Search

Ha Tran Nguyen

Examiner (ID: 13720)

Most Active Art Unit
2812
Art Unit(s)
2812, 2723, 2616, 2858, 2829, OPQA
Total Applications
630
Issued Applications
484
Pending Applications
26
Abandoned Applications
120

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 8687091 [patent_doc_number] => 20130055375 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-02-28 [patent_title] => 'Method and Protection System for Mitigating Slow HTTP Attacks Using Rate and Time Monitoring' [patent_app_type] => utility [patent_app_number] => 13/355734 [patent_app_country] => US [patent_app_date] => 2012-01-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5768 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13355734 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/355734
Method and protection system for mitigating slow HTTP attacks using rate and time monitoring Jan 22, 2012 Issued
Array ( [id] => 9124208 [patent_doc_number] => 20130291130 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-10-31 [patent_title] => 'Protection of Memory Field Using Illegal Values' [patent_app_type] => utility [patent_app_number] => 13/978988 [patent_app_country] => US [patent_app_date] => 2011-12-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3605 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13978988 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/978988
Protection of Memory Field Using Illegal Values Dec 5, 2011 Abandoned
Array ( [id] => 10052738 [patent_doc_number] => 09092619 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-07-28 [patent_title] => 'Data processing apparatus' [patent_app_type] => utility [patent_app_number] => 13/310441 [patent_app_country] => US [patent_app_date] => 2011-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 28 [patent_no_of_words] => 9374 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 229 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13310441 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/310441
Data processing apparatus Dec 1, 2011 Issued
Array ( [id] => 8832011 [patent_doc_number] => 20130133056 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-05-23 [patent_title] => 'Single login Identifier Used Across Multiple Shopping Sites' [patent_app_type] => utility [patent_app_number] => 13/301508 [patent_app_country] => US [patent_app_date] => 2011-11-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7780 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13301508 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/301508
Single login Identifier Used Across Multiple Shopping Sites Nov 20, 2011 Abandoned
Array ( [id] => 8189637 [patent_doc_number] => 20120117610 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-05-10 [patent_title] => 'RUNTIME ADAPTABLE SECURITY PROCESSOR' [patent_app_type] => utility [patent_app_number] => 13/225305 [patent_app_country] => US [patent_app_date] => 2011-09-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 75 [patent_figures_cnt] => 75 [patent_no_of_words] => 46110 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0117/20120117610.pdf [firstpage_image] =>[orig_patent_app_number] => 13225305 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/225305
RUNTIME ADAPTABLE SECURITY PROCESSOR Sep 1, 2011 Abandoned
Array ( [id] => 9465702 [patent_doc_number] => 20140130129 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-05-08 [patent_title] => 'COUNT VALUES TO DETECT DISCONNECTED CIRCUIT' [patent_app_type] => utility [patent_app_number] => 14/127595 [patent_app_country] => US [patent_app_date] => 2011-08-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5813 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14127595 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/127595
COUNT VALUES TO DETECT DISCONNECTED CIRCUIT Aug 8, 2011 Abandoned
Array ( [id] => 10144332 [patent_doc_number] => 09177141 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-03 [patent_title] => 'Active defense method on the basis of cloud security' [patent_app_type] => utility [patent_app_number] => 13/817577 [patent_app_country] => US [patent_app_date] => 2011-08-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 5069 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 297 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13817577 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/817577
Active defense method on the basis of cloud security Aug 7, 2011 Issued
Array ( [id] => 8899762 [patent_doc_number] => 08479296 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-07-02 [patent_title] => 'System and method for detecting unknown malware' [patent_app_type] => utility [patent_app_number] => 13/190601 [patent_app_country] => US [patent_app_date] => 2011-07-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 8094 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 126 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13190601 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/190601
System and method for detecting unknown malware Jul 25, 2011 Issued
Array ( [id] => 8605651 [patent_doc_number] => 20130010963 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-01-10 [patent_title] => 'MULTIPLICATIVE SPLITS TO PROTECT CIPHER KEYS' [patent_app_type] => utility [patent_app_number] => 13/178410 [patent_app_country] => US [patent_app_date] => 2011-07-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5415 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13178410 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/178410
Multiplicative splits to protect cipher keys Jul 6, 2011 Issued
Array ( [id] => 8589074 [patent_doc_number] => 20130007895 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-01-03 [patent_title] => 'MANAGING ACCESS CONTROL FOR A SCREEN SHARING SESSION' [patent_app_type] => utility [patent_app_number] => 13/171802 [patent_app_country] => US [patent_app_date] => 2011-06-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6745 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13171802 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/171802
MANAGING ACCESS CONTROL FOR A SCREEN SHARING SESSION Jun 28, 2011 Abandoned
Array ( [id] => 9666237 [patent_doc_number] => 08813248 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-08-19 [patent_title] => 'System and method for authenticating a user' [patent_app_type] => utility [patent_app_number] => 13/170681 [patent_app_country] => US [patent_app_date] => 2011-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4161 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 247 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13170681 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/170681
System and method for authenticating a user Jun 27, 2011 Issued
Array ( [id] => 11803210 [patent_doc_number] => 09544140 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-01-10 [patent_title] => 'Multi-level key hierarchy for securing cloud-based data sets' [patent_app_type] => utility [patent_app_number] => 13/171317 [patent_app_country] => US [patent_app_date] => 2011-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 9221 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 217 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13171317 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/171317
Multi-level key hierarchy for securing cloud-based data sets Jun 27, 2011 Issued
Array ( [id] => 10653173 [patent_doc_number] => 09369448 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-06-14 [patent_title] => 'Network security parameter generation and distribution' [patent_app_type] => utility [patent_app_number] => 13/170979 [patent_app_country] => US [patent_app_date] => 2011-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 8771 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 151 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13170979 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/170979
Network security parameter generation and distribution Jun 27, 2011 Issued
Array ( [id] => 8267371 [patent_doc_number] => 20120166793 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-28 [patent_title] => 'APPARATUS AND METHOD FOR SHARING AND USING COMMENT ON CONTENT IN DISTRIBUTED NETWORK SYSTEM' [patent_app_type] => utility [patent_app_number] => 13/169481 [patent_app_country] => US [patent_app_date] => 2011-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7489 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13169481 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/169481
APPARATUS AND METHOD FOR SHARING AND USING COMMENT ON CONTENT IN DISTRIBUTED NETWORK SYSTEM Jun 26, 2011 Abandoned
Array ( [id] => 8568992 [patent_doc_number] => 20120331563 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-12-27 [patent_title] => 'Retrieval of Data Across Multiple Partitions of a Storage Device Using Digital Signatures' [patent_app_type] => utility [patent_app_number] => 13/168932 [patent_app_country] => US [patent_app_date] => 2011-06-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7187 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13168932 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/168932
Retrieval of data across multiple partitions of a storage device using digital signatures Jun 23, 2011 Issued
Array ( [id] => 8525171 [patent_doc_number] => 20120324579 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-12-20 [patent_title] => 'CLOUD MALWARE FALSE POSITIVE RECOVERY' [patent_app_type] => utility [patent_app_number] => 13/162211 [patent_app_country] => US [patent_app_date] => 2011-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9351 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13162211 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/162211
Cloud malware false positive recovery Jun 15, 2011 Issued
Array ( [id] => 10117319 [patent_doc_number] => 09152202 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-06 [patent_title] => 'Mobile device operations with battery optimization' [patent_app_type] => utility [patent_app_number] => 13/162133 [patent_app_country] => US [patent_app_date] => 2011-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 11 [patent_no_of_words] => 10443 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 116 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13162133 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/162133
Mobile device operations with battery optimization Jun 15, 2011 Issued
Array ( [id] => 7722230 [patent_doc_number] => 20120011565 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-01-12 [patent_title] => 'SYSTEM AND METHOD FOR STORING AND PROVIDING ACCESS TO SECURED INFORMATION' [patent_app_type] => utility [patent_app_number] => 13/161991 [patent_app_country] => US [patent_app_date] => 2011-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 8933 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0011/20120011565.pdf [firstpage_image] =>[orig_patent_app_number] => 13161991 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/161991
SYSTEM AND METHOD FOR STORING AND PROVIDING ACCESS TO SECURED INFORMATION Jun 15, 2011 Abandoned
Array ( [id] => 8525128 [patent_doc_number] => 20120324536 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-12-20 [patent_title] => 'VIRTUAL EXTENDED NETWORK' [patent_app_type] => utility [patent_app_number] => 13/162114 [patent_app_country] => US [patent_app_date] => 2011-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 10637 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13162114 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/162114
Virtual extended network Jun 15, 2011 Issued
Array ( [id] => 9714769 [patent_doc_number] => 08839373 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-09-16 [patent_title] => 'Method and apparatus for relay node management and authorization' [patent_app_type] => utility [patent_app_number] => 13/162332 [patent_app_country] => US [patent_app_date] => 2011-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 10718 [patent_no_of_claims] => 43 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 81 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13162332 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/162332
Method and apparatus for relay node management and authorization Jun 15, 2011 Issued
Menu