Tan N Tran
Examiner (ID: 5358)
Most Active Art Unit | 2826 |
Art Unit(s) | 2826, 2812 |
Total Applications | 1899 |
Issued Applications | 1599 |
Pending Applications | 80 |
Abandoned Applications | 200 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 11000996
[patent_doc_number] => 20160197943
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-07
[patent_title] => 'System and Method for Profiling System Attacker'
[patent_app_type] => utility
[patent_app_number] => 14/749442
[patent_app_country] => US
[patent_app_date] => 2015-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3522
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14749442
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/749442 | System and Method for Profiling System Attacker | Jun 23, 2015 | Abandoned |
Array
(
[id] => 12215852
[patent_doc_number] => 09912678
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-06
[patent_title] => 'Techniques for automatically mitigating denial of service attacks via attack pattern matching'
[patent_app_type] => utility
[patent_app_number] => 14/748571
[patent_app_country] => US
[patent_app_date] => 2015-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8198
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14748571
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/748571 | Techniques for automatically mitigating denial of service attacks via attack pattern matching | Jun 23, 2015 | Issued |
Array
(
[id] => 11726771
[patent_doc_number] => 09699652
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-04
[patent_title] => 'Comparing generated keys using non-secure channels'
[patent_app_type] => utility
[patent_app_number] => 14/748277
[patent_app_country] => US
[patent_app_date] => 2015-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2352
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 279
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14748277
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/748277 | Comparing generated keys using non-secure channels | Jun 23, 2015 | Issued |
Array
(
[id] => 10488027
[patent_doc_number] => 20150373048
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-24
[patent_title] => 'Enterprise Mobile Notification Solution'
[patent_app_type] => utility
[patent_app_number] => 14/749510
[patent_app_country] => US
[patent_app_date] => 2015-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8900
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14749510
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/749510 | Enterprise Mobile Notification Solution | Jun 23, 2015 | Abandoned |
Array
(
[id] => 12556815
[patent_doc_number] => 10015172
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-03
[patent_title] => Creation of link to user profile from user information prior to user logon to a virtual desktop environment
[patent_app_type] => utility
[patent_app_number] => 14/749305
[patent_app_country] => US
[patent_app_date] => 2015-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4949
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14749305
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/749305 | Creation of link to user profile from user information prior to user logon to a virtual desktop environment | Jun 23, 2015 | Issued |
Array
(
[id] => 11741322
[patent_doc_number] => 09705924
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-11
[patent_title] => 'Determining a number of users allowed to access message based on message objective'
[patent_app_type] => utility
[patent_app_number] => 14/749271
[patent_app_country] => US
[patent_app_date] => 2015-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 11829
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 291
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14749271
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/749271 | Determining a number of users allowed to access message based on message objective | Jun 23, 2015 | Issued |
Array
(
[id] => 12203475
[patent_doc_number] => 09906558
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-27
[patent_title] => 'User managed access scope specific obligation policy for authorization'
[patent_app_type] => utility
[patent_app_number] => 14/748300
[patent_app_country] => US
[patent_app_date] => 2015-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 6433
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14748300
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/748300 | User managed access scope specific obligation policy for authorization | Jun 23, 2015 | Issued |
Array
(
[id] => 13680513
[patent_doc_number] => 20160378993
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-29
[patent_title] => SYSTEMS FOR DIAGNOSING AND TRACKING PRODUCT VULNERABILITIES
[patent_app_type] => utility
[patent_app_number] => 14/748756
[patent_app_country] => US
[patent_app_date] => 2015-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6128
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14748756
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/748756 | Diagnosing and tracking product vulnerabilities for telecommunication devices via a database | Jun 23, 2015 | Issued |
Array
(
[id] => 10393515
[patent_doc_number] => 20150278522
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-01
[patent_title] => 'METHODS OF DETECTION OF SOFTWARE EXPLOITATION'
[patent_app_type] => utility
[patent_app_number] => 14/736032
[patent_app_country] => US
[patent_app_date] => 2015-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4515
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14736032
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/736032 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION | Jun 9, 2015 | Abandoned |
Array
(
[id] => 10796756
[patent_doc_number] => 20160142913
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-19
[patent_title] => 'METHODS AND APPARATUS FOR CONTENT SHARING BETWEEN MULTIPLE MOBILE ELECTRONIC DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/713018
[patent_app_country] => US
[patent_app_date] => 2015-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9129
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14713018
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/713018 | Communicating credentials and content between multiple mobile electronic devices located within content sharing geographical area | May 14, 2015 | Issued |
Array
(
[id] => 11702831
[patent_doc_number] => 09692770
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-27
[patent_title] => 'Signature verification using unidirectional function'
[patent_app_type] => utility
[patent_app_number] => 14/712704
[patent_app_country] => US
[patent_app_date] => 2015-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7309
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14712704
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/712704 | Signature verification using unidirectional function | May 13, 2015 | Issued |
Array
(
[id] => 11274809
[patent_doc_number] => 20160337356
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'DEPLOYMENT TEMPLATES WITH EMBEDDED PERMISSIONS'
[patent_app_type] => utility
[patent_app_number] => 14/712487
[patent_app_country] => US
[patent_app_date] => 2015-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9756
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14712487
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/712487 | DEPLOYMENT TEMPLATES WITH EMBEDDED PERMISSIONS | May 13, 2015 | Abandoned |
Array
(
[id] => 11274854
[patent_doc_number] => 20160337401
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'IDENTIFYING PHISHING COMMUNICATIONS USING TEMPLATES'
[patent_app_type] => utility
[patent_app_number] => 14/711407
[patent_app_country] => US
[patent_app_date] => 2015-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5838
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14711407
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/711407 | Identifying phishing communications using templates | May 12, 2015 | Issued |
Array
(
[id] => 10417348
[patent_doc_number] => 20150302358
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-22
[patent_title] => 'METHOD AND APPARATUS FOR ENABLING A USER ASSERTION SERVICE FOR VISITORS TO WEB PAGES'
[patent_app_type] => utility
[patent_app_number] => 14/691528
[patent_app_country] => US
[patent_app_date] => 2015-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 4940
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14691528
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/691528 | METHOD AND APPARATUS FOR ENABLING A USER ASSERTION SERVICE FOR VISITORS TO WEB PAGES | Apr 19, 2015 | Abandoned |
Array
(
[id] => 10632395
[patent_doc_number] => 09350556
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-05-24
[patent_title] => 'Security model for identification and authentication in encrypted communications using delegate certificate chain bound to third party key'
[patent_app_type] => utility
[patent_app_number] => 14/691138
[patent_app_country] => US
[patent_app_date] => 2015-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5098
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 340
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14691138
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/691138 | Security model for identification and authentication in encrypted communications using delegate certificate chain bound to third party key | Apr 19, 2015 | Issued |
Array
(
[id] => 11098431
[patent_doc_number] => 20160295401
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'ANONYMOUS COMMUNICATION OF DEVICES IN WIRELESS NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 14/674859
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7657
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674859
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674859 | Anonymous vehicle communication protocol in vehicle-to-vehicle networks | Mar 30, 2015 | Issued |
Array
(
[id] => 11488834
[patent_doc_number] => 09594906
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-03-14
[patent_title] => 'Confirming a malware infection on a client device using a remote access connection tool to identify a malicious file based on fuzzy hashes'
[patent_app_type] => utility
[patent_app_number] => 14/675274
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7454
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14675274
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/675274 | Confirming a malware infection on a client device using a remote access connection tool to identify a malicious file based on fuzzy hashes | Mar 30, 2015 | Issued |
Array
(
[id] => 11585057
[patent_doc_number] => 09639701
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-05-02
[patent_title] => 'Scheduling data protection operations based on data activity'
[patent_app_type] => utility
[patent_app_number] => 14/674438
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3551
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674438
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674438 | Scheduling data protection operations based on data activity | Mar 30, 2015 | Issued |
Array
(
[id] => 11786904
[patent_doc_number] => 09396341
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-07-19
[patent_title] => 'Data encryption in a de-duplicating storage in a multi-tenant environment'
[patent_app_type] => utility
[patent_app_number] => 14/675252
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 16
[patent_no_of_words] => 8469
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14675252
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/675252 | Data encryption in a de-duplicating storage in a multi-tenant environment | Mar 30, 2015 | Issued |
Array
(
[id] => 12169242
[patent_doc_number] => 09888018
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-02-06
[patent_title] => 'Configuration management for network activity detectors'
[patent_app_type] => utility
[patent_app_number] => 14/666815
[patent_app_country] => US
[patent_app_date] => 2015-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 7617
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14666815
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/666815 | Configuration management for network activity detectors | Mar 23, 2015 | Issued |