Tan N Tran
Examiner (ID: 5358)
Most Active Art Unit | 2826 |
Art Unit(s) | 2826, 2812 |
Total Applications | 1899 |
Issued Applications | 1599 |
Pending Applications | 80 |
Abandoned Applications | 200 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 11631932
[patent_doc_number] => 20170142121
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-18
[patent_title] => 'METHOD AND APPARATUS FOR DOWNLOADING PROFILE ON EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD OF TERMINAL'
[patent_app_type] => utility
[patent_app_number] => 15/350963
[patent_app_country] => US
[patent_app_date] => 2016-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10967
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15350963
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/350963 | Method and apparatus for downloading profile on embedded universal integrated circuit card of terminal | Nov 13, 2016 | Issued |
Array
(
[id] => 11938852
[patent_doc_number] => 20170243002
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-24
[patent_title] => 'DETECTING RETURN-ORIENTED PROGRAMMING PAYLOADS BY EVALUATING DATA FOR A GADGET ADDRESS SPACE ADDRESS AND DETERMINING WHETHER OPERATIONS ASSOCIATED WITH INSTRUCTIONS BEGINNING AT THE ADDRESS INDICATE A RETURN-ORIENTED PROGRAMMING PAYLOAD'
[patent_app_type] => utility
[patent_app_number] => 15/349445
[patent_app_country] => US
[patent_app_date] => 2016-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4488
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15349445
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/349445 | Detecting return-oriented programming payloads by evaluating data for a gadget address space address and determining whether operations associated with instructions beginning at the address indicate a return-oriented programming payload | Nov 10, 2016 | Issued |
Array
(
[id] => 13021205
[patent_doc_number] => 10033732
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-07-24
[patent_title] => Systems and methods for detecting cloning of security tokens
[patent_app_type] => utility
[patent_app_number] => 15/346752
[patent_app_country] => US
[patent_app_date] => 2016-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9563
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15346752
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/346752 | Systems and methods for detecting cloning of security tokens | Nov 8, 2016 | Issued |
Array
(
[id] => 12719086
[patent_doc_number] => 20180131529
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-10
[patent_title] => ENCODING TERNARY DATA FOR PUF ENVIRONMENTS
[patent_app_type] => utility
[patent_app_number] => 15/347721
[patent_app_country] => US
[patent_app_date] => 2016-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9241
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15347721
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/347721 | Encoding ternary data for PUF environments | Nov 8, 2016 | Issued |
Array
(
[id] => 12713962
[patent_doc_number] => 20180129820
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-10
[patent_title] => SECURE MANAGEMENT OF USER ADDRESSES IN NETWORK SERVICE
[patent_app_type] => utility
[patent_app_number] => 15/345808
[patent_app_country] => US
[patent_app_date] => 2016-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8842
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15345808
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/345808 | Secure management of user addresses in network service | Nov 7, 2016 | Issued |
Array
(
[id] => 13216727
[patent_doc_number] => 10122744
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-06
[patent_title] => Security violation assessment tool to compare new violation with existing violation
[patent_app_type] => utility
[patent_app_number] => 15/345072
[patent_app_country] => US
[patent_app_date] => 2016-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 11952
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 381
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15345072
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/345072 | Security violation assessment tool to compare new violation with existing violation | Nov 6, 2016 | Issued |
Array
(
[id] => 11622239
[patent_doc_number] => 20170132426
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-11
[patent_title] => 'CONTROL SYSTEM OF THE IMAGE DATA STORED IN THE MEMORY CARD'
[patent_app_type] => utility
[patent_app_number] => 15/341212
[patent_app_country] => US
[patent_app_date] => 2016-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2247
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15341212
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/341212 | CONTROL SYSTEM OF THE IMAGE DATA STORED IN THE MEMORY CARD | Nov 1, 2016 | Abandoned |
Array
(
[id] => 11996538
[patent_doc_number] => 20170300694
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-19
[patent_title] => 'SYSTEM AND METHOD FOR MAINTAINING SECURITY TAGS AND REFERENCE COUNTS FOR OBJECTS IN COMPUTER MEMORY'
[patent_app_type] => utility
[patent_app_number] => 15/338295
[patent_app_country] => US
[patent_app_date] => 2016-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6869
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15338295
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/338295 | System and method for maintaining security tags and reference counts for objects in computer memory | Oct 27, 2016 | Issued |
Array
(
[id] => 12696778
[patent_doc_number] => 20180124092
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-03
[patent_title] => IDENTIFYING A VULNERABILITY OF AN ASSET OF A NETWORK INFRASTRUCTURE TO MITIGATE
[patent_app_type] => utility
[patent_app_number] => 15/338192
[patent_app_country] => US
[patent_app_date] => 2016-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9528
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15338192
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/338192 | Identifying a vulnerability of an asset of a network infrastructure to mitigate | Oct 27, 2016 | Issued |
Array
(
[id] => 11447680
[patent_doc_number] => 20170048701
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'ID-BASED CONTROL UNIT-KEY FOB PAIRING'
[patent_app_type] => utility
[patent_app_number] => 15/337170
[patent_app_country] => US
[patent_app_date] => 2016-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3286
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15337170
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/337170 | ID-based control unit-key fob pairing | Oct 27, 2016 | Issued |
Array
(
[id] => 12671122
[patent_doc_number] => 20180115540
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-26
[patent_title] => REAL-TIME ELECTRONIC EVENT PROCESSING AND IDENTITY VALIDATION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/335009
[patent_app_country] => US
[patent_app_date] => 2016-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12967
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15335009
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/335009 | System for processing an even request by determining a matching user profile based on user identifying information | Oct 25, 2016 | Issued |
Array
(
[id] => 11609372
[patent_doc_number] => 20170126678
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-04
[patent_title] => 'AUTHENTICATION APPARATUS AND METHOD FOR WIRELESS MESH NETWORK AND COMPUTER-READABLE RECORDING MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 15/335090
[patent_app_country] => US
[patent_app_date] => 2016-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 13156
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15335090
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/335090 | Allowing beacon device to access mesh network using authentication key | Oct 25, 2016 | Issued |
Array
(
[id] => 11998281
[patent_doc_number] => 20170302436
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-19
[patent_title] => 'SECURE STORAGE ON EXTERNAL MEMORY'
[patent_app_type] => utility
[patent_app_number] => 15/298250
[patent_app_country] => US
[patent_app_date] => 2016-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8654
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15298250
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/298250 | Cryptographic operation by applying sub-keys to multiplication units in accordance with galois-field arithmetic | Oct 19, 2016 | Issued |
Array
(
[id] => 12666604
[patent_doc_number] => 20180114034
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-26
[patent_title] => Container Based Device Usage Sessions
[patent_app_type] => utility
[patent_app_number] => 15/299107
[patent_app_country] => US
[patent_app_date] => 2016-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10074
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15299107
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/299107 | Selective container use for device usage sessions | Oct 19, 2016 | Issued |
Array
(
[id] => 14270017
[patent_doc_number] => 10284588
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-07
[patent_title] => Dynamic selection of security posture for devices in a network using risk scoring
[patent_app_type] => utility
[patent_app_number] => 15/276808
[patent_app_country] => US
[patent_app_date] => 2016-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4834
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15276808
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/276808 | Dynamic selection of security posture for devices in a network using risk scoring | Sep 26, 2016 | Issued |
Array
(
[id] => 12598953
[patent_doc_number] => 20180091481
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-29
[patent_title] => METHOD AND SYSTEM FOR PROTECTING DATA FLOW BETWEEN PAIRS OF BRANCH NODES IN A SOFTWARE-DEFINED WIDE-AREA NETWORK
[patent_app_type] => utility
[patent_app_number] => 15/276559
[patent_app_country] => US
[patent_app_date] => 2016-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4861
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15276559
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/276559 | Method and system for protecting data flow between pairs of branch nodes in a software-defined wide-area network | Sep 25, 2016 | Issued |
Array
(
[id] => 15987071
[patent_doc_number] => 10673880
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-06-02
[patent_title] => Anomaly detection to identify security threats
[patent_app_type] => utility
[patent_app_number] => 15/276647
[patent_app_country] => US
[patent_app_date] => 2016-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 32
[patent_figures_cnt] => 36
[patent_no_of_words] => 34648
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15276647
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/276647 | Anomaly detection to identify security threats | Sep 25, 2016 | Issued |
Array
(
[id] => 11531512
[patent_doc_number] => 20170091490
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'Methods And Systems For Displaying Private Information'
[patent_app_type] => utility
[patent_app_number] => 15/276311
[patent_app_country] => US
[patent_app_date] => 2016-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6578
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15276311
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/276311 | Methods And Systems For Displaying Private Information | Sep 25, 2016 | Abandoned |
Array
(
[id] => 14861367
[patent_doc_number] => 10419431
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-17
[patent_title] => Preventing cross-site request forgery using environment fingerprints of a client device
[patent_app_type] => utility
[patent_app_number] => 15/271951
[patent_app_country] => US
[patent_app_date] => 2016-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7781
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15271951
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/271951 | Preventing cross-site request forgery using environment fingerprints of a client device | Sep 20, 2016 | Issued |
Array
(
[id] => 12264576
[patent_doc_number] => 20180083772
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-22
[patent_title] => 'PERPETUAL ENCRYPTION SYSTEM, METHOD, AND SOFTWARE PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 15/270861
[patent_app_country] => US
[patent_app_date] => 2016-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4487
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15270861
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/270861 | PERPETUAL ENCRYPTION SYSTEM, METHOD, AND SOFTWARE PROGRAM PRODUCT | Sep 19, 2016 | Abandoned |