Tan N Tran
Examiner (ID: 5358)
Most Active Art Unit | 2826 |
Art Unit(s) | 2826, 2812 |
Total Applications | 1899 |
Issued Applications | 1599 |
Pending Applications | 80 |
Abandoned Applications | 200 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 17943173
[patent_doc_number] => 11477648
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-18
[patent_title] => V2X communication device autentication token in discovery response message and data communication method thereof
[patent_app_type] => utility
[patent_app_number] => 16/611062
[patent_app_country] => US
[patent_app_date] => 2017-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 21
[patent_no_of_words] => 8497
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16611062
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/611062 | V2X communication device autentication token in discovery response message and data communication method thereof | Apr 20, 2017 | Issued |
Array
(
[id] => 15262591
[patent_doc_number] => 20190380029
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-12
[patent_title] => Method For Securely Controlling Smart Home, And Terminal Device
[patent_app_type] => utility
[patent_app_number] => 16/463514
[patent_app_country] => US
[patent_app_date] => 2017-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6853
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -11
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16463514
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/463514 | Method for securely controlling smart home, and terminal device | Mar 29, 2017 | Issued |
Array
(
[id] => 11733870
[patent_doc_number] => 20170195313
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-06
[patent_title] => 'Method and System for Provisioning an Electronic Device'
[patent_app_type] => utility
[patent_app_number] => 15/465519
[patent_app_country] => US
[patent_app_date] => 2017-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 19410
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15465519
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/465519 | Method and system for encrypting network credentials using password provided by remote server to provisioning device | Mar 20, 2017 | Issued |
Array
(
[id] => 15091165
[patent_doc_number] => 20190340394
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-07
[patent_title] => SYSTEM, METHOD AND COMPUTER-ACCESSIBLE MEDIUM FOR SATISFIABILITY ATTACK RESISTANT LOGIC LOCKING
[patent_app_type] => utility
[patent_app_number] => 16/087911
[patent_app_country] => US
[patent_app_date] => 2017-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7029
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16087911
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/087911 | System, method and computer-accessible medium for satisfiability attack resistant logic locking | Mar 19, 2017 | Issued |
Array
(
[id] => 14922137
[patent_doc_number] => 10432404
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-01
[patent_title] => Remote control of secure installations
[patent_app_type] => utility
[patent_app_number] => 15/458044
[patent_app_country] => US
[patent_app_date] => 2017-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 4454
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15458044
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/458044 | Remote control of secure installations | Mar 13, 2017 | Issued |
Array
(
[id] => 11709370
[patent_doc_number] => 20170177869
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-22
[patent_title] => 'CONFIRMING A MALWARE INFECTION ON A CLIENT DEVICE USING A REMOTE ACCESS CONNECTION TOOL, TO IDENTIFY A MALICIOUS FILE BASED ON FUZZ HASHES'
[patent_app_type] => utility
[patent_app_number] => 15/454676
[patent_app_country] => US
[patent_app_date] => 2017-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7454
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15454676
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/454676 | Confirming a malware infection on a client device using a remote access connection tool, to identify a malicious file based on fuzz hashes | Mar 8, 2017 | Issued |
Array
(
[id] => 12229193
[patent_doc_number] => 09916438
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-13
[patent_title] => 'Determining whether continuous byte data of inputted data includes credential'
[patent_app_type] => utility
[patent_app_number] => 15/445463
[patent_app_country] => US
[patent_app_date] => 2017-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5523
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 303
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15445463
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/445463 | Determining whether continuous byte data of inputted data includes credential | Feb 27, 2017 | Issued |
Array
(
[id] => 13203353
[patent_doc_number] => 10116606
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-30
[patent_title] => Determining a number of users allowed to access message based on message objective
[patent_app_type] => utility
[patent_app_number] => 15/434883
[patent_app_country] => US
[patent_app_date] => 2017-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 11296
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 254
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15434883
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/434883 | Determining a number of users allowed to access message based on message objective | Feb 15, 2017 | Issued |
Array
(
[id] => 13365817
[patent_doc_number] => 20180234449
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-16
[patent_title] => Generating a Virtual Database to Test Data Security of a Real Database
[patent_app_type] => utility
[patent_app_number] => 15/433067
[patent_app_country] => US
[patent_app_date] => 2017-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8167
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -11
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15433067
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/433067 | Generating a virtual database to test data security of a real database | Feb 14, 2017 | Issued |
Array
(
[id] => 12096353
[patent_doc_number] => 20170353446
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-07
[patent_title] => 'VIRTUAL ELECTRONIC SECURITY PERIMETER USING DETERMINISTIC NETWORKING'
[patent_app_type] => utility
[patent_app_number] => 15/430617
[patent_app_country] => US
[patent_app_date] => 2017-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4853
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15430617
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/430617 | Virtual electronic security perimeter using deterministic networking | Feb 12, 2017 | Issued |
Array
(
[id] => 11854067
[patent_doc_number] => 20170228559
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-10
[patent_title] => 'SECURELY STORING AND DISTRIBUTING SENSITIVE DATA IN A CLOUD-BASED APPLICATION'
[patent_app_type] => utility
[patent_app_number] => 15/429620
[patent_app_country] => US
[patent_app_date] => 2017-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 8104
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15429620
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/429620 | Securely storing and distributing sensitive data in a cloud-based application | Feb 9, 2017 | Issued |
Array
(
[id] => 13864357
[patent_doc_number] => 10193921
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-29
[patent_title] => Malware detection and prevention system
[patent_app_type] => utility
[patent_app_number] => 15/429005
[patent_app_country] => US
[patent_app_date] => 2017-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6624
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15429005
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/429005 | Malware detection and prevention system | Feb 8, 2017 | Issued |
Array
(
[id] => 13347791
[patent_doc_number] => 20180225435
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-09
[patent_title] => Portable device with biometric activation
[patent_app_type] => utility
[patent_app_number] => 15/427784
[patent_app_country] => US
[patent_app_date] => 2017-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6548
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15427784
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/427784 | Portable device with biometric activation | Feb 7, 2017 | Abandoned |
Array
(
[id] => 11653919
[patent_doc_number] => 20170149824
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-25
[patent_title] => 'IDENTIFYING PHISHING COMMUNICATIONS USING TEMPLATES'
[patent_app_type] => utility
[patent_app_number] => 15/416632
[patent_app_country] => US
[patent_app_date] => 2017-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6170
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15416632
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/416632 | Identifying phishing communications using templates | Jan 25, 2017 | Issued |
Array
(
[id] => 14825967
[patent_doc_number] => 10409993
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-09-10
[patent_title] => Method for translating product banners
[patent_app_type] => utility
[patent_app_number] => 15/405314
[patent_app_country] => US
[patent_app_date] => 2017-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 11734
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15405314
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/405314 | Method for translating product banners | Jan 12, 2017 | Issued |
Array
(
[id] => 17108780
[patent_doc_number] => 11129016
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-21
[patent_title] => Method and device for networking between devices
[patent_app_type] => utility
[patent_app_number] => 16/327227
[patent_app_country] => US
[patent_app_date] => 2016-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 4230
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16327227
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/327227 | Method and device for networking between devices | Dec 29, 2016 | Issued |
Array
(
[id] => 12776410
[patent_doc_number] => 20180150638
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-31
[patent_title] => DETECTION OF SECURITY INCIDENTS THROUGH SIMULATIONS
[patent_app_type] => utility
[patent_app_number] => 15/361288
[patent_app_country] => US
[patent_app_date] => 2016-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7733
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15361288
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/361288 | Detection of security incidents through simulations | Nov 24, 2016 | Issued |
Array
(
[id] => 15793891
[patent_doc_number] => 10630682
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-04-21
[patent_title] => Lightweight authentication protocol using device tokens
[patent_app_type] => utility
[patent_app_number] => 15/360871
[patent_app_country] => US
[patent_app_date] => 2016-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15015
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15360871
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/360871 | Lightweight authentication protocol using device tokens | Nov 22, 2016 | Issued |
Array
(
[id] => 13230863
[patent_doc_number] => 10129223
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-11-13
[patent_title] => Lightweight encrypted communication protocol
[patent_app_type] => utility
[patent_app_number] => 15/360862
[patent_app_country] => US
[patent_app_date] => 2016-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15011
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15360862
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/360862 | Lightweight encrypted communication protocol | Nov 22, 2016 | Issued |
Array
(
[id] => 12735544
[patent_doc_number] => 20180137015
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-17
[patent_title] => REPLICATION OF DATA IN DISTRIBUTED ENVIRONMENTS
[patent_app_type] => utility
[patent_app_number] => 15/350110
[patent_app_country] => US
[patent_app_date] => 2016-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4734
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15350110
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/350110 | Filtered replication of data in distributed system of data centers | Nov 13, 2016 | Issued |