Tan N Tran
Examiner (ID: 5358)
Most Active Art Unit | 2826 |
Art Unit(s) | 2826, 2812 |
Total Applications | 1899 |
Issued Applications | 1599 |
Pending Applications | 80 |
Abandoned Applications | 200 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 10841202
[patent_doc_number] => 08868902
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-10-21
[patent_title] => 'Characteristically shaped colorgram tokens in mobile transactions'
[patent_app_type] => utility
[patent_app_number] => 13/932588
[patent_app_country] => US
[patent_app_date] => 2013-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 20
[patent_no_of_words] => 10323
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13932588
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/932588 | Characteristically shaped colorgram tokens in mobile transactions | Jun 30, 2013 | Issued |
Array
(
[id] => 11430885
[patent_doc_number] => 09569201
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-02-14
[patent_title] => 'Method for translating product banners'
[patent_app_type] => utility
[patent_app_number] => 13/932195
[patent_app_country] => US
[patent_app_date] => 2013-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 12069
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13932195
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/932195 | Method for translating product banners | Jun 30, 2013 | Issued |
Array
(
[id] => 10854580
[patent_doc_number] => 08881293
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-04
[patent_title] => 'Static application security testing'
[patent_app_type] => utility
[patent_app_number] => 13/932388
[patent_app_country] => US
[patent_app_date] => 2013-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10708
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13932388
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/932388 | Static application security testing | Jun 30, 2013 | Issued |
Array
(
[id] => 10786405
[patent_doc_number] => 20160132561
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-12
[patent_title] => 'EXPIRATION TAG OF DATA'
[patent_app_type] => utility
[patent_app_number] => 14/899046
[patent_app_country] => US
[patent_app_date] => 2013-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3948
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14899046
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/899046 | EXPIRATION TAG OF DATA | Jun 27, 2013 | Abandoned |
Array
(
[id] => 12357954
[patent_doc_number] => 09954839
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-24
[patent_title] => Systems and methods for providing distributed authentication of service requests by identity management components
[patent_app_type] => utility
[patent_app_number] => 14/896990
[patent_app_country] => US
[patent_app_date] => 2013-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 13
[patent_no_of_words] => 6309
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14896990
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/896990 | Systems and methods for providing distributed authentication of service requests by identity management components | Jun 27, 2013 | Issued |
Array
(
[id] => 9853395
[patent_doc_number] => 08955144
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-10
[patent_title] => 'Protecting information processing system secrets from debug attacks'
[patent_app_type] => utility
[patent_app_number] => 13/929945
[patent_app_country] => US
[patent_app_date] => 2013-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5229
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13929945
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/929945 | Protecting information processing system secrets from debug attacks | Jun 27, 2013 | Issued |
Array
(
[id] => 10796057
[patent_doc_number] => 20160142214
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-19
[patent_title] => 'Device to Device Communication Security'
[patent_app_type] => utility
[patent_app_number] => 14/896466
[patent_app_country] => US
[patent_app_date] => 2013-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7695
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14896466
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/896466 | Device-to-device communication security with authentication certificates | Jun 24, 2013 | Issued |
Array
(
[id] => 10781263
[patent_doc_number] => 20160127420
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-05
[patent_title] => 'Lawful Interception for Proximity Service'
[patent_app_type] => utility
[patent_app_number] => 14/897800
[patent_app_country] => US
[patent_app_date] => 2013-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5248
[patent_no_of_claims] => 42
[patent_no_of_ind_claims] => 20
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14897800
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/897800 | Lawful Interception for Proximity Service | Jun 13, 2013 | Abandoned |
Array
(
[id] => 10772900
[patent_doc_number] => 20160119056
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'Security Monitoring for Optical Network'
[patent_app_type] => utility
[patent_app_number] => 14/897528
[patent_app_country] => US
[patent_app_date] => 2013-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8889
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14897528
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/897528 | Security monitoring for optical network | Jun 10, 2013 | Issued |
Array
(
[id] => 10271175
[patent_doc_number] => 20150156172
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-04
[patent_title] => 'ARCHITECTURE OF PRIVACY PROTECTION SYSTEM FOR RECOMMENDATION SERVICES'
[patent_app_type] => utility
[patent_app_number] => 14/406998
[patent_app_country] => US
[patent_app_date] => 2013-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 14271
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14406998
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/406998 | Methods and systems for privacy protection of network end users including profile slicing | May 30, 2013 | Issued |
Array
(
[id] => 10885864
[patent_doc_number] => 08910269
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-09
[patent_title] => 'System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic'
[patent_app_type] => utility
[patent_app_number] => 13/892023
[patent_app_country] => US
[patent_app_date] => 2013-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4474
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13892023
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/892023 | System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic | May 9, 2013 | Issued |
Array
(
[id] => 10243264
[patent_doc_number] => 20150128259
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-07
[patent_title] => 'SOFTWARE DISTRIBUTION SYSTEM AND SOFTWARE DISTRIBUTION METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/399750
[patent_app_country] => US
[patent_app_date] => 2013-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6220
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14399750
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/399750 | Software distribution system and software distribution method | May 9, 2013 | Issued |
Array
(
[id] => 10270939
[patent_doc_number] => 20150155936
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-04
[patent_title] => 'HANDSHAKE SYNCHRONIZATION METHOD AND SYSTEM BASED ON VISIBLE LIGHT COMMUNICATION'
[patent_app_type] => utility
[patent_app_number] => 14/405787
[patent_app_country] => US
[patent_app_date] => 2013-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 22513
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14405787
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/405787 | Handshake synchronization method and system based on visible light communication | May 6, 2013 | Issued |
Array
(
[id] => 10236473
[patent_doc_number] => 20150121467
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-30
[patent_title] => 'Method and System for Protecting a Password During an Authentication Process'
[patent_app_type] => utility
[patent_app_number] => 14/398710
[patent_app_country] => US
[patent_app_date] => 2013-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7112
[patent_no_of_claims] => 53
[patent_no_of_ind_claims] => 25
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14398710
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/398710 | Method and system for protecting a password during an authentication process | May 2, 2013 | Issued |
Array
(
[id] => 10509132
[patent_doc_number] => 09237010
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-12
[patent_title] => 'Secure transmission of a message'
[patent_app_type] => utility
[patent_app_number] => 14/403907
[patent_app_country] => US
[patent_app_date] => 2013-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4157
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14403907
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/403907 | Secure transmission of a message | Apr 23, 2013 | Issued |
Array
(
[id] => 11215568
[patent_doc_number] => 09444618
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-09-13
[patent_title] => 'Defense against attacks on ring oscillator-based physically unclonable functions'
[patent_app_type] => utility
[patent_app_number] => 13/867429
[patent_app_country] => US
[patent_app_date] => 2013-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 3816
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13867429
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/867429 | Defense against attacks on ring oscillator-based physically unclonable functions | Apr 21, 2013 | Issued |
Array
(
[id] => 10157865
[patent_doc_number] => 09189647
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-17
[patent_title] => 'Encrypted database system, linking method, and medium'
[patent_app_type] => utility
[patent_app_number] => 14/396560
[patent_app_country] => US
[patent_app_date] => 2013-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 14068
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 293
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14396560
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/396560 | Encrypted database system, linking method, and medium | Apr 11, 2013 | Issued |
Array
(
[id] => 10519615
[patent_doc_number] => 09246675
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-26
[patent_title] => 'Cryptographic systems using pairing with errors'
[patent_app_type] => utility
[patent_app_number] => 14/491992
[patent_app_country] => US
[patent_app_date] => 2013-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10029
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 313
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14491992
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/491992 | Cryptographic systems using pairing with errors | Apr 10, 2013 | Issued |
Array
(
[id] => 14250781
[patent_doc_number] => 10275593
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-30
[patent_title] => Secure computing device using different central processing resources
[patent_app_type] => utility
[patent_app_number] => 13/854320
[patent_app_country] => US
[patent_app_date] => 2013-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 38
[patent_no_of_words] => 14636
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13854320
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/854320 | Secure computing device using different central processing resources | Mar 31, 2013 | Issued |
Array
(
[id] => 9774772
[patent_doc_number] => 20140298435
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-02
[patent_title] => 'Authentication using three-dimensional structure'
[patent_app_type] => utility
[patent_app_number] => 13/853834
[patent_app_country] => US
[patent_app_date] => 2013-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5415
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13853834
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/853834 | Authentication using three-dimensional structure | Mar 28, 2013 | Issued |