
Trang T. Doan
Examiner (ID: 5701, Phone: (571)272-0740 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2131, 2431 |
| Total Applications | 760 |
| Issued Applications | 589 |
| Pending Applications | 59 |
| Abandoned Applications | 130 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15521463
[patent_doc_number] => 10567342
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-18
[patent_title] => Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens
[patent_app_type] => utility
[patent_app_number] => 15/187657
[patent_app_country] => US
[patent_app_date] => 2016-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 15212
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 406
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15187657
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/187657 | Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens | Jun 19, 2016 | Issued |
Array
(
[id] => 15402707
[patent_doc_number] => 10542021
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-01-21
[patent_title] => Automated extraction of behavioral profile features
[patent_app_type] => utility
[patent_app_number] => 15/187532
[patent_app_country] => US
[patent_app_date] => 2016-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 8582
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15187532
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/187532 | Automated extraction of behavioral profile features | Jun 19, 2016 | Issued |
Array
(
[id] => 15521463
[patent_doc_number] => 10567342
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-18
[patent_title] => Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens
[patent_app_type] => utility
[patent_app_number] => 15/187657
[patent_app_country] => US
[patent_app_date] => 2016-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 15212
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 406
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15187657
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/187657 | Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens | Jun 19, 2016 | Issued |
Array
(
[id] => 11317059
[patent_doc_number] => 20160353170
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-01
[patent_title] => 'IPTV Follow Me Content System and Method'
[patent_app_type] => utility
[patent_app_number] => 15/180788
[patent_app_country] => US
[patent_app_date] => 2016-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11644
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15180788
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/180788 | IPTV follow me content system and method | Jun 12, 2016 | Issued |
Array
(
[id] => 11338813
[patent_doc_number] => 20160364569
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'DEVICE AND METHOD FOR PROTECTION OF IOS SOFTWARE MODULES'
[patent_app_type] => utility
[patent_app_number] => 15/177067
[patent_app_country] => US
[patent_app_date] => 2016-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3207
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15177067
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/177067 | DEVICE AND METHOD FOR PROTECTION OF IOS SOFTWARE MODULES | Jun 7, 2016 | Abandoned |
Array
(
[id] => 14709343
[patent_doc_number] => 10382444
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-13
[patent_title] => Device blocking tool
[patent_app_type] => utility
[patent_app_number] => 15/161911
[patent_app_country] => US
[patent_app_date] => 2016-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7611
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15161911
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/161911 | Device blocking tool | May 22, 2016 | Issued |
Array
(
[id] => 12061007
[patent_doc_number] => 20170337351
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-23
[patent_title] => 'SUBSET-DIFFERENCE BROADCAST ENCRYPTION WITH BLACKLISTING'
[patent_app_type] => utility
[patent_app_number] => 15/158296
[patent_app_country] => US
[patent_app_date] => 2016-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6203
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15158296
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/158296 | Subset-difference broadcast encryption with blacklisting | May 17, 2016 | Issued |
Array
(
[id] => 12055451
[patent_doc_number] => 20170331795
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-16
[patent_title] => 'VEHICLE DATA ENCRYPTION'
[patent_app_type] => utility
[patent_app_number] => 15/154085
[patent_app_country] => US
[patent_app_date] => 2016-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5868
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15154085
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/154085 | VEHICLE DATA ENCRYPTION | May 12, 2016 | Abandoned |
Array
(
[id] => 11975673
[patent_doc_number] => 20170279826
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-28
[patent_title] => 'PROTECTING DYNAMIC AND SHORT-LIVED VIRTUAL MACHINE INSTANCES IN CLOUD ENVIRONMENTS'
[patent_app_type] => utility
[patent_app_number] => 15/147217
[patent_app_country] => US
[patent_app_date] => 2016-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8027
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15147217
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/147217 | PROTECTING DYNAMIC AND SHORT-LIVED VIRTUAL MACHINE INSTANCES IN CLOUD ENVIRONMENTS | May 4, 2016 | Abandoned |
Array
(
[id] => 11133243
[patent_doc_number] => 20160330219
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-10
[patent_title] => 'METHOD AND DEVICE FOR MANAGING SECURITY IN A COMPUTER NETWORK'
[patent_app_type] => utility
[patent_app_number] => 15/145800
[patent_app_country] => US
[patent_app_date] => 2016-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 82
[patent_figures_cnt] => 82
[patent_no_of_words] => 27208
[patent_no_of_claims] => 69
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15145800
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/145800 | METHOD AND DEVICE FOR MANAGING SECURITY IN A COMPUTER NETWORK | May 3, 2016 | Abandoned |
Array
(
[id] => 12398922
[patent_doc_number] => 09967234
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-05-08
[patent_title] => Miniaturized real time pseudo-cross domain data communication system with air gapped full motion video device and method
[patent_app_type] => utility
[patent_app_number] => 15/139783
[patent_app_country] => US
[patent_app_date] => 2016-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7564
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15139783
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/139783 | Miniaturized real time pseudo-cross domain data communication system with air gapped full motion video device and method | Apr 26, 2016 | Issued |
Array
(
[id] => 12006330
[patent_doc_number] => 20170310485
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-26
[patent_title] => 'Securing IoT Devices Using an Out-Of-Band Beacon'
[patent_app_type] => utility
[patent_app_number] => 15/133294
[patent_app_country] => US
[patent_app_date] => 2016-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4786
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15133294
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/133294 | Securing IoT devices using an out-of-band beacon | Apr 19, 2016 | Issued |
Array
(
[id] => 11674962
[patent_doc_number] => 20170163685
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-08
[patent_title] => 'NETWORK ROUTING AND SECURITY WITHIN A MOBILE RADIO NETWORK'
[patent_app_type] => utility
[patent_app_number] => 15/090918
[patent_app_country] => US
[patent_app_date] => 2016-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 13391
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15090918
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/090918 | Network routing and security within a mobile radio network | Apr 4, 2016 | Issued |
Array
(
[id] => 13895605
[patent_doc_number] => 10200364
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-02-05
[patent_title] => Enhanced secure authentication
[patent_app_type] => utility
[patent_app_number] => 15/088698
[patent_app_country] => US
[patent_app_date] => 2016-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11551
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 257
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15088698
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/088698 | Enhanced secure authentication | Mar 31, 2016 | Issued |
Array
(
[id] => 14400165
[patent_doc_number] => 10313382
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-04
[patent_title] => System and method for visualizing and analyzing cyber-attacks using a graph model
[patent_app_type] => utility
[patent_app_number] => 15/084153
[patent_app_country] => US
[patent_app_date] => 2016-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7750
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15084153
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/084153 | System and method for visualizing and analyzing cyber-attacks using a graph model | Mar 28, 2016 | Issued |
Array
(
[id] => 11126322
[patent_doc_number] => 20160323297
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-03
[patent_title] => 'METHOD, APPARATUS, SYSTEM, AND COMPUTER READABLE MEDIUM FOR PROVIDING APPARATUS SECURITY'
[patent_app_type] => utility
[patent_app_number] => 15/081992
[patent_app_country] => US
[patent_app_date] => 2016-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10176
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15081992
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/081992 | Method, apparatus, system, and computer readable medium for providing apparatus security | Mar 27, 2016 | Issued |
Array
(
[id] => 11088942
[patent_doc_number] => 20160285910
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-29
[patent_title] => 'TRANSPORT ENVELOPE'
[patent_app_type] => utility
[patent_app_number] => 15/079438
[patent_app_country] => US
[patent_app_date] => 2016-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 16341
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15079438
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/079438 | Transport envelope | Mar 23, 2016 | Issued |
Array
(
[id] => 11960456
[patent_doc_number] => 20170264608
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-14
[patent_title] => 'VISUAL BIOMETRIC AUTHENTICATION SUPPLEMENTED WITH A TIME-BASED SECONDARY AUTHENTICATION FACTOR'
[patent_app_type] => utility
[patent_app_number] => 15/065060
[patent_app_country] => US
[patent_app_date] => 2016-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 12107
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15065060
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/065060 | VISUAL BIOMETRIC AUTHENTICATION SUPPLEMENTED WITH A TIME-BASED SECONDARY AUTHENTICATION FACTOR | Mar 8, 2016 | Abandoned |
Array
(
[id] => 14269905
[patent_doc_number] => 10284532
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-07
[patent_title] => Managing access to resources
[patent_app_type] => utility
[patent_app_number] => 15/053805
[patent_app_country] => US
[patent_app_date] => 2016-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 15723
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15053805
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/053805 | Managing access to resources | Feb 24, 2016 | Issued |
Array
(
[id] => 14527651
[patent_doc_number] => 10341099
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-02
[patent_title] => Cryptographic key generation using a stored input value and a stored count value
[patent_app_type] => utility
[patent_app_number] => 15/052173
[patent_app_country] => US
[patent_app_date] => 2016-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4434
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 282
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15052173
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/052173 | Cryptographic key generation using a stored input value and a stored count value | Feb 23, 2016 | Issued |