Tan N Tran
Examiner (ID: 5358)
Most Active Art Unit | 2826 |
Art Unit(s) | 2826, 2812 |
Total Applications | 1899 |
Issued Applications | 1599 |
Pending Applications | 80 |
Abandoned Applications | 200 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 13133663
[patent_doc_number] => 10084782
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-25
[patent_title] => Authenticator centralization and protection
[patent_app_type] => utility
[patent_app_number] => 15/269287
[patent_app_country] => US
[patent_app_date] => 2016-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 16851
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15269287
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/269287 | Authenticator centralization and protection | Sep 18, 2016 | Issued |
Array
(
[id] => 12103171
[patent_doc_number] => 09860280
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-01-02
[patent_title] => 'Cognitive authentication with employee onboarding'
[patent_app_type] => utility
[patent_app_number] => 15/269330
[patent_app_country] => US
[patent_app_date] => 2016-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6059
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15269330
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/269330 | Cognitive authentication with employee onboarding | Sep 18, 2016 | Issued |
Array
(
[id] => 14642979
[patent_doc_number] => 10366234
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-30
[patent_title] => Identifying web shell applications through file analysis
[patent_app_type] => utility
[patent_app_number] => 15/268523
[patent_app_country] => US
[patent_app_date] => 2016-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5940
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15268523
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/268523 | Identifying web shell applications through file analysis | Sep 15, 2016 | Issued |
Array
(
[id] => 11854039
[patent_doc_number] => 20170228531
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-10
[patent_title] => 'PASSWORD ENTRY THROUGH TEMPORALLY-UNIQUE TAP SEQUENCE'
[patent_app_type] => utility
[patent_app_number] => 15/264743
[patent_app_country] => US
[patent_app_date] => 2016-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3312
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15264743
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/264743 | PASSWORD ENTRY THROUGH TEMPORALLY-UNIQUE TAP SEQUENCE | Sep 13, 2016 | Abandoned |
Array
(
[id] => 14787739
[patent_doc_number] => 20190268767
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-29
[patent_title] => A METHOD FOR SECURE LINK LAYER CONNECTION OVER WIRELESS LOCAL AREA NETWORKS
[patent_app_type] => utility
[patent_app_number] => 16/332512
[patent_app_country] => US
[patent_app_date] => 2016-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10864
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -25
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16332512
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/332512 | Tunneling data traffic and signaling over secure etls over wireless local area networks | Sep 11, 2016 | Issued |
Array
(
[id] => 13249393
[patent_doc_number] => 10137368
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-27
[patent_title] => Billing a subset of mobile devices associated with an online gaming environment rendered on the subset of mobile devices
[patent_app_type] => utility
[patent_app_number] => 15/237888
[patent_app_country] => US
[patent_app_date] => 2016-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 9251
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15237888
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/237888 | Billing a subset of mobile devices associated with an online gaming environment rendered on the subset of mobile devices | Aug 15, 2016 | Issued |
Array
(
[id] => 14740693
[patent_doc_number] => 10389763
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-20
[patent_title] => Content disposition system and method for processing message content in a distributed environment
[patent_app_type] => utility
[patent_app_number] => 15/231367
[patent_app_country] => US
[patent_app_date] => 2016-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 19
[patent_no_of_words] => 16167
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15231367
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/231367 | Content disposition system and method for processing message content in a distributed environment | Aug 7, 2016 | Issued |
Array
(
[id] => 11745942
[patent_doc_number] => 20170200015
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-13
[patent_title] => 'SYSTEM AND METHOD TO REDUCE INAPPROPRIATE EMAIL AND ONLINE BEHAVIOR'
[patent_app_type] => utility
[patent_app_number] => 15/207059
[patent_app_country] => US
[patent_app_date] => 2016-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13852
[patent_no_of_claims] => 43
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15207059
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/207059 | System and method to reduce inappropriate email and online behavior | Jul 10, 2016 | Issued |
Array
(
[id] => 14269891
[patent_doc_number] => 10284525
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-07
[patent_title] => Cross-domain data-gate for secure transmission of data over publicly shared datalinks
[patent_app_type] => utility
[patent_app_number] => 15/206724
[patent_app_country] => US
[patent_app_date] => 2016-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4823
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15206724
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/206724 | Cross-domain data-gate for secure transmission of data over publicly shared datalinks | Jul 10, 2016 | Issued |
Array
(
[id] => 11109781
[patent_doc_number] => 20160306751
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-20
[patent_title] => 'DATA STORAGE SYSTEMS AND METHODS'
[patent_app_type] => utility
[patent_app_number] => 15/197473
[patent_app_country] => US
[patent_app_date] => 2016-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 57893
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15197473
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/197473 | Token-based encryption determination process | Jun 28, 2016 | Issued |
Array
(
[id] => 11926557
[patent_doc_number] => 09794153
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-17
[patent_title] => 'Determining a risk level for server health check processing'
[patent_app_type] => utility
[patent_app_number] => 15/196834
[patent_app_country] => US
[patent_app_date] => 2016-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 11135
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15196834
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/196834 | Determining a risk level for server health check processing | Jun 28, 2016 | Issued |
Array
(
[id] => 11110015
[patent_doc_number] => 20160306984
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-20
[patent_title] => 'DATA STORAGE SYSTEMS AND METHODS'
[patent_app_type] => utility
[patent_app_number] => 15/195681
[patent_app_country] => US
[patent_app_date] => 2016-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 57884
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15195681
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/195681 | Token-based encryption rule generation process | Jun 27, 2016 | Issued |
Array
(
[id] => 11109851
[patent_doc_number] => 20160306821
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-20
[patent_title] => 'SHARED INTERNET STORAGE RESOURCE, USER INTERFACE SYSTEM, AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/194399
[patent_app_country] => US
[patent_app_date] => 2016-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 15072
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15194399
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/194399 | SHARED INTERNET STORAGE RESOURCE, USER INTERFACE SYSTEM, AND METHOD | Jun 26, 2016 | Abandoned |
Array
(
[id] => 11511110
[patent_doc_number] => 09602283
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-03-21
[patent_title] => 'Data encryption in a de-duplicating storage in a multi-tenant environment'
[patent_app_type] => utility
[patent_app_number] => 15/187434
[patent_app_country] => US
[patent_app_date] => 2016-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 16
[patent_no_of_words] => 8510
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15187434
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/187434 | Data encryption in a de-duplicating storage in a multi-tenant environment | Jun 19, 2016 | Issued |
Array
(
[id] => 11338811
[patent_doc_number] => 20160364566
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'TECHNOLOGIES FOR MULTI-FACTOR SECURITY ANALYSIS AND RUNTIME CONTROL'
[patent_app_type] => utility
[patent_app_number] => 15/166952
[patent_app_country] => US
[patent_app_date] => 2016-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 13702
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15166952
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/166952 | Technologies for multi-factor security analysis and runtime control | May 26, 2016 | Issued |
Array
(
[id] => 11044641
[patent_doc_number] => 20160241598
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-18
[patent_title] => 'Method to Modify Android Application Life Cycle to Control Its Execution in a Containerized Workspace Environment'
[patent_app_type] => utility
[patent_app_number] => 15/140404
[patent_app_country] => US
[patent_app_date] => 2016-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7560
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15140404
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/140404 | Method to modify android application life cycle to control its execution in a containerized workspace environment | Apr 26, 2016 | Issued |
Array
(
[id] => 11117487
[patent_doc_number] => 20160314461
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-27
[patent_title] => 'SYSTEMS AND METHODS FOR CREATING FINGERPRINTS OF ENCRYPTION DEVICES'
[patent_app_type] => utility
[patent_app_number] => 15/139034
[patent_app_country] => US
[patent_app_date] => 2016-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 20809
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15139034
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/139034 | Creating fingerprints of encryption devices for compromise mitigation | Apr 25, 2016 | Issued |
Array
(
[id] => 16996848
[patent_doc_number] => 20210235269
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-29
[patent_title] => NETWORK AUTHORIZATION ASSISTANCE
[patent_app_type] => utility
[patent_app_number] => 16/094975
[patent_app_country] => US
[patent_app_date] => 2016-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8840
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -23
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16094975
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/094975 | NETWORK AUTHORIZATION ASSISTANCE | Apr 18, 2016 | Abandoned |
Array
(
[id] => 11998493
[patent_doc_number] => 20170302648
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-19
[patent_title] => 'Web Service Picture Passwords'
[patent_app_type] => utility
[patent_app_number] => 15/099380
[patent_app_country] => US
[patent_app_date] => 2016-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12667
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15099380
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/099380 | Generating web service picture passwords with user-specific cypher keys | Apr 13, 2016 | Issued |
Array
(
[id] => 11996532
[patent_doc_number] => 20170300688
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-19
[patent_title] => 'System and Method for Detecting and Preventing Execution of Malicious Instructions within a Processor of a Computing Device'
[patent_app_type] => utility
[patent_app_number] => 15/099494
[patent_app_country] => US
[patent_app_date] => 2016-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 3052
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15099494
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/099494 | Preventing execution of malicious instructions based on address specified in a branch instruction | Apr 13, 2016 | Issued |