 | PASSWORD RECOVERY METHOD AND SYSTEM, AND CLOUD SERVER AND ELECTRONIC DEVICE | Apr 27, 2021 | Pending |
Array
(
[id] => 17550415
[patent_doc_number] => 20220121757
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-04-21
[patent_title] => Regulating Blockchain Creation and Distribution Based on System Resource Utilization
[patent_app_type] => utility
[patent_app_number] => 17/242785
[patent_app_country] => US
[patent_app_date] => 2021-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13569
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 72
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17242785
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/242785 | Optimizing blockchain creation with artificial intelligence based on system resources | Apr 27, 2021 | Issued |
Array
(
[id] => 17187485
[patent_doc_number] => 20210334370
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-10-28
[patent_title] => SYSTEMS AND METHODS FOR EMBEDDED ANOMALIES DETECTOR FOR CYBER-PHYSICAL SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 17/238479
[patent_app_country] => US
[patent_app_date] => 2021-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16316
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17238479
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/238479 | Systems and methods for embedded anomalies detector for cyber-physical systems | Apr 22, 2021 | Issued |
Array
(
[id] => 18130426
[patent_doc_number] => 11556637
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-17
[patent_title] => Information security system and method for anomaly and security threat detection
[patent_app_type] => utility
[patent_app_number] => 17/221967
[patent_app_country] => US
[patent_app_date] => 2021-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 12560
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 486
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17221967
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/221967 | Information security system and method for anomaly and security threat detection | Apr 4, 2021 | Issued |
Array
(
[id] => 17918955
[patent_doc_number] => 20220321351
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-10-06
[patent_title] => SYSTEMS AND METHODS FOR SELECTIVELY DECRYPTING AN ENCRYPTED CODE USING AUGMENTED REALITY
[patent_app_type] => utility
[patent_app_number] => 17/219648
[patent_app_country] => US
[patent_app_date] => 2021-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11398
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17219648
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/219648 | Systems and methods for selectively decrypting an encrypted code using augmented reality | Mar 30, 2021 | Issued |
Array
(
[id] => 16967060
[patent_doc_number] => 20210218559
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-15
[patent_title] => SECURE KEY PROVISIONING AND HARDWARE-ASSISTED SECURE KEY STORAGE AND SECURE CRYPTOGRAPHIC FUNCTION OPERATION IN CONTAINER-BASED ENVIRONMENTS
[patent_app_type] => utility
[patent_app_number] => 17/214095
[patent_app_country] => US
[patent_app_date] => 2021-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10841
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17214095
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/214095 | SECURE KEY PROVISIONING AND HARDWARE-ASSISTED SECURE KEY STORAGE AND SECURE CRYPTOGRAPHIC FUNCTION OPERATION IN CONTAINER-BASED ENVIRONMENTS | Mar 25, 2021 | Pending |
Array
(
[id] => 17071780
[patent_doc_number] => 20210273998
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-09-02
[patent_title] => SUB-NETWORKS BASED SECURITY METHOD, APPARATUS AND PRODUCT
[patent_app_type] => utility
[patent_app_number] => 17/211643
[patent_app_country] => US
[patent_app_date] => 2021-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7901
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17211643
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/211643 | Sub-networks based security method, apparatus and product | Mar 23, 2021 | Issued |
Array
(
[id] => 19925349
[patent_doc_number] => 12299635
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-05-13
[patent_title] => Multi-factor authentication for remote access of patient data
[patent_app_type] => utility
[patent_app_number] => 17/201759
[patent_app_country] => US
[patent_app_date] => 2021-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3449
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17201759
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/201759 | Multi-factor authentication for remote access of patient data | Mar 14, 2021 | Issued |
Array
(
[id] => 18130444
[patent_doc_number] => 11556655
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-17
[patent_title] => Automatic vulnerability mitigation
[patent_app_type] => utility
[patent_app_number] => 17/158180
[patent_app_country] => US
[patent_app_date] => 2021-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5641
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17158180
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/158180 | Automatic vulnerability mitigation | Jan 25, 2021 | Issued |
Array
(
[id] => 17751729
[patent_doc_number] => 20220229934
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-21
[patent_title] => RECURSIVELY ADAPTING A SENSITIVE CONTENT MASKING TECHNIQUE
[patent_app_type] => utility
[patent_app_number] => 17/151770
[patent_app_country] => US
[patent_app_date] => 2021-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7552
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17151770
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/151770 | Recursively adapting a sensitive content masking technique | Jan 18, 2021 | Issued |
Array
(
[id] => 18489325
[patent_doc_number] => 20230216676
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-07-06
[patent_title] => ENCODING OR DECODING FOR APPROXIMATE ENCRYPTED CIPHERTEXT
[patent_app_type] => utility
[patent_app_number] => 17/906856
[patent_app_country] => US
[patent_app_date] => 2021-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7828
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 46
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17906856
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/906856 | ENCODING OR DECODING FOR APPROXIMATE ENCRYPTED CIPHERTEXT | Jan 18, 2021 | Pending |
Array
(
[id] => 18489325
[patent_doc_number] => 20230216676
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-07-06
[patent_title] => ENCODING OR DECODING FOR APPROXIMATE ENCRYPTED CIPHERTEXT
[patent_app_type] => utility
[patent_app_number] => 17/906856
[patent_app_country] => US
[patent_app_date] => 2021-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7828
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 46
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17906856
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/906856 | ENCODING OR DECODING FOR APPROXIMATE ENCRYPTED CIPHERTEXT | Jan 18, 2021 | Pending |
Array
(
[id] => 16795002
[patent_doc_number] => 20210124819
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-29
[patent_title] => PAYMENT PASSWORD RESET METHOD AND APPARATUS, AND ELECTRONIC DEVICE
[patent_app_type] => utility
[patent_app_number] => 17/140875
[patent_app_country] => US
[patent_app_date] => 2021-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7435
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17140875
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/140875 | Payment password reset method and apparatus, and electronic device | Jan 3, 2021 | Issued |
Array
(
[id] => 17707143
[patent_doc_number] => 20220207149
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-06-30
[patent_title] => DATA TAINTING TO MITIGATE SPECULATION VULNERABILITIES
[patent_app_type] => utility
[patent_app_number] => 17/134347
[patent_app_country] => US
[patent_app_date] => 2020-12-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 25897
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17134347
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/134347 | DATA TAINTING TO MITIGATE SPECULATION VULNERABILITIES | Dec 25, 2020 | Abandoned |
Array
(
[id] => 18430679
[patent_doc_number] => 11675901
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-06-13
[patent_title] => Malware detection from operating system event tracing
[patent_app_type] => utility
[patent_app_number] => 17/131421
[patent_app_country] => US
[patent_app_date] => 2020-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 18738
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17131421
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/131421 | Malware detection from operating system event tracing | Dec 21, 2020 | Issued |
Array
(
[id] => 18494819
[patent_doc_number] => 11700244
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-11
[patent_title] => Structure of policies for evaluating key attributes of encryption keys
[patent_app_type] => utility
[patent_app_number] => 17/112596
[patent_app_country] => US
[patent_app_date] => 2020-12-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 16
[patent_no_of_words] => 24157
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17112596
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/112596 | Structure of policies for evaluating key attributes of encryption keys | Dec 3, 2020 | Issued |