Tan N Tran
Examiner (ID: 5358)
Most Active Art Unit | 2826 |
Art Unit(s) | 2826, 2812 |
Total Applications | 1899 |
Issued Applications | 1599 |
Pending Applications | 80 |
Abandoned Applications | 200 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 10890848
[patent_doc_number] => 08914863
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-16
[patent_title] => 'Enhancing the security of near-field communication'
[patent_app_type] => utility
[patent_app_number] => 13/853470
[patent_app_country] => US
[patent_app_date] => 2013-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 12365
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13853470
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/853470 | Enhancing the security of near-field communication | Mar 28, 2013 | Issued |
Array
(
[id] => 9071535
[patent_doc_number] => 20130263291
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-03
[patent_title] => 'APPARATUS AND METHOD FOR SUPPORTING THEFT PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 13/853102
[patent_app_country] => US
[patent_app_date] => 2013-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4902
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13853102
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/853102 | APPARATUS AND METHOD FOR SUPPORTING THEFT PROTECTION | Mar 28, 2013 | Abandoned |
Array
(
[id] => 9096804
[patent_doc_number] => 20130276115
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-17
[patent_title] => 'NETWORK VIRTUAL USER RISK CONTROL METHOD AND SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/852201
[patent_app_country] => US
[patent_app_date] => 2013-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 6715
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13852201
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/852201 | Network virtual user risk control method and system | Mar 27, 2013 | Issued |
Array
(
[id] => 10513415
[patent_doc_number] => 09240996
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-01-19
[patent_title] => 'Method and system for risk-adaptive access control of an application action'
[patent_app_type] => utility
[patent_app_number] => 13/852865
[patent_app_country] => US
[patent_app_date] => 2013-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2423
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 328
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13852865
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/852865 | Method and system for risk-adaptive access control of an application action | Mar 27, 2013 | Issued |
Array
(
[id] => 10144340
[patent_doc_number] => 09177149
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-03
[patent_title] => 'Method of detecting malware in an operating system kernel'
[patent_app_type] => utility
[patent_app_number] => 14/391763
[patent_app_country] => US
[patent_app_date] => 2013-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 1888
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14391763
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/391763 | Method of detecting malware in an operating system kernel | Mar 26, 2013 | Issued |
Array
(
[id] => 8991736
[patent_doc_number] => 20130219017
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-22
[patent_title] => 'Content Disposition System and Method for Processing Message Content in a Distributed Environment'
[patent_app_type] => utility
[patent_app_number] => 13/846208
[patent_app_country] => US
[patent_app_date] => 2013-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 17147
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13846208
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/846208 | Content disposition system and method for processing message content in a distributed environment | Mar 17, 2013 | Issued |
Array
(
[id] => 9841275
[patent_doc_number] => 20150033357
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-29
[patent_title] => 'METHOD FOR IMPROVING THE FUNCTIONAL SECURITY AND INCREASING THE AVAILABIILTY OF AN ELECTRONIC CONTROL SYSTEM, AND ELECTRONIC CONTROL SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/381671
[patent_app_country] => US
[patent_app_date] => 2013-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5014
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14381671
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/381671 | Method and system for analyzing integrity of encrypted data in electronic control system for motor vehicle | Mar 4, 2013 | Issued |
Array
(
[id] => 10130984
[patent_doc_number] => 09164819
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-20
[patent_title] => 'Composing message processing pipelines'
[patent_app_type] => utility
[patent_app_number] => 13/764984
[patent_app_country] => US
[patent_app_date] => 2013-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6028
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 272
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13764984
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/764984 | Composing message processing pipelines | Feb 11, 2013 | Issued |
Array
(
[id] => 9605124
[patent_doc_number] => 20140201806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-17
[patent_title] => 'RUNTIME RISK DETECTION BASED ON USER, APPLICATION, AND SYSTEM ACTION SEQUENCE CORRELATION'
[patent_app_type] => utility
[patent_app_number] => 13/741878
[patent_app_country] => US
[patent_app_date] => 2013-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5416
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13741878
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/741878 | Runtime risk detection based on user, application, and system action sequence correlation | Jan 14, 2013 | Issued |
Array
(
[id] => 9605124
[patent_doc_number] => 20140201806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-17
[patent_title] => 'RUNTIME RISK DETECTION BASED ON USER, APPLICATION, AND SYSTEM ACTION SEQUENCE CORRELATION'
[patent_app_type] => utility
[patent_app_number] => 13/741878
[patent_app_country] => US
[patent_app_date] => 2013-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5416
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13741878
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/741878 | Runtime risk detection based on user, application, and system action sequence correlation | Jan 14, 2013 | Issued |
Array
(
[id] => 9605124
[patent_doc_number] => 20140201806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-17
[patent_title] => 'RUNTIME RISK DETECTION BASED ON USER, APPLICATION, AND SYSTEM ACTION SEQUENCE CORRELATION'
[patent_app_type] => utility
[patent_app_number] => 13/741878
[patent_app_country] => US
[patent_app_date] => 2013-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5416
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13741878
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/741878 | Runtime risk detection based on user, application, and system action sequence correlation | Jan 14, 2013 | Issued |
Array
(
[id] => 9605124
[patent_doc_number] => 20140201806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-17
[patent_title] => 'RUNTIME RISK DETECTION BASED ON USER, APPLICATION, AND SYSTEM ACTION SEQUENCE CORRELATION'
[patent_app_type] => utility
[patent_app_number] => 13/741878
[patent_app_country] => US
[patent_app_date] => 2013-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5416
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13741878
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/741878 | Runtime risk detection based on user, application, and system action sequence correlation | Jan 14, 2013 | Issued |
Array
(
[id] => 9599461
[patent_doc_number] => 20140196142
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-10
[patent_title] => 'DEVICE AUTHENTICATION USING LIST OF KNOWN GOOD DEVICES'
[patent_app_type] => utility
[patent_app_number] => 13/735899
[patent_app_country] => US
[patent_app_date] => 2013-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 13250
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13735899
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/735899 | Accessory device authentication using list of known good devices maintained by host device | Jan 6, 2013 | Issued |
Array
(
[id] => 9714670
[patent_doc_number] => 08839273
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-16
[patent_title] => 'System and method for optimizing user notifications for small computer devices'
[patent_app_type] => utility
[patent_app_number] => 13/733695
[patent_app_country] => US
[patent_app_date] => 2013-01-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 5846
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13733695
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/733695 | System and method for optimizing user notifications for small computer devices | Jan 2, 2013 | Issued |
Array
(
[id] => 9592633
[patent_doc_number] => 08782198
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-15
[patent_title] => 'System and method for storage discovery in a storage area network using device domains under control of a storage device'
[patent_app_type] => utility
[patent_app_number] => 13/712408
[patent_app_country] => US
[patent_app_date] => 2012-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 5293
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13712408
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/712408 | System and method for storage discovery in a storage area network using device domains under control of a storage device | Dec 11, 2012 | Issued |
Array
(
[id] => 10848055
[patent_doc_number] => 08875257
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-10-28
[patent_title] => 'Restricting mature content'
[patent_app_type] => utility
[patent_app_number] => 13/711359
[patent_app_country] => US
[patent_app_date] => 2012-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10200
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13711359
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/711359 | Restricting mature content | Dec 10, 2012 | Issued |
Array
(
[id] => 10113061
[patent_doc_number] => 09148485
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-29
[patent_title] => 'Reducing packet size in a communication protocol'
[patent_app_type] => utility
[patent_app_number] => 13/709632
[patent_app_country] => US
[patent_app_date] => 2012-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5023
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13709632
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/709632 | Reducing packet size in a communication protocol | Dec 9, 2012 | Issued |
Array
(
[id] => 8756895
[patent_doc_number] => 20130091200
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-11
[patent_title] => 'INFORMATION EXCHANGE IN WIRELESS SERVERS THAT BYPASS EXTERNAL DOMAIN SERVERS'
[patent_app_type] => utility
[patent_app_number] => 13/684964
[patent_app_country] => US
[patent_app_date] => 2012-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 36
[patent_figures_cnt] => 36
[patent_no_of_words] => 24522
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13684964
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/684964 | Information exchange in wireless servers that bypass external domain servers | Nov 25, 2012 | Issued |
Array
(
[id] => 10598311
[patent_doc_number] => 09319412
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-19
[patent_title] => 'Method for establishing resource access authorization in M2M communication'
[patent_app_type] => utility
[patent_app_number] => 14/403967
[patent_app_country] => US
[patent_app_date] => 2012-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9526
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14403967
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/403967 | Method for establishing resource access authorization in M2M communication | Nov 20, 2012 | Issued |
Array
(
[id] => 10598312
[patent_doc_number] => 09319413
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-19
[patent_title] => 'Method for establishing resource access authorization in M2M communication'
[patent_app_type] => utility
[patent_app_number] => 14/403977
[patent_app_country] => US
[patent_app_date] => 2012-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11186
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14403977
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/403977 | Method for establishing resource access authorization in M2M communication | Nov 20, 2012 | Issued |