
Bao G. Tran
Examiner (ID: 11705, Phone: (571)270-3493 , Office: P/2158 )
| Most Active Art Unit | 2158 |
| Art Unit(s) | 2168, 2158, 2169 |
| Total Applications | 292 |
| Issued Applications | 120 |
| Pending Applications | 4 |
| Abandoned Applications | 169 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16747487
[patent_doc_number] => 10972497
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-04-06
[patent_title] => Systems and methods for recovering an infected endpoint
[patent_app_type] => utility
[patent_app_number] => 16/138957
[patent_app_country] => US
[patent_app_date] => 2018-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7995
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16138957
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/138957 | Systems and methods for recovering an infected endpoint | Sep 20, 2018 | Issued |
Array
(
[id] => 17289685
[patent_doc_number] => 11206257
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-12-21
[patent_title] => Attendance tracking configuration for a mobile device
[patent_app_type] => utility
[patent_app_number] => 16/134226
[patent_app_country] => US
[patent_app_date] => 2018-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3919
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16134226
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/134226 | Attendance tracking configuration for a mobile device | Sep 17, 2018 | Issued |
Array
(
[id] => 17238593
[patent_doc_number] => 11182473
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-11-23
[patent_title] => System and method for mitigating cyberattacks against processor operability by a guest process
[patent_app_type] => utility
[patent_app_number] => 16/130944
[patent_app_country] => US
[patent_app_date] => 2018-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8121
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16130944
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/130944 | System and method for mitigating cyberattacks against processor operability by a guest process | Sep 12, 2018 | Issued |
Array
(
[id] => 14192959
[patent_doc_number] => 20190116185
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-18
[patent_title] => ACCESS AUTHORITY MANAGEMENT METHOD, ACCESS AUTHORITY MANAGEMENT SYSTEM, AND ACCESS AUTHORITY MANAGEMENT APPARATUS
[patent_app_type] => utility
[patent_app_number] => 16/129681
[patent_app_country] => US
[patent_app_date] => 2018-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11536
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16129681
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/129681 | ACCESS AUTHORITY MANAGEMENT METHOD, ACCESS AUTHORITY MANAGEMENT SYSTEM, AND ACCESS AUTHORITY MANAGEMENT APPARATUS | Sep 11, 2018 | Abandoned |
Array
(
[id] => 15445001
[patent_doc_number] => 20200036684
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-30
[patent_title] => CLUSTER-BASED DETERMINATION OF SIGNATURES FOR DETECTION OF ANOMALOUS DATA TRAFFIC
[patent_app_type] => utility
[patent_app_number] => 16/124699
[patent_app_country] => US
[patent_app_date] => 2018-09-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4913
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16124699
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/124699 | Cluster-based determination of signatures for detection of anomalous data traffic | Sep 6, 2018 | Issued |
Array
(
[id] => 13801143
[patent_doc_number] => 20190014110
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-10
[patent_title] => System and Method for Verifying Liveliness
[patent_app_type] => utility
[patent_app_number] => 16/118625
[patent_app_country] => US
[patent_app_date] => 2018-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10047
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16118625
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/118625 | System and method for verifying liveliness | Aug 30, 2018 | Issued |
| 16/115096 | Software Supply Chain Hardening Via Two-Factor Application Integrity Certification And Monitoring | Aug 27, 2018 | Abandoned |
Array
(
[id] => 13600867
[patent_doc_number] => 20180351982
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-06
[patent_title] => Reparsing Unsuccessfully Parsed Event Data in a Security Information and Event Management System
[patent_app_type] => utility
[patent_app_number] => 16/059309
[patent_app_country] => US
[patent_app_date] => 2018-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6731
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16059309
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/059309 | Reparsing unsuccessfully parsed event data in a security information and event management system | Aug 8, 2018 | Issued |
Array
(
[id] => 17278882
[patent_doc_number] => 20210385080
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-09
[patent_title] => GENERATOR OF PHYSICALLY UNCLONABLE CRYPTOGRAPHIC KEYS
[patent_app_type] => utility
[patent_app_number] => 16/637339
[patent_app_country] => US
[patent_app_date] => 2018-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4481
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16637339
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/637339 | Generator of physically unclonable cryptographic keys | Aug 6, 2018 | Issued |
Array
(
[id] => 15203443
[patent_doc_number] => 10499244
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-12-03
[patent_title] => Arranging display of control icons that enable usage of keys
[patent_app_type] => utility
[patent_app_number] => 16/055875
[patent_app_country] => US
[patent_app_date] => 2018-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 13813
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16055875
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/055875 | Arranging display of control icons that enable usage of keys | Aug 5, 2018 | Issued |
Array
(
[id] => 13560915
[patent_doc_number] => 20180332005
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-15
[patent_title] => INTEGRATING A HONEY NETWORK WITH A TARGET NETWORK TO COUNTER IP AND PEER-CHECKING EVASION TECHNIQUES
[patent_app_type] => utility
[patent_app_number] => 16/030637
[patent_app_country] => US
[patent_app_date] => 2018-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 26191
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16030637
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/030637 | Integrating a honey network with a target network to counter IP and peer-checking evasion techniques | Jul 8, 2018 | Issued |
Array
(
[id] => 16972491
[patent_doc_number] => 11068464
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-20
[patent_title] => Cyber intelligence system and method
[patent_app_type] => utility
[patent_app_number] => 16/019179
[patent_app_country] => US
[patent_app_date] => 2018-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11801
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16019179
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/019179 | Cyber intelligence system and method | Jun 25, 2018 | Issued |
Array
(
[id] => 13512595
[patent_doc_number] => 20180307840
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-25
[patent_title] => SECURE CONTROLLER OPERATION AND MALWARE PREVENTION
[patent_app_type] => utility
[patent_app_number] => 16/011906
[patent_app_country] => US
[patent_app_date] => 2018-06-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13817
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16011906
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/011906 | Secure controller operation and malware prevention | Jun 18, 2018 | Issued |
Array
(
[id] => 17848966
[patent_doc_number] => 11438358
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-06
[patent_title] => Aggregating asset vulnerabilities
[patent_app_type] => utility
[patent_app_number] => 16/011606
[patent_app_country] => US
[patent_app_date] => 2018-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5226
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16011606
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/011606 | Aggregating asset vulnerabilities | Jun 17, 2018 | Issued |
Array
(
[id] => 15773581
[patent_doc_number] => 20200117808
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-16
[patent_title] => Electronic System Vulnerability Assessment
[patent_app_type] => utility
[patent_app_number] => 16/624765
[patent_app_country] => US
[patent_app_date] => 2018-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5960
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16624765
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/624765 | Electronic System Vulnerability Assessment | Jun 17, 2018 | Abandoned |
Array
(
[id] => 14190483
[patent_doc_number] => 20190114947
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-18
[patent_title] => INTELLIGENT CONTAINER SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/010485
[patent_app_country] => US
[patent_app_date] => 2018-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 24960
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -57
[patent_words_short_claim] => 60
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16010485
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/010485 | Intelligent container system | Jun 16, 2018 | Issued |
Array
(
[id] => 15272349
[patent_doc_number] => 20190384909
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-19
[patent_title] => MEASURING INTEGRITY OF COMPUTING SYSTEM USING JUMP TABLE
[patent_app_type] => utility
[patent_app_number] => 16/007683
[patent_app_country] => US
[patent_app_date] => 2018-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9501
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16007683
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/007683 | Measuring integrity of computing system using jump table | Jun 12, 2018 | Issued |
Array
(
[id] => 13483643
[patent_doc_number] => 20180293364
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-11
[patent_title] => METHODS FOR CONTROLLING ACCESS TO DIGITAL ASSETS
[patent_app_type] => utility
[patent_app_number] => 16/004867
[patent_app_country] => US
[patent_app_date] => 2018-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20570
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16004867
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/004867 | Methods for controlling access to digital assets | Jun 10, 2018 | Issued |
Array
(
[id] => 17091946
[patent_doc_number] => 11120136
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-09-14
[patent_title] => Managing system firmware
[patent_app_type] => utility
[patent_app_number] => 16/001564
[patent_app_country] => US
[patent_app_date] => 2018-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7391
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16001564
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/001564 | Managing system firmware | Jun 5, 2018 | Issued |
Array
(
[id] => 15643355
[patent_doc_number] => 10594699
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-17
[patent_title] => Providing access to remote networks via external endpoints
[patent_app_type] => utility
[patent_app_number] => 15/997330
[patent_app_country] => US
[patent_app_date] => 2018-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8671
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15997330
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/997330 | Providing access to remote networks via external endpoints | Jun 3, 2018 | Issued |