
Trang T. Doan
Examiner (ID: 5701, Phone: (571)272-0740 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2131, 2431 |
| Total Applications | 760 |
| Issued Applications | 589 |
| Pending Applications | 59 |
| Abandoned Applications | 130 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11477100
[patent_doc_number] => 20170063883
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'METADATA INFORMATION BASED FILE PROCESSING'
[patent_app_type] => utility
[patent_app_number] => 14/836685
[patent_app_country] => US
[patent_app_date] => 2015-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10126
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14836685
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/836685 | METADATA INFORMATION BASED FILE PROCESSING | Aug 25, 2015 | Abandoned |
Array
(
[id] => 12256231
[patent_doc_number] => 09928377
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-27
[patent_title] => 'Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (CCS)'
[patent_app_type] => utility
[patent_app_number] => 14/835640
[patent_app_country] => US
[patent_app_date] => 2015-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 19
[patent_no_of_words] => 20557
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14835640
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/835640 | Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (CCS) | Aug 24, 2015 | Issued |
Array
(
[id] => 13952751
[patent_doc_number] => 10212165
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-02-19
[patent_title] => Secured vital sign data group streams
[patent_app_type] => utility
[patent_app_number] => 14/835341
[patent_app_country] => US
[patent_app_date] => 2015-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6052
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14835341
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/835341 | Secured vital sign data group streams | Aug 24, 2015 | Issued |
Array
(
[id] => 11080405
[patent_doc_number] => 20160277368
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-22
[patent_title] => 'SYSTEMS AND METHODS OF PER-DOCUMENT ENCRYPTION OF ENTERPRISE INFORMATION STORED ON A CLOUD COMPUTING SERVICE (CCS)'
[patent_app_type] => utility
[patent_app_number] => 14/835632
[patent_app_country] => US
[patent_app_date] => 2015-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 20502
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14835632
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/835632 | Systems and methods of per-document encryption of enterprise information stored on a cloud computing service (CCS) | Aug 24, 2015 | Issued |
Array
(
[id] => 15762075
[patent_doc_number] => 10623176
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-14
[patent_title] => Authentication encryption method, authentication decryption method, and information-processing device
[patent_app_type] => utility
[patent_app_number] => 15/504886
[patent_app_country] => US
[patent_app_date] => 2015-08-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 16661
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15504886
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/504886 | Authentication encryption method, authentication decryption method, and information-processing device | Aug 17, 2015 | Issued |
Array
(
[id] => 11111703
[patent_doc_number] => 20160308674
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-20
[patent_title] => 'DATA PROTECTION FOR KEYCHAIN SYNCING'
[patent_app_type] => utility
[patent_app_number] => 14/827532
[patent_app_country] => US
[patent_app_date] => 2015-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 29
[patent_figures_cnt] => 29
[patent_no_of_words] => 24786
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14827532
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/827532 | Data protection for keychain syncing | Aug 16, 2015 | Issued |
Array
(
[id] => 10465215
[patent_doc_number] => 20150350230
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'CONTROLLING MALICIOUS ACTIVITY DETECTION USING BEHAVIORAL MODELS'
[patent_app_type] => utility
[patent_app_number] => 14/815990
[patent_app_country] => US
[patent_app_date] => 2015-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 8385
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14815990
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/815990 | Controlling malicious activity detection using behavioral models | Jul 31, 2015 | Issued |
Array
(
[id] => 10697717
[patent_doc_number] => 20160043864
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-11
[patent_title] => 'STORING A KEY IN A REMOTE SECURITY MODULE'
[patent_app_type] => utility
[patent_app_number] => 14/797214
[patent_app_country] => US
[patent_app_date] => 2015-07-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9190
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14797214
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/797214 | Storing a key in a remote security module | Jul 12, 2015 | Issued |
Array
(
[id] => 10497162
[patent_doc_number] => 20150382185
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'METHOD AND DEVICE FOR COUPLING TWO COMMUNICATION PARTNERS'
[patent_app_type] => utility
[patent_app_number] => 14/739120
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2509
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739120
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/739120 | Method and device for coupling two communication partners | Jun 14, 2015 | Issued |
Array
(
[id] => 10688549
[patent_doc_number] => 20160034693
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'CERTIFICATE AUTHORITY OPERATION APPARATUS AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/738986
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 23259
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738986
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738986 | CERTIFICATE AUTHORITY OPERATION APPARATUS AND METHOD | Jun 14, 2015 | Abandoned |
Array
(
[id] => 10682561
[patent_doc_number] => 20160028706
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-28
[patent_title] => 'DISPLAYING THE ACCESSIBILITY OF HYPERLINKED FILES'
[patent_app_type] => utility
[patent_app_number] => 14/739117
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7315
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739117
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/739117 | Displaying the accessibility of hyperlinked files | Jun 14, 2015 | Issued |
Array
(
[id] => 10496614
[patent_doc_number] => 20150381637
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'SYSTEM AND METHODS FOR MALWARE DETECTION USING LOG BASED CROWDSOURCING ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 14/738959
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11428
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738959
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738959 | System and methods for malware detection using log based crowdsourcing analysis | Jun 14, 2015 | Issued |
Array
(
[id] => 11340370
[patent_doc_number] => 20160366126
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'SCREEN-ANALYSIS BASED DEVICE SECURITY'
[patent_app_type] => utility
[patent_app_number] => 14/739107
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12895
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739107
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/739107 | Screen-analysis based device security | Jun 14, 2015 | Issued |
Array
(
[id] => 12146891
[patent_doc_number] => 09881144
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-30
[patent_title] => 'Identifying usage of code'
[patent_app_type] => utility
[patent_app_number] => 14/738998
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7097
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738998
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738998 | Identifying usage of code | Jun 14, 2015 | Issued |
Array
(
[id] => 11863056
[patent_doc_number] => 09742760
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-08-22
[patent_title] => 'System and method for improving login and registration efficiency to network-accessed data'
[patent_app_type] => utility
[patent_app_number] => 14/739118
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6275
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739118
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/739118 | System and method for improving login and registration efficiency to network-accessed data | Jun 14, 2015 | Issued |
Array
(
[id] => 11340400
[patent_doc_number] => 20160366156
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'Protection of communication on a vehicular network via a remote security service'
[patent_app_type] => utility
[patent_app_number] => 14/738935
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8918
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738935
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738935 | Protection of communication on a vehicular network via a remote security service | Jun 14, 2015 | Issued |
Array
(
[id] => 11724484
[patent_doc_number] => 09697340
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-04
[patent_title] => 'System and methods with assured one-time, replay-resistant passwords'
[patent_app_type] => utility
[patent_app_number] => 14/738890
[patent_app_country] => US
[patent_app_date] => 2015-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5099
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738890
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738890 | System and methods with assured one-time, replay-resistant passwords | Jun 13, 2015 | Issued |
Array
(
[id] => 10480380
[patent_doc_number] => 20150365397
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-17
[patent_title] => 'WEB AUTHENTICATION METHOD AND SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/738657
[patent_app_country] => US
[patent_app_date] => 2015-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4306
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738657
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738657 | WEB AUTHENTICATION METHOD AND SYSTEM | Jun 11, 2015 | Abandoned |
Array
(
[id] => 17637172
[patent_doc_number] => 11347896
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-05-31
[patent_title] => Horizontal scan detection
[patent_app_type] => utility
[patent_app_number] => 14/738693
[patent_app_country] => US
[patent_app_date] => 2015-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12354
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 262
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738693
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738693 | Horizontal scan detection | Jun 11, 2015 | Issued |
Array
(
[id] => 11233055
[patent_doc_number] => 09460284
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-10-04
[patent_title] => 'Behavioral malware detection using an interpreter virtual machine'
[patent_app_type] => utility
[patent_app_number] => 14/738548
[patent_app_country] => US
[patent_app_date] => 2015-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 8327
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14738548
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/738548 | Behavioral malware detection using an interpreter virtual machine | Jun 11, 2015 | Issued |