Search

Baotran N. To

Examiner (ID: 4529, Phone: (571)272-8156 , Office: P/2435 )

Most Active Art Unit
2435
Art Unit(s)
2135, 2435
Total Applications
923
Issued Applications
728
Pending Applications
71
Abandoned Applications
147

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9714828 [patent_doc_number] => 08839432 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-09-16 [patent_title] => 'Method and apparatus for performing a reputation based analysis on a malicious infection to secure a computer' [patent_app_type] => utility [patent_app_number] => 12/752727 [patent_app_country] => US [patent_app_date] => 2010-04-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6420 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 128 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12752727 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/752727
Method and apparatus for performing a reputation based analysis on a malicious infection to secure a computer Mar 31, 2010 Issued
Array ( [id] => 8060531 [patent_doc_number] => 20110246756 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-10-06 [patent_title] => 'PROTOCOL FOR AUTHENTICATING FUNCTIONALITY IN A PERIPHERAL DEVICE' [patent_app_type] => utility [patent_app_number] => 12/752929 [patent_app_country] => US [patent_app_date] => 2010-04-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8001 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0246/20110246756.pdf [firstpage_image] =>[orig_patent_app_number] => 12752929 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/752929
Protocol for authenticating functionality in a peripheral device Mar 31, 2010 Issued
Array ( [id] => 6416264 [patent_doc_number] => 20100306819 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-12-02 [patent_title] => 'INTERACTIVE PHISHING DETECTION (IPD)' [patent_app_type] => utility [patent_app_number] => 12/752988 [patent_app_country] => US [patent_app_date] => 2010-04-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 12800 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0306/20100306819.pdf [firstpage_image] =>[orig_patent_app_number] => 12752988 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/752988
Interactive phishing detection (IPD) Mar 31, 2010 Issued
Array ( [id] => 6131292 [patent_doc_number] => 20110087888 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-04-14 [patent_title] => 'AUTHENTICATION USING A WEAK HASH OF USER CREDENTIALS' [patent_app_type] => utility [patent_app_number] => 12/752562 [patent_app_country] => US [patent_app_date] => 2010-04-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3745 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0087/20110087888.pdf [firstpage_image] =>[orig_patent_app_number] => 12752562 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/752562
AUTHENTICATION USING A WEAK HASH OF USER CREDENTIALS Mar 31, 2010 Abandoned
Array ( [id] => 10879696 [patent_doc_number] => 08904495 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-12-02 [patent_title] => 'Secure transaction systems and methods' [patent_app_type] => utility [patent_app_number] => 12/751954 [patent_app_country] => US [patent_app_date] => 2010-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 20 [patent_no_of_words] => 7395 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 323 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12751954 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/751954
Secure transaction systems and methods Mar 30, 2010 Issued
Array ( [id] => 8936025 [patent_doc_number] => 08495747 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-07-23 [patent_title] => 'Prioritizing asset remediations' [patent_app_type] => utility [patent_app_number] => 12/751995 [patent_app_country] => US [patent_app_date] => 2010-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 11189 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 288 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12751995 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/751995
Prioritizing asset remediations Mar 30, 2010 Issued
Array ( [id] => 9416857 [patent_doc_number] => 08700909 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-04-15 [patent_title] => 'Revocation of a biometric reference template' [patent_app_type] => utility [patent_app_number] => 12/713364 [patent_app_country] => US [patent_app_date] => 2010-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6516 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 143 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12713364 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/713364
Revocation of a biometric reference template Feb 25, 2010 Issued
Array ( [id] => 8088023 [patent_doc_number] => 08151347 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-04-03 [patent_title] => 'Clustered file system for mix of trusted and untrusted nodes' [patent_app_type] => utility [patent_app_number] => 12/648501 [patent_app_country] => US [patent_app_date] => 2009-12-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 21 [patent_no_of_words] => 12145 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 252 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/151/08151347.pdf [firstpage_image] =>[orig_patent_app_number] => 12648501 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/648501
Clustered file system for mix of trusted and untrusted nodes Dec 28, 2009 Issued
Array ( [id] => 10853023 [patent_doc_number] => 08879724 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-11-04 [patent_title] => 'Differential power analysis—resistant cryptographic processing' [patent_app_type] => utility [patent_app_number] => 12/637565 [patent_app_country] => US [patent_app_date] => 2009-12-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 8843 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 108 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12637565 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/637565
Differential power analysis—resistant cryptographic processing Dec 13, 2009 Issued
Array ( [id] => 6555851 [patent_doc_number] => 20100125895 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-05-20 [patent_title] => 'DOMAIN BASED AUTHENTICATION SCHEME' [patent_app_type] => utility [patent_app_number] => 12/622925 [patent_app_country] => US [patent_app_date] => 2009-11-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 25 [patent_figures_cnt] => 25 [patent_no_of_words] => 8288 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0125/20100125895.pdf [firstpage_image] =>[orig_patent_app_number] => 12622925 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/622925
Domain based authentication scheme Nov 19, 2009 Issued
Array ( [id] => 6333840 [patent_doc_number] => 20100115628 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-05-06 [patent_title] => 'DIGITAL RIGHTS MANAGEMENT SCHEME FOR AN ON-DEMAND DISTRIBUTED STREAMING SYSTEM' [patent_app_type] => utility [patent_app_number] => 12/616917 [patent_app_country] => US [patent_app_date] => 2009-11-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 9106 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0115/20100115628.pdf [firstpage_image] =>[orig_patent_app_number] => 12616917 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/616917
Digital rights management scheme for an on-demand distributed streaming system Nov 11, 2009 Issued
Array ( [id] => 6463452 [patent_doc_number] => 20100040230 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-02-18 [patent_title] => 'CRYPTOGRAPHIC TECHNIQUES FOR A COMMUNICATIONS NETWORK' [patent_app_type] => utility [patent_app_number] => 12/582253 [patent_app_country] => US [patent_app_date] => 2009-10-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 5151 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0040/20100040230.pdf [firstpage_image] =>[orig_patent_app_number] => 12582253 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/582253
Cryptographic techniques for a communications network Oct 19, 2009 Issued
Array ( [id] => 6511397 [patent_doc_number] => 20100095135 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-04-15 [patent_title] => 'Method and system for processing forward- locked DRM contents, and portable device adapted thereto' [patent_app_type] => utility [patent_app_number] => 12/587427 [patent_app_country] => US [patent_app_date] => 2009-10-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3882 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0095/20100095135.pdf [firstpage_image] =>[orig_patent_app_number] => 12587427 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/587427
Method and system for processing forward- locked DRM contents, and portable device adapted thereto Oct 6, 2009 Abandoned
Array ( [id] => 6370329 [patent_doc_number] => 20100088748 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-04-08 [patent_title] => 'Secure peer group network and method thereof by locking a mac address to an entity at physical layer' [patent_app_type] => utility [patent_app_number] => 12/585586 [patent_app_country] => US [patent_app_date] => 2009-09-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3600 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0088/20100088748.pdf [firstpage_image] =>[orig_patent_app_number] => 12585586 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/585586
Secure peer group network and method thereof by locking a mac address to an entity at physical layer Sep 17, 2009 Abandoned
Array ( [id] => 6313578 [patent_doc_number] => 20100071044 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-03-18 [patent_title] => 'Method for tracking location of patients and doctors in a medical office or hospital practice' [patent_app_type] => utility [patent_app_number] => 12/585414 [patent_app_country] => US [patent_app_date] => 2009-09-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2193 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0071/20100071044.pdf [firstpage_image] =>[orig_patent_app_number] => 12585414 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/585414
Method for tracking location of patients and doctors in a medical office or hospital practice Sep 14, 2009 Abandoned
Array ( [id] => 6364742 [patent_doc_number] => 20100074436 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-03-25 [patent_title] => 'Method, apparatus and computer program support for regular recording of a positive integer' [patent_app_type] => utility [patent_app_number] => 12/584949 [patent_app_country] => US [patent_app_date] => 2009-09-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3405 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0074/20100074436.pdf [firstpage_image] =>[orig_patent_app_number] => 12584949 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/584949
Method, apparatus and computer program support for regular recording of a positive integer Sep 14, 2009 Abandoned
Array ( [id] => 8805163 [patent_doc_number] => 08443447 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-05-14 [patent_title] => 'Apparatus and method for detecting malware-infected electronic mail' [patent_app_type] => utility [patent_app_number] => 12/536725 [patent_app_country] => US [patent_app_date] => 2009-08-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2690 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 199 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12536725 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/536725
Apparatus and method for detecting malware-infected electronic mail Aug 5, 2009 Issued
Array ( [id] => 7679623 [patent_doc_number] => 20100106964 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-04-29 [patent_title] => 'AUTHENTICATION TERMINAL, AUTHENTICATION SERVER, AND AUTHENTICATION SYSTEM' [patent_app_type] => utility [patent_app_number] => 12/536661 [patent_app_country] => US [patent_app_date] => 2009-08-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6356 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0106/20100106964.pdf [firstpage_image] =>[orig_patent_app_number] => 12536661 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/536661
AUTHENTICATION TERMINAL, AUTHENTICATION SERVER, AND AUTHENTICATION SYSTEM Aug 5, 2009 Abandoned
Array ( [id] => 6620650 [patent_doc_number] => 20100034378 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-02-11 [patent_title] => 'BROADCAST RECEIVING DEVICE FOR RECEIVING BROADCAST SIGNAL AND METHOD OF CONTROLLING THE SAME' [patent_app_type] => utility [patent_app_number] => 12/537064 [patent_app_country] => US [patent_app_date] => 2009-08-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 4724 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0034/20100034378.pdf [firstpage_image] =>[orig_patent_app_number] => 12537064 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/537064
Broadcast receiving device for receiving broadcast signal and method of controlling the same Aug 5, 2009 Issued
Array ( [id] => 5996996 [patent_doc_number] => 20110016531 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-20 [patent_title] => 'SYSTEM AND METHOD FOR AUTOMATED MAINTENANCE BASED ON SECURITY LEVELS FOR DOCUMENT PROCESSING DEVICES' [patent_app_type] => utility [patent_app_number] => 12/504048 [patent_app_country] => US [patent_app_date] => 2009-07-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8084 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0016/20110016531.pdf [firstpage_image] =>[orig_patent_app_number] => 12504048 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/504048
SYSTEM AND METHOD FOR AUTOMATED MAINTENANCE BASED ON SECURITY LEVELS FOR DOCUMENT PROCESSING DEVICES Jul 15, 2009 Abandoned
Menu