Tan N Tran
Examiner (ID: 5358)
Most Active Art Unit | 2826 |
Art Unit(s) | 2826, 2812 |
Total Applications | 1899 |
Issued Applications | 1599 |
Pending Applications | 80 |
Abandoned Applications | 200 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 10616647
[patent_doc_number] => 09336092
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-05-10
[patent_title] => 'Secure data deduplication'
[patent_app_type] => utility
[patent_app_number] => 14/588446
[patent_app_country] => US
[patent_app_date] => 2015-01-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 12
[patent_no_of_words] => 9461
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14588446
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/588446 | Secure data deduplication | Dec 31, 2014 | Issued |
Array
(
[id] => 10994306
[patent_doc_number] => 20160191253
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-30
[patent_title] => 'SYSTEMS AND METHODS OF INDUSTRIAL NETWORK CERTIFICATE RECOVERY'
[patent_app_type] => utility
[patent_app_number] => 14/587812
[patent_app_country] => US
[patent_app_date] => 2014-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9019
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14587812
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/587812 | Industrial network certificate recovery by identifying secondary root certificate | Dec 30, 2014 | Issued |
Array
(
[id] => 10303900
[patent_doc_number] => 20150188900
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-02
[patent_title] => 'SESSION MANAGMENT IN A MULTI-TENANT, MULTI-DATA CENTER ENVIRONMENT SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/588026
[patent_app_country] => US
[patent_app_date] => 2014-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3919
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14588026
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/588026 | SESSION MANAGMENT IN A MULTI-TENANT, MULTI-DATA CENTER ENVIRONMENT SYSTEM AND METHOD | Dec 30, 2014 | Abandoned |
Array
(
[id] => 11110026
[patent_doc_number] => 20160306996
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-20
[patent_title] => 'SOCIAL DRIVE FOR SHARING DATA'
[patent_app_type] => utility
[patent_app_number] => 15/101527
[patent_app_country] => US
[patent_app_date] => 2014-12-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 12155
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15101527
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/101527 | SOCIAL DRIVE FOR SHARING DATA | Dec 25, 2014 | Abandoned |
Array
(
[id] => 11133801
[patent_doc_number] => 20160330777
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-10
[patent_title] => 'METHOD AND SYSTEM FOR IMPLEMENTING AUTOMATIC BINDING OF FIRST AND SECOND TERMINAL'
[patent_app_type] => utility
[patent_app_number] => 15/107479
[patent_app_country] => US
[patent_app_date] => 2014-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5560
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15107479
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/107479 | Method and system for implementing backup and binding between terminals by sending identifier to a cloud end server | Dec 11, 2014 | Issued |
Array
(
[id] => 10211038
[patent_doc_number] => 20150096030
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-02
[patent_title] => 'SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PREVENTING COMMUNICATION OF UNWANTED NETWORK TRAFFIC BY HOLDING ONLY A LAST PORTION OF THE NETWORK TRAFFIC'
[patent_app_type] => utility
[patent_app_number] => 14/564498
[patent_app_country] => US
[patent_app_date] => 2014-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4403
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14564498
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/564498 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PREVENTING COMMUNICATION OF UNWANTED NETWORK TRAFFIC BY HOLDING ONLY A LAST PORTION OF THE NETWORK TRAFFIC | Dec 8, 2014 | Abandoned |
Array
(
[id] => 10204664
[patent_doc_number] => 20150089652
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'METHODS OF DETECTION OF SOFTWARE EXPLOITATION'
[patent_app_type] => utility
[patent_app_number] => 14/558265
[patent_app_country] => US
[patent_app_date] => 2014-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4540
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14558265
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/558265 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION | Dec 1, 2014 | Abandoned |
Array
(
[id] => 10204663
[patent_doc_number] => 20150089651
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'METHODS OF DETECTION OF SOFTWARE EXPLOITATION'
[patent_app_type] => utility
[patent_app_number] => 14/558227
[patent_app_country] => US
[patent_app_date] => 2014-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4516
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14558227
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/558227 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION | Dec 1, 2014 | Abandoned |
Array
(
[id] => 10204665
[patent_doc_number] => 20150089653
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'METHODS OF DETECTION OF SOFTWARE EXPLOITATION'
[patent_app_type] => utility
[patent_app_number] => 14/558310
[patent_app_country] => US
[patent_app_date] => 2014-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4539
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14558310
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/558310 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION | Dec 1, 2014 | Abandoned |
Array
(
[id] => 10204662
[patent_doc_number] => 20150089650
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'METHODS OF DETECTION OF SOFTWARE EXPLOITATION'
[patent_app_type] => utility
[patent_app_number] => 14/558206
[patent_app_country] => US
[patent_app_date] => 2014-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4515
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14558206
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/558206 | METHODS OF DETECTION OF SOFTWARE EXPLOITATION | Dec 1, 2014 | Abandoned |
Array
(
[id] => 11109984
[patent_doc_number] => 20160306954
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-20
[patent_title] => 'METHODS AND SYSTEMS FOR MULTI-KEY VERITABLE BIOMETRIC IDENTITY AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 15/101038
[patent_app_country] => US
[patent_app_date] => 2014-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2787
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15101038
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/101038 | METHODS AND SYSTEMS FOR MULTI-KEY VERITABLE BIOMETRIC IDENTITY AUTHENTICATION | Dec 1, 2014 | Abandoned |
Array
(
[id] => 10171239
[patent_doc_number] => 09201948
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-12-01
[patent_title] => 'Systems and methods for receiving, aggregating, and editing survey answers from multiple sources'
[patent_app_type] => utility
[patent_app_number] => 14/557278
[patent_app_country] => US
[patent_app_date] => 2014-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8453
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 368
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14557278
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/557278 | Systems and methods for receiving, aggregating, and editing survey answers from multiple sources | Nov 30, 2014 | Issued |
Array
(
[id] => 10315865
[patent_doc_number] => 20150200868
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-16
[patent_title] => 'DISTRIBUTED ON-DEMAND RFID APPLICATION PLATFORM'
[patent_app_type] => utility
[patent_app_number] => 14/547416
[patent_app_country] => US
[patent_app_date] => 2014-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8333
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14547416
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/547416 | DISTRIBUTED ON-DEMAND RFID APPLICATION PLATFORM | Nov 18, 2014 | Abandoned |
Array
(
[id] => 11631733
[patent_doc_number] => 20170141922
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-18
[patent_title] => 'INCREMENTAL UPGRADE METHOD AND SYSTEM FOR FILE'
[patent_app_type] => utility
[patent_app_number] => 15/318896
[patent_app_country] => US
[patent_app_date] => 2014-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5787
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15318896
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/318896 | Performing incremental upgrade on APK base file corresponding to APK eigenvalue value | Oct 9, 2014 | Issued |
Array
(
[id] => 9961580
[patent_doc_number] => 09009805
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-04-14
[patent_title] => 'Method and system for provisioning an electronic device'
[patent_app_type] => utility
[patent_app_number] => 14/510023
[patent_app_country] => US
[patent_app_date] => 2014-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 27
[patent_no_of_words] => 19320
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 277
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14510023
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/510023 | Method and system for provisioning an electronic device | Oct 7, 2014 | Issued |
Array
(
[id] => 11001007
[patent_doc_number] => 20160197954
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-07
[patent_title] => 'DEFENDING AGAINST FLOW ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 14/903189
[patent_app_country] => US
[patent_app_date] => 2014-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3128
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14903189
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/903189 | DEFENDING AGAINST FLOW ATTACKS | Sep 28, 2014 | Abandoned |
Array
(
[id] => 9860215
[patent_doc_number] => 20150040232
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-05
[patent_title] => 'ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 14/499237
[patent_app_country] => US
[patent_app_date] => 2014-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13091
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14499237
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/499237 | Anti-vulnerability system, method, and computer program product | Sep 27, 2014 | Issued |
Array
(
[id] => 9807496
[patent_doc_number] => 20150019441
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-15
[patent_title] => 'MOBILE-TO-MOBILE TRANSACTIONS'
[patent_app_type] => utility
[patent_app_number] => 14/498152
[patent_app_country] => US
[patent_app_date] => 2014-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 10619
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14498152
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/498152 | Mobile-to-mobile transactions | Sep 25, 2014 | Issued |
Array
(
[id] => 9800500
[patent_doc_number] => 20150012444
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-08
[patent_title] => 'MOBILE PEER-TO-PEER AUTHENTICATED TRANSFERS'
[patent_app_type] => utility
[patent_app_number] => 14/498128
[patent_app_country] => US
[patent_app_date] => 2014-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 10749
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14498128
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/498128 | MOBILE PEER-TO-PEER AUTHENTICATED TRANSFERS | Sep 25, 2014 | Abandoned |
Array
(
[id] => 15285107
[patent_doc_number] => 10515220
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-24
[patent_title] => Determine whether an appropriate defensive response was made by an application under test
[patent_app_type] => utility
[patent_app_number] => 15/500523
[patent_app_country] => US
[patent_app_date] => 2014-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 6332
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15500523
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/500523 | Determine whether an appropriate defensive response was made by an application under test | Sep 24, 2014 | Issued |