
Ha Tran Nguyen
Examiner (ID: 13720)
| Most Active Art Unit | 2812 |
| Art Unit(s) | 2812, 2723, 2616, 2858, 2829, OPQA |
| Total Applications | 630 |
| Issued Applications | 484 |
| Pending Applications | 26 |
| Abandoned Applications | 120 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 8687091
[patent_doc_number] => 20130055375
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-02-28
[patent_title] => 'Method and Protection System for Mitigating Slow HTTP Attacks Using Rate and Time Monitoring'
[patent_app_type] => utility
[patent_app_number] => 13/355734
[patent_app_country] => US
[patent_app_date] => 2012-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5768
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13355734
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/355734 | Method and protection system for mitigating slow HTTP attacks using rate and time monitoring | Jan 22, 2012 | Issued |
Array
(
[id] => 9124208
[patent_doc_number] => 20130291130
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-31
[patent_title] => 'Protection of Memory Field Using Illegal Values'
[patent_app_type] => utility
[patent_app_number] => 13/978988
[patent_app_country] => US
[patent_app_date] => 2011-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3605
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13978988
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/978988 | Protection of Memory Field Using Illegal Values | Dec 5, 2011 | Abandoned |
Array
(
[id] => 10052738
[patent_doc_number] => 09092619
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-28
[patent_title] => 'Data processing apparatus'
[patent_app_type] => utility
[patent_app_number] => 13/310441
[patent_app_country] => US
[patent_app_date] => 2011-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 28
[patent_no_of_words] => 9374
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13310441
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/310441 | Data processing apparatus | Dec 1, 2011 | Issued |
Array
(
[id] => 8832011
[patent_doc_number] => 20130133056
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-23
[patent_title] => 'Single login Identifier Used Across Multiple Shopping Sites'
[patent_app_type] => utility
[patent_app_number] => 13/301508
[patent_app_country] => US
[patent_app_date] => 2011-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7780
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13301508
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/301508 | Single login Identifier Used Across Multiple Shopping Sites | Nov 20, 2011 | Abandoned |
Array
(
[id] => 8189637
[patent_doc_number] => 20120117610
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-10
[patent_title] => 'RUNTIME ADAPTABLE SECURITY PROCESSOR'
[patent_app_type] => utility
[patent_app_number] => 13/225305
[patent_app_country] => US
[patent_app_date] => 2011-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 75
[patent_figures_cnt] => 75
[patent_no_of_words] => 46110
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0117/20120117610.pdf
[firstpage_image] =>[orig_patent_app_number] => 13225305
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/225305 | RUNTIME ADAPTABLE SECURITY PROCESSOR | Sep 1, 2011 | Abandoned |
Array
(
[id] => 9465702
[patent_doc_number] => 20140130129
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-08
[patent_title] => 'COUNT VALUES TO DETECT DISCONNECTED CIRCUIT'
[patent_app_type] => utility
[patent_app_number] => 14/127595
[patent_app_country] => US
[patent_app_date] => 2011-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5813
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14127595
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/127595 | COUNT VALUES TO DETECT DISCONNECTED CIRCUIT | Aug 8, 2011 | Abandoned |
Array
(
[id] => 10144332
[patent_doc_number] => 09177141
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-03
[patent_title] => 'Active defense method on the basis of cloud security'
[patent_app_type] => utility
[patent_app_number] => 13/817577
[patent_app_country] => US
[patent_app_date] => 2011-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 5069
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 297
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13817577
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/817577 | Active defense method on the basis of cloud security | Aug 7, 2011 | Issued |
Array
(
[id] => 8899762
[patent_doc_number] => 08479296
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-02
[patent_title] => 'System and method for detecting unknown malware'
[patent_app_type] => utility
[patent_app_number] => 13/190601
[patent_app_country] => US
[patent_app_date] => 2011-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 8094
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13190601
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/190601 | System and method for detecting unknown malware | Jul 25, 2011 | Issued |
Array
(
[id] => 8605651
[patent_doc_number] => 20130010963
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-10
[patent_title] => 'MULTIPLICATIVE SPLITS TO PROTECT CIPHER KEYS'
[patent_app_type] => utility
[patent_app_number] => 13/178410
[patent_app_country] => US
[patent_app_date] => 2011-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5415
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13178410
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/178410 | Multiplicative splits to protect cipher keys | Jul 6, 2011 | Issued |
Array
(
[id] => 8589074
[patent_doc_number] => 20130007895
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-03
[patent_title] => 'MANAGING ACCESS CONTROL FOR A SCREEN SHARING SESSION'
[patent_app_type] => utility
[patent_app_number] => 13/171802
[patent_app_country] => US
[patent_app_date] => 2011-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6745
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13171802
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/171802 | MANAGING ACCESS CONTROL FOR A SCREEN SHARING SESSION | Jun 28, 2011 | Abandoned |
Array
(
[id] => 9666237
[patent_doc_number] => 08813248
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-08-19
[patent_title] => 'System and method for authenticating a user'
[patent_app_type] => utility
[patent_app_number] => 13/170681
[patent_app_country] => US
[patent_app_date] => 2011-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4161
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 247
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13170681
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/170681 | System and method for authenticating a user | Jun 27, 2011 | Issued |
Array
(
[id] => 11803210
[patent_doc_number] => 09544140
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-01-10
[patent_title] => 'Multi-level key hierarchy for securing cloud-based data sets'
[patent_app_type] => utility
[patent_app_number] => 13/171317
[patent_app_country] => US
[patent_app_date] => 2011-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9221
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13171317
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/171317 | Multi-level key hierarchy for securing cloud-based data sets | Jun 27, 2011 | Issued |
Array
(
[id] => 10653173
[patent_doc_number] => 09369448
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-14
[patent_title] => 'Network security parameter generation and distribution'
[patent_app_type] => utility
[patent_app_number] => 13/170979
[patent_app_country] => US
[patent_app_date] => 2011-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8771
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13170979
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/170979 | Network security parameter generation and distribution | Jun 27, 2011 | Issued |
Array
(
[id] => 8267371
[patent_doc_number] => 20120166793
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-28
[patent_title] => 'APPARATUS AND METHOD FOR SHARING AND USING COMMENT ON CONTENT IN DISTRIBUTED NETWORK SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/169481
[patent_app_country] => US
[patent_app_date] => 2011-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7489
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13169481
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/169481 | APPARATUS AND METHOD FOR SHARING AND USING COMMENT ON CONTENT IN DISTRIBUTED NETWORK SYSTEM | Jun 26, 2011 | Abandoned |
Array
(
[id] => 8568992
[patent_doc_number] => 20120331563
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-12-27
[patent_title] => 'Retrieval of Data Across Multiple Partitions of a Storage Device Using Digital Signatures'
[patent_app_type] => utility
[patent_app_number] => 13/168932
[patent_app_country] => US
[patent_app_date] => 2011-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7187
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13168932
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/168932 | Retrieval of data across multiple partitions of a storage device using digital signatures | Jun 23, 2011 | Issued |
Array
(
[id] => 8525171
[patent_doc_number] => 20120324579
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-12-20
[patent_title] => 'CLOUD MALWARE FALSE POSITIVE RECOVERY'
[patent_app_type] => utility
[patent_app_number] => 13/162211
[patent_app_country] => US
[patent_app_date] => 2011-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9351
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13162211
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/162211 | Cloud malware false positive recovery | Jun 15, 2011 | Issued |
Array
(
[id] => 10117319
[patent_doc_number] => 09152202
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-06
[patent_title] => 'Mobile device operations with battery optimization'
[patent_app_type] => utility
[patent_app_number] => 13/162133
[patent_app_country] => US
[patent_app_date] => 2011-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 11
[patent_no_of_words] => 10443
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13162133
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/162133 | Mobile device operations with battery optimization | Jun 15, 2011 | Issued |
Array
(
[id] => 7722230
[patent_doc_number] => 20120011565
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-01-12
[patent_title] => 'SYSTEM AND METHOD FOR STORING AND PROVIDING ACCESS TO SECURED INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 13/161991
[patent_app_country] => US
[patent_app_date] => 2011-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8933
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0011/20120011565.pdf
[firstpage_image] =>[orig_patent_app_number] => 13161991
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/161991 | SYSTEM AND METHOD FOR STORING AND PROVIDING ACCESS TO SECURED INFORMATION | Jun 15, 2011 | Abandoned |
Array
(
[id] => 8525128
[patent_doc_number] => 20120324536
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-12-20
[patent_title] => 'VIRTUAL EXTENDED NETWORK'
[patent_app_type] => utility
[patent_app_number] => 13/162114
[patent_app_country] => US
[patent_app_date] => 2011-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 10637
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13162114
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/162114 | Virtual extended network | Jun 15, 2011 | Issued |
Array
(
[id] => 9714769
[patent_doc_number] => 08839373
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-16
[patent_title] => 'Method and apparatus for relay node management and authorization'
[patent_app_type] => utility
[patent_app_number] => 13/162332
[patent_app_country] => US
[patent_app_date] => 2011-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 10718
[patent_no_of_claims] => 43
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13162332
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/162332 | Method and apparatus for relay node management and authorization | Jun 15, 2011 | Issued |