Search

Tan N Tran

Examiner (ID: 5358)

Most Active Art Unit
2826
Art Unit(s)
2826, 2812
Total Applications
1899
Issued Applications
1599
Pending Applications
80
Abandoned Applications
200

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10616647 [patent_doc_number] => 09336092 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-05-10 [patent_title] => 'Secure data deduplication' [patent_app_type] => utility [patent_app_number] => 14/588446 [patent_app_country] => US [patent_app_date] => 2015-01-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 12 [patent_no_of_words] => 9461 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 212 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14588446 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/588446
Secure data deduplication Dec 31, 2014 Issued
Array ( [id] => 10994306 [patent_doc_number] => 20160191253 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-06-30 [patent_title] => 'SYSTEMS AND METHODS OF INDUSTRIAL NETWORK CERTIFICATE RECOVERY' [patent_app_type] => utility [patent_app_number] => 14/587812 [patent_app_country] => US [patent_app_date] => 2014-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 9019 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14587812 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/587812
Industrial network certificate recovery by identifying secondary root certificate Dec 30, 2014 Issued
Array ( [id] => 10303900 [patent_doc_number] => 20150188900 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-07-02 [patent_title] => 'SESSION MANAGMENT IN A MULTI-TENANT, MULTI-DATA CENTER ENVIRONMENT SYSTEM AND METHOD' [patent_app_type] => utility [patent_app_number] => 14/588026 [patent_app_country] => US [patent_app_date] => 2014-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3919 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14588026 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/588026
SESSION MANAGMENT IN A MULTI-TENANT, MULTI-DATA CENTER ENVIRONMENT SYSTEM AND METHOD Dec 30, 2014 Abandoned
Array ( [id] => 11110026 [patent_doc_number] => 20160306996 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-20 [patent_title] => 'SOCIAL DRIVE FOR SHARING DATA' [patent_app_type] => utility [patent_app_number] => 15/101527 [patent_app_country] => US [patent_app_date] => 2014-12-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 12155 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15101527 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/101527
SOCIAL DRIVE FOR SHARING DATA Dec 25, 2014 Abandoned
Array ( [id] => 11133801 [patent_doc_number] => 20160330777 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-11-10 [patent_title] => 'METHOD AND SYSTEM FOR IMPLEMENTING AUTOMATIC BINDING OF FIRST AND SECOND TERMINAL' [patent_app_type] => utility [patent_app_number] => 15/107479 [patent_app_country] => US [patent_app_date] => 2014-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5560 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15107479 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/107479
Method and system for implementing backup and binding between terminals by sending identifier to a cloud end server Dec 11, 2014 Issued
Array ( [id] => 10211038 [patent_doc_number] => 20150096030 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-04-02 [patent_title] => 'SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PREVENTING COMMUNICATION OF UNWANTED NETWORK TRAFFIC BY HOLDING ONLY A LAST PORTION OF THE NETWORK TRAFFIC' [patent_app_type] => utility [patent_app_number] => 14/564498 [patent_app_country] => US [patent_app_date] => 2014-12-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4403 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14564498 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/564498
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PREVENTING COMMUNICATION OF UNWANTED NETWORK TRAFFIC BY HOLDING ONLY A LAST PORTION OF THE NETWORK TRAFFIC Dec 8, 2014 Abandoned
Array ( [id] => 10204664 [patent_doc_number] => 20150089652 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-26 [patent_title] => 'METHODS OF DETECTION OF SOFTWARE EXPLOITATION' [patent_app_type] => utility [patent_app_number] => 14/558265 [patent_app_country] => US [patent_app_date] => 2014-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4540 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14558265 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/558265
METHODS OF DETECTION OF SOFTWARE EXPLOITATION Dec 1, 2014 Abandoned
Array ( [id] => 10204663 [patent_doc_number] => 20150089651 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-26 [patent_title] => 'METHODS OF DETECTION OF SOFTWARE EXPLOITATION' [patent_app_type] => utility [patent_app_number] => 14/558227 [patent_app_country] => US [patent_app_date] => 2014-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4516 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14558227 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/558227
METHODS OF DETECTION OF SOFTWARE EXPLOITATION Dec 1, 2014 Abandoned
Array ( [id] => 10204665 [patent_doc_number] => 20150089653 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-26 [patent_title] => 'METHODS OF DETECTION OF SOFTWARE EXPLOITATION' [patent_app_type] => utility [patent_app_number] => 14/558310 [patent_app_country] => US [patent_app_date] => 2014-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4539 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14558310 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/558310
METHODS OF DETECTION OF SOFTWARE EXPLOITATION Dec 1, 2014 Abandoned
Array ( [id] => 10204662 [patent_doc_number] => 20150089650 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-26 [patent_title] => 'METHODS OF DETECTION OF SOFTWARE EXPLOITATION' [patent_app_type] => utility [patent_app_number] => 14/558206 [patent_app_country] => US [patent_app_date] => 2014-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4515 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14558206 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/558206
METHODS OF DETECTION OF SOFTWARE EXPLOITATION Dec 1, 2014 Abandoned
Array ( [id] => 11109984 [patent_doc_number] => 20160306954 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-20 [patent_title] => 'METHODS AND SYSTEMS FOR MULTI-KEY VERITABLE BIOMETRIC IDENTITY AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 15/101038 [patent_app_country] => US [patent_app_date] => 2014-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2787 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15101038 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/101038
METHODS AND SYSTEMS FOR MULTI-KEY VERITABLE BIOMETRIC IDENTITY AUTHENTICATION Dec 1, 2014 Abandoned
Array ( [id] => 10171239 [patent_doc_number] => 09201948 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-12-01 [patent_title] => 'Systems and methods for receiving, aggregating, and editing survey answers from multiple sources' [patent_app_type] => utility [patent_app_number] => 14/557278 [patent_app_country] => US [patent_app_date] => 2014-12-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 8453 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 368 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14557278 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/557278
Systems and methods for receiving, aggregating, and editing survey answers from multiple sources Nov 30, 2014 Issued
Array ( [id] => 10315865 [patent_doc_number] => 20150200868 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-07-16 [patent_title] => 'DISTRIBUTED ON-DEMAND RFID APPLICATION PLATFORM' [patent_app_type] => utility [patent_app_number] => 14/547416 [patent_app_country] => US [patent_app_date] => 2014-11-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8333 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14547416 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/547416
DISTRIBUTED ON-DEMAND RFID APPLICATION PLATFORM Nov 18, 2014 Abandoned
Array ( [id] => 11631733 [patent_doc_number] => 20170141922 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-05-18 [patent_title] => 'INCREMENTAL UPGRADE METHOD AND SYSTEM FOR FILE' [patent_app_type] => utility [patent_app_number] => 15/318896 [patent_app_country] => US [patent_app_date] => 2014-10-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5787 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15318896 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/318896
Performing incremental upgrade on APK base file corresponding to APK eigenvalue value Oct 9, 2014 Issued
Array ( [id] => 9961580 [patent_doc_number] => 09009805 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-04-14 [patent_title] => 'Method and system for provisioning an electronic device' [patent_app_type] => utility [patent_app_number] => 14/510023 [patent_app_country] => US [patent_app_date] => 2014-10-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 27 [patent_no_of_words] => 19320 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 277 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14510023 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/510023
Method and system for provisioning an electronic device Oct 7, 2014 Issued
Array ( [id] => 11001007 [patent_doc_number] => 20160197954 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-07-07 [patent_title] => 'DEFENDING AGAINST FLOW ATTACKS' [patent_app_type] => utility [patent_app_number] => 14/903189 [patent_app_country] => US [patent_app_date] => 2014-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3128 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14903189 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/903189
DEFENDING AGAINST FLOW ATTACKS Sep 28, 2014 Abandoned
Array ( [id] => 9860215 [patent_doc_number] => 20150040232 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-05 [patent_title] => 'ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT' [patent_app_type] => utility [patent_app_number] => 14/499237 [patent_app_country] => US [patent_app_date] => 2014-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 13091 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14499237 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/499237
Anti-vulnerability system, method, and computer program product Sep 27, 2014 Issued
Array ( [id] => 9807496 [patent_doc_number] => 20150019441 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-15 [patent_title] => 'MOBILE-TO-MOBILE TRANSACTIONS' [patent_app_type] => utility [patent_app_number] => 14/498152 [patent_app_country] => US [patent_app_date] => 2014-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 10619 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14498152 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/498152
Mobile-to-mobile transactions Sep 25, 2014 Issued
Array ( [id] => 9800500 [patent_doc_number] => 20150012444 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-08 [patent_title] => 'MOBILE PEER-TO-PEER AUTHENTICATED TRANSFERS' [patent_app_type] => utility [patent_app_number] => 14/498128 [patent_app_country] => US [patent_app_date] => 2014-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 10749 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14498128 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/498128
MOBILE PEER-TO-PEER AUTHENTICATED TRANSFERS Sep 25, 2014 Abandoned
Array ( [id] => 15285107 [patent_doc_number] => 10515220 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-12-24 [patent_title] => Determine whether an appropriate defensive response was made by an application under test [patent_app_type] => utility [patent_app_number] => 15/500523 [patent_app_country] => US [patent_app_date] => 2014-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 6332 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 117 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15500523 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/500523
Determine whether an appropriate defensive response was made by an application under test Sep 24, 2014 Issued
Menu