Search

Trang T. Doan

Examiner (ID: 5701, Phone: (571)272-0740 , Office: P/2431 )

Most Active Art Unit
2431
Art Unit(s)
2131, 2431
Total Applications
760
Issued Applications
589
Pending Applications
59
Abandoned Applications
130

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11477100 [patent_doc_number] => 20170063883 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-03-02 [patent_title] => 'METADATA INFORMATION BASED FILE PROCESSING' [patent_app_type] => utility [patent_app_number] => 14/836685 [patent_app_country] => US [patent_app_date] => 2015-08-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10126 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14836685 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/836685
METADATA INFORMATION BASED FILE PROCESSING Aug 25, 2015 Abandoned
Array ( [id] => 12256231 [patent_doc_number] => 09928377 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-03-27 [patent_title] => 'Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (CCS)' [patent_app_type] => utility [patent_app_number] => 14/835640 [patent_app_country] => US [patent_app_date] => 2015-08-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 19 [patent_no_of_words] => 20557 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 175 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14835640 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/835640
Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (CCS) Aug 24, 2015 Issued
Array ( [id] => 13952751 [patent_doc_number] => 10212165 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-02-19 [patent_title] => Secured vital sign data group streams [patent_app_type] => utility [patent_app_number] => 14/835341 [patent_app_country] => US [patent_app_date] => 2015-08-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6052 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 184 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14835341 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/835341
Secured vital sign data group streams Aug 24, 2015 Issued
Array ( [id] => 11080405 [patent_doc_number] => 20160277368 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-09-22 [patent_title] => 'SYSTEMS AND METHODS OF PER-DOCUMENT ENCRYPTION OF ENTERPRISE INFORMATION STORED ON A CLOUD COMPUTING SERVICE (CCS)' [patent_app_type] => utility [patent_app_number] => 14/835632 [patent_app_country] => US [patent_app_date] => 2015-08-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 20502 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14835632 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/835632
Systems and methods of per-document encryption of enterprise information stored on a cloud computing service (CCS) Aug 24, 2015 Issued
Array ( [id] => 15762075 [patent_doc_number] => 10623176 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-04-14 [patent_title] => Authentication encryption method, authentication decryption method, and information-processing device [patent_app_type] => utility [patent_app_number] => 15/504886 [patent_app_country] => US [patent_app_date] => 2015-08-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 16661 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 123 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15504886 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/504886
Authentication encryption method, authentication decryption method, and information-processing device Aug 17, 2015 Issued
Array ( [id] => 11111703 [patent_doc_number] => 20160308674 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-20 [patent_title] => 'DATA PROTECTION FOR KEYCHAIN SYNCING' [patent_app_type] => utility [patent_app_number] => 14/827532 [patent_app_country] => US [patent_app_date] => 2015-08-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 29 [patent_figures_cnt] => 29 [patent_no_of_words] => 24786 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14827532 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/827532
Data protection for keychain syncing Aug 16, 2015 Issued
Array ( [id] => 10465215 [patent_doc_number] => 20150350230 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-03 [patent_title] => 'CONTROLLING MALICIOUS ACTIVITY DETECTION USING BEHAVIORAL MODELS' [patent_app_type] => utility [patent_app_number] => 14/815990 [patent_app_country] => US [patent_app_date] => 2015-08-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 8385 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14815990 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/815990
Controlling malicious activity detection using behavioral models Jul 31, 2015 Issued
Array ( [id] => 10697717 [patent_doc_number] => 20160043864 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-11 [patent_title] => 'STORING A KEY IN A REMOTE SECURITY MODULE' [patent_app_type] => utility [patent_app_number] => 14/797214 [patent_app_country] => US [patent_app_date] => 2015-07-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9190 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14797214 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/797214
Storing a key in a remote security module Jul 12, 2015 Issued
Array ( [id] => 10497162 [patent_doc_number] => 20150382185 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-31 [patent_title] => 'METHOD AND DEVICE FOR COUPLING TWO COMMUNICATION PARTNERS' [patent_app_type] => utility [patent_app_number] => 14/739120 [patent_app_country] => US [patent_app_date] => 2015-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 2509 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739120 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/739120
Method and device for coupling two communication partners Jun 14, 2015 Issued
Array ( [id] => 10688549 [patent_doc_number] => 20160034693 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-04 [patent_title] => 'CERTIFICATE AUTHORITY OPERATION APPARATUS AND METHOD' [patent_app_type] => utility [patent_app_number] => 14/738986 [patent_app_country] => US [patent_app_date] => 2015-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 25 [patent_figures_cnt] => 25 [patent_no_of_words] => 23259 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738986 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/738986
CERTIFICATE AUTHORITY OPERATION APPARATUS AND METHOD Jun 14, 2015 Abandoned
Array ( [id] => 10682561 [patent_doc_number] => 20160028706 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-01-28 [patent_title] => 'DISPLAYING THE ACCESSIBILITY OF HYPERLINKED FILES' [patent_app_type] => utility [patent_app_number] => 14/739117 [patent_app_country] => US [patent_app_date] => 2015-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 7315 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739117 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/739117
Displaying the accessibility of hyperlinked files Jun 14, 2015 Issued
Array ( [id] => 10496614 [patent_doc_number] => 20150381637 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-31 [patent_title] => 'SYSTEM AND METHODS FOR MALWARE DETECTION USING LOG BASED CROWDSOURCING ANALYSIS' [patent_app_type] => utility [patent_app_number] => 14/738959 [patent_app_country] => US [patent_app_date] => 2015-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 11428 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738959 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/738959
System and methods for malware detection using log based crowdsourcing analysis Jun 14, 2015 Issued
Array ( [id] => 11340370 [patent_doc_number] => 20160366126 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-15 [patent_title] => 'SCREEN-ANALYSIS BASED DEVICE SECURITY' [patent_app_type] => utility [patent_app_number] => 14/739107 [patent_app_country] => US [patent_app_date] => 2015-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 12895 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739107 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/739107
Screen-analysis based device security Jun 14, 2015 Issued
Array ( [id] => 12146891 [patent_doc_number] => 09881144 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-01-30 [patent_title] => 'Identifying usage of code' [patent_app_type] => utility [patent_app_number] => 14/738998 [patent_app_country] => US [patent_app_date] => 2015-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7097 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 128 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738998 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/738998
Identifying usage of code Jun 14, 2015 Issued
Array ( [id] => 11863056 [patent_doc_number] => 09742760 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-08-22 [patent_title] => 'System and method for improving login and registration efficiency to network-accessed data' [patent_app_type] => utility [patent_app_number] => 14/739118 [patent_app_country] => US [patent_app_date] => 2015-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6275 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 213 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739118 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/739118
System and method for improving login and registration efficiency to network-accessed data Jun 14, 2015 Issued
Array ( [id] => 11340400 [patent_doc_number] => 20160366156 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-15 [patent_title] => 'Protection of communication on a vehicular network via a remote security service' [patent_app_type] => utility [patent_app_number] => 14/738935 [patent_app_country] => US [patent_app_date] => 2015-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8918 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738935 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/738935
Protection of communication on a vehicular network via a remote security service Jun 14, 2015 Issued
Array ( [id] => 11724484 [patent_doc_number] => 09697340 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-07-04 [patent_title] => 'System and methods with assured one-time, replay-resistant passwords' [patent_app_type] => utility [patent_app_number] => 14/738890 [patent_app_country] => US [patent_app_date] => 2015-06-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 5099 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 189 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738890 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/738890
System and methods with assured one-time, replay-resistant passwords Jun 13, 2015 Issued
Array ( [id] => 10480380 [patent_doc_number] => 20150365397 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-17 [patent_title] => 'WEB AUTHENTICATION METHOD AND SYSTEM' [patent_app_type] => utility [patent_app_number] => 14/738657 [patent_app_country] => US [patent_app_date] => 2015-06-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4306 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738657 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/738657
WEB AUTHENTICATION METHOD AND SYSTEM Jun 11, 2015 Abandoned
Array ( [id] => 17637172 [patent_doc_number] => 11347896 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2022-05-31 [patent_title] => Horizontal scan detection [patent_app_type] => utility [patent_app_number] => 14/738693 [patent_app_country] => US [patent_app_date] => 2015-06-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 12354 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 262 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738693 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/738693
Horizontal scan detection Jun 11, 2015 Issued
Array ( [id] => 11233055 [patent_doc_number] => 09460284 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-10-04 [patent_title] => 'Behavioral malware detection using an interpreter virtual machine' [patent_app_type] => utility [patent_app_number] => 14/738548 [patent_app_country] => US [patent_app_date] => 2015-06-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 10 [patent_no_of_words] => 8327 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 138 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738548 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/738548
Behavioral malware detection using an interpreter virtual machine Jun 11, 2015 Issued
Menu