
Ellen C. Tran
Examiner (ID: 4171, Phone: (571)272-3842 , Office: P/2433 )
| Most Active Art Unit | 2433 |
| Art Unit(s) | 2134, 2434, 2433 |
| Total Applications | 1013 |
| Issued Applications | 726 |
| Pending Applications | 67 |
| Abandoned Applications | 246 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15505739
[patent_doc_number] => 20200053058
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-13
[patent_title] => METHOD AND SYSTEM FOR DIGITAL RIGHTS MANAGEMENT OF DOCUMENTS
[patent_app_type] => utility
[patent_app_number] => 16/446060
[patent_app_country] => US
[patent_app_date] => 2019-06-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8583
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16446060
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/446060 | METHOD AND SYSTEM FOR DIGITAL RIGHTS MANAGEMENT OF DOCUMENTS | Jun 18, 2019 | Abandoned |
Array
(
[id] => 16403352
[patent_doc_number] => 20200344210
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-29
[patent_title] => SECURE ENCLAVE-BASED GUEST FIREWALL
[patent_app_type] => utility
[patent_app_number] => 16/442579
[patent_app_country] => US
[patent_app_date] => 2019-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4269
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16442579
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/442579 | Secure enclave-based guest firewall | Jun 16, 2019 | Issued |
Array
(
[id] => 16508347
[patent_doc_number] => 20200387603
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-10
[patent_title] => DEVICE PROTECTION BASED ON PREDICTION AND CONTEXTUAL ANALYSIS
[patent_app_type] => utility
[patent_app_number] => 16/431181
[patent_app_country] => US
[patent_app_date] => 2019-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12442
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16431181
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/431181 | DEVICE PROTECTION BASED ON PREDICTION AND CONTEXTUAL ANALYSIS | Jun 3, 2019 | Abandoned |
Array
(
[id] => 16488660
[patent_doc_number] => 20200382273
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-03
[patent_title] => PRIVACY PRESERVING ORACLE
[patent_app_type] => utility
[patent_app_number] => 16/427549
[patent_app_country] => US
[patent_app_date] => 2019-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6254
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16427549
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/427549 | Privacy preserving oracle | May 30, 2019 | Issued |
Array
(
[id] => 14844913
[patent_doc_number] => 20190280857
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-12
[patent_title] => SYSTEM AND METHOD OF SECURING DEVICES USING ENCRYPTION KEYS
[patent_app_type] => utility
[patent_app_number] => 16/424675
[patent_app_country] => US
[patent_app_date] => 2019-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3239
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16424675
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/424675 | System and method of securing devices using encryption keys | May 28, 2019 | Issued |
Array
(
[id] => 19797211
[patent_doc_number] => 12238197
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-02-25
[patent_title] => Utilizing homomorphic properties for image encryption and decryption
[patent_app_type] => utility
[patent_app_number] => 17/057950
[patent_app_country] => US
[patent_app_date] => 2019-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 3131
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17057950
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/057950 | Utilizing homomorphic properties for image encryption and decryption | May 23, 2019 | Issued |
Array
(
[id] => 16652388
[patent_doc_number] => 10929569
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-23
[patent_title] => Method and system for storage-based intrusion detection and recovery
[patent_app_type] => utility
[patent_app_number] => 16/416732
[patent_app_country] => US
[patent_app_date] => 2019-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 6600
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 240
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16416732
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/416732 | Method and system for storage-based intrusion detection and recovery | May 19, 2019 | Issued |
Array
(
[id] => 14786813
[patent_doc_number] => 20190268304
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-29
[patent_title] => SECURING STORAGE UNITS IN A DISPERSED STORAGE NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/409435
[patent_app_country] => US
[patent_app_date] => 2019-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6256
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 292
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16409435
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/409435 | Securing storage units in a dispersed storage network | May 9, 2019 | Issued |
Array
(
[id] => 16426101
[patent_doc_number] => 20200351299
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-05
[patent_title] => DETECTION OF CYBER ATTACKS FROM HIGH-FREQUENCY HASHED INCORRECT PASSWORDS
[patent_app_type] => utility
[patent_app_number] => 16/399243
[patent_app_country] => US
[patent_app_date] => 2019-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13228
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16399243
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/399243 | Detection of cyber attacks from high-frequency hashed incorrect passwords | Apr 29, 2019 | Issued |
Array
(
[id] => 17766086
[patent_doc_number] => 20220239700
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-28
[patent_title] => METHOD AND APPARATUS FOR SECURITY ASSURANCE AUTOMATION
[patent_app_type] => utility
[patent_app_number] => 17/607082
[patent_app_country] => US
[patent_app_date] => 2019-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7853
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17607082
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/607082 | Method and apparatus for security assurance of a network or management function | Apr 28, 2019 | Issued |
Array
(
[id] => 17271136
[patent_doc_number] => 11196575
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-12-07
[patent_title] => On-chipset certification to prevent spy chip
[patent_app_type] => utility
[patent_app_number] => 16/393419
[patent_app_country] => US
[patent_app_date] => 2019-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4607
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16393419
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/393419 | On-chipset certification to prevent spy chip | Apr 23, 2019 | Issued |
Array
(
[id] => 17331649
[patent_doc_number] => 11222113
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-01-11
[patent_title] => Automatically generating malware definitions using word-level analysis
[patent_app_type] => utility
[patent_app_number] => 16/363709
[patent_app_country] => US
[patent_app_date] => 2019-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6889
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16363709
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/363709 | Automatically generating malware definitions using word-level analysis | Mar 24, 2019 | Issued |
Array
(
[id] => 15505821
[patent_doc_number] => 20200053099
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-13
[patent_title] => MANAGEMENT AND CONTROL OF MOBILE COMPUTING DEVICE USING LOCAL AND REMOTE SOFTWARE AGENTS
[patent_app_type] => utility
[patent_app_number] => 16/355367
[patent_app_country] => US
[patent_app_date] => 2019-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 52201
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16355367
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/355367 | MANAGEMENT AND CONTROL OF MOBILE COMPUTING DEVICE USING LOCAL AND REMOTE SOFTWARE AGENTS | Mar 14, 2019 | Abandoned |
Array
(
[id] => 15221571
[patent_doc_number] => 20190373472
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-05
[patent_title] => Method and System for IoT Code and Configuration using Smart Contracts
[patent_app_type] => utility
[patent_app_number] => 16/351647
[patent_app_country] => US
[patent_app_date] => 2019-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 27297
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 47
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16351647
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/351647 | Method and system for IoT code and configuration using smart contracts | Mar 12, 2019 | Issued |
Array
(
[id] => 15595171
[patent_doc_number] => 20200074120
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => ANTI-TAMPER CIRCUITRY
[patent_app_type] => utility
[patent_app_number] => 16/293543
[patent_app_country] => US
[patent_app_date] => 2019-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12826
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 42
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16293543
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/293543 | ANTI-TAMPER CIRCUITRY | Mar 4, 2019 | Pending |
Array
(
[id] => 20188925
[patent_doc_number] => 12400040
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-08-26
[patent_title] => Detection of unauthorized components
[patent_app_type] => utility
[patent_app_number] => 16/293572
[patent_app_country] => US
[patent_app_date] => 2019-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 25
[patent_no_of_words] => 8111
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16293572
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/293572 | Detection of unauthorized components | Mar 4, 2019 | Issued |
Array
(
[id] => 16255764
[patent_doc_number] => 20200265138
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-20
[patent_title] => Security via Web Browser Tampering Detection
[patent_app_type] => utility
[patent_app_number] => 16/288817
[patent_app_country] => US
[patent_app_date] => 2019-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6379
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16288817
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/288817 | Security via web browser tampering detection | Feb 27, 2019 | Issued |
Array
(
[id] => 14478609
[patent_doc_number] => 20190190958
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-06-20
[patent_title] => Independent Encryption Compliance Verification System
[patent_app_type] => utility
[patent_app_number] => 16/284808
[patent_app_country] => US
[patent_app_date] => 2019-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8041
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16284808
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/284808 | Independent Encryption Compliance Verification System | Feb 24, 2019 | Abandoned |
Array
(
[id] => 14755169
[patent_doc_number] => 20190260758
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-22
[patent_title] => SYSTEM CONFIGURATIONS FOR DATA STREAM ACCESSIBILITY
[patent_app_type] => utility
[patent_app_number] => 16/284794
[patent_app_country] => US
[patent_app_date] => 2019-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11668
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16284794
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/284794 | System configurations for data stream accessibility | Feb 24, 2019 | Issued |
Array
(
[id] => 17019200
[patent_doc_number] => 11088855
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-10
[patent_title] => System and method for verifying an identity of a user using a cryptographic challenge based on a cryptographic operation
[patent_app_type] => utility
[patent_app_number] => 16/282111
[patent_app_country] => US
[patent_app_date] => 2019-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 14761
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16282111
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/282111 | System and method for verifying an identity of a user using a cryptographic challenge based on a cryptographic operation | Feb 20, 2019 | Issued |