Tan N Tran
Examiner (ID: 5358)
Most Active Art Unit | 2826 |
Art Unit(s) | 2826, 2812 |
Total Applications | 1899 |
Issued Applications | 1599 |
Pending Applications | 80 |
Abandoned Applications | 200 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 10741798
[patent_doc_number] => 20160087949
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'ESTABLISHING SECURE DIGITAL RELATIONSHIP USING SYMBOLOGY'
[patent_app_type] => utility
[patent_app_number] => 14/494802
[patent_app_country] => US
[patent_app_date] => 2014-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8531
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494802
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494802 | ESTABLISHING SECURE DIGITAL RELATIONSHIP USING SYMBOLOGY | Sep 23, 2014 | Abandoned |
Array
(
[id] => 11347302
[patent_doc_number] => 09531725
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-12-27
[patent_title] => 'Optimizing infrastructure support based on authenticated access, validation and context related information retrieval'
[patent_app_type] => utility
[patent_app_number] => 14/494762
[patent_app_country] => US
[patent_app_date] => 2014-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8870
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494762
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494762 | Optimizing infrastructure support based on authenticated access, validation and context related information retrieval | Sep 23, 2014 | Issued |
Array
(
[id] => 15063663
[patent_doc_number] => 10462156
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-29
[patent_title] => Determining a reputation of data using a data visa
[patent_app_type] => utility
[patent_app_number] => 14/494723
[patent_app_country] => US
[patent_app_date] => 2014-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 8028
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494723
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494723 | Determining a reputation of data using a data visa | Sep 23, 2014 | Issued |
Array
(
[id] => 11863066
[patent_doc_number] => 09742770
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-22
[patent_title] => 'Dynamic authentication in alternate operating environment'
[patent_app_type] => utility
[patent_app_number] => 14/494003
[patent_app_country] => US
[patent_app_date] => 2014-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12897
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494003
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494003 | Dynamic authentication in alternate operating environment | Sep 22, 2014 | Issued |
Array
(
[id] => 10739541
[patent_doc_number] => 20160085692
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'ENCRYPTION INTEGRITY CHECK IN MEMORY'
[patent_app_type] => utility
[patent_app_number] => 14/493924
[patent_app_country] => US
[patent_app_date] => 2014-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6938
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14493924
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/493924 | Encryption integrity check with CRC encryption in memory using a word count- and address-derived nonce | Sep 22, 2014 | Issued |
Array
(
[id] => 10378845
[patent_doc_number] => 20150263852
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'SECURE STORAGE ON EXTERNAL MEMORY'
[patent_app_type] => utility
[patent_app_number] => 14/493382
[patent_app_country] => US
[patent_app_date] => 2014-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8647
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14493382
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/493382 | Cryptographic operation by applying sub-keys to multiplication units in accordance with galois-field arithmetic | Sep 22, 2014 | Issued |
Array
(
[id] => 10639450
[patent_doc_number] => 09356969
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-31
[patent_title] => 'Technologies for multi-factor security analysis and runtime control'
[patent_app_type] => utility
[patent_app_number] => 14/493814
[patent_app_country] => US
[patent_app_date] => 2014-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 13665
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14493814
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/493814 | Technologies for multi-factor security analysis and runtime control | Sep 22, 2014 | Issued |
Array
(
[id] => 10204258
[patent_doc_number] => 20150089247
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'STORAGE MEDIUM HAVING SECURITY FUNCTION AND SECURITY METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/494106
[patent_app_country] => US
[patent_app_date] => 2014-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7267
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494106
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494106 | STORAGE MEDIUM HAVING SECURITY FUNCTION AND SECURITY METHOD THEREOF | Sep 22, 2014 | Abandoned |
Array
(
[id] => 13007925
[patent_doc_number] => 10027643
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-17
[patent_title] => Authenticating home device using device token issued based on identifier of terminal
[patent_app_type] => utility
[patent_app_number] => 14/494019
[patent_app_country] => US
[patent_app_date] => 2014-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 23
[patent_no_of_words] => 7217
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494019
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494019 | Authenticating home device using device token issued based on identifier of terminal | Sep 22, 2014 | Issued |
Array
(
[id] => 10093905
[patent_doc_number] => 09130744
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-08
[patent_title] => 'Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary'
[patent_app_type] => utility
[patent_app_number] => 14/492847
[patent_app_country] => US
[patent_app_date] => 2014-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4380
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492847
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/492847 | Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary | Sep 21, 2014 | Issued |
Array
(
[id] => 10204673
[patent_doc_number] => 20150089660
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'Device, System, and Method of Enhancing User Privacy and Security Within a Location-Based Virtual Social Networking Context'
[patent_app_type] => utility
[patent_app_number] => 14/492151
[patent_app_country] => US
[patent_app_date] => 2014-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 52
[patent_figures_cnt] => 52
[patent_no_of_words] => 16720
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492151
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/492151 | Device, system, and method of enhancing user privacy and security within a location-based virtual social networking context | Sep 21, 2014 | Issued |
Array
(
[id] => 10204225
[patent_doc_number] => 20150089214
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'ENHANCED AUTHENTICATION AND/OR ENHANCED IDENTIFICATION OF A SECURE ELEMENT OF A COMMUNICATION DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/492127
[patent_app_country] => US
[patent_app_date] => 2014-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 7814
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492127
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/492127 | Enhanced authentication and/or enhanced identification of a secure element of a communication device | Sep 21, 2014 | Issued |
Array
(
[id] => 10739834
[patent_doc_number] => 20160085985
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'MULTI-SERVICE CLOUD STORAGE DECISION OPTIMIZATION PROCESS'
[patent_app_type] => utility
[patent_app_number] => 14/492109
[patent_app_country] => US
[patent_app_date] => 2014-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9148
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492109
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/492109 | Multi-service cloud storage decision optimization process | Sep 21, 2014 | Issued |
Array
(
[id] => 10739807
[patent_doc_number] => 20160085958
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'METHODS AND APPARATUS FOR MULTI-FACTOR USER AUTHENTICATION WITH TWO DIMENSIONAL CAMERAS'
[patent_app_type] => utility
[patent_app_number] => 14/492163
[patent_app_country] => US
[patent_app_date] => 2014-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10199
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14492163
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/492163 | METHODS AND APPARATUS FOR MULTI-FACTOR USER AUTHENTICATION WITH TWO DIMENSIONAL CAMERAS | Sep 21, 2014 | Abandoned |
Array
(
[id] => 10276390
[patent_doc_number] => 20150161387
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-11
[patent_title] => 'NETWORK VIRTUAL USER RISK CONTROL METHOD AND SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/491458
[patent_app_country] => US
[patent_app_date] => 2014-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 6693
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14491458
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/491458 | Determining whether virtual network user is malicious user based on degree of association | Sep 18, 2014 | Issued |
Array
(
[id] => 13158245
[patent_doc_number] => 10095849
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-10-09
[patent_title] => Tag-based programming interface authentication
[patent_app_type] => utility
[patent_app_number] => 14/491922
[patent_app_country] => US
[patent_app_date] => 2014-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8659
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14491922
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/491922 | Tag-based programming interface authentication | Sep 18, 2014 | Issued |
Array
(
[id] => 10732095
[patent_doc_number] => 20160078245
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-17
[patent_title] => 'DATA STORAGE SYSTEMS AND METHODS'
[patent_app_type] => utility
[patent_app_number] => 14/489222
[patent_app_country] => US
[patent_app_date] => 2014-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 57881
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14489222
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/489222 | Deriving encryption rules based on file content | Sep 16, 2014 | Issued |
Array
(
[id] => 10545303
[patent_doc_number] => 09270448
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-23
[patent_title] => 'Encryption key distribution system and method'
[patent_app_type] => utility
[patent_app_number] => 14/489025
[patent_app_country] => US
[patent_app_date] => 2014-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 25
[patent_no_of_words] => 13084
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14489025
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/489025 | Encryption key distribution system and method | Sep 16, 2014 | Issued |
Array
(
[id] => 12938803
[patent_doc_number] => 09832197
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-28
[patent_title] => Generating link information to access a file stored in a storage area associated with user identification information
[patent_app_type] => utility
[patent_app_number] => 14/488466
[patent_app_country] => US
[patent_app_date] => 2014-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 29
[patent_figures_cnt] => 39
[patent_no_of_words] => 16308
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 302
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14488466
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/488466 | Generating link information to access a file stored in a storage area associated with user identification information | Sep 16, 2014 | Issued |
Array
(
[id] => 10734223
[patent_doc_number] => 20160080373
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-17
[patent_title] => 'Sensor Information Transparency System and Method'
[patent_app_type] => utility
[patent_app_number] => 14/488695
[patent_app_country] => US
[patent_app_date] => 2014-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3111
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14488695
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/488695 | Sensor Information Transparency System and Method | Sep 16, 2014 | Abandoned |