Search

Trang T. Doan

Examiner (ID: 5701, Phone: (571)272-0740 , Office: P/2431 )

Most Active Art Unit
2431
Art Unit(s)
2131, 2431
Total Applications
760
Issued Applications
589
Pending Applications
59
Abandoned Applications
130

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9807925 [patent_doc_number] => 20150019870 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-15 [patent_title] => 'MASTER KEY GENERATION AND DISTRIBUTION FOR STORAGE AREA NETWORK DEVICES' [patent_app_type] => utility [patent_app_number] => 14/472358 [patent_app_country] => US [patent_app_date] => 2014-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 4509 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14472358 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/472358
Master key generation and distribution for storage area network devices Aug 27, 2014 Issued
Array ( [id] => 9841169 [patent_doc_number] => 20150033251 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-29 [patent_title] => 'NETWORK PROTOCOL FOR CONTENTS PROTECTION IN DIGITAL CABLE BROADCASTING SERVICE AND CONDITIONAL ACCESS SYSTEM USING THE PROTOCOL' [patent_app_type] => utility [patent_app_number] => 14/340706 [patent_app_country] => US [patent_app_date] => 2014-07-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5316 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14340706 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/340706
NETWORK PROTOCOL FOR CONTENTS PROTECTION IN DIGITAL CABLE BROADCASTING SERVICE AND CONDITIONAL ACCESS SYSTEM USING THE PROTOCOL Jul 24, 2014 Abandoned
Array ( [id] => 11280727 [patent_doc_number] => 09497215 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-11-15 [patent_title] => 'Stealth mitigation for simulating the success of an attack' [patent_app_type] => utility [patent_app_number] => 14/338653 [patent_app_country] => US [patent_app_date] => 2014-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7292 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 114 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14338653 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/338653
Stealth mitigation for simulating the success of an attack Jul 22, 2014 Issued
Array ( [id] => 9840934 [patent_doc_number] => 20150033016 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-29 [patent_title] => 'SYSTEMS AND METHODS FOR SECURING REAL-TIME MESSAGES' [patent_app_type] => utility [patent_app_number] => 14/339128 [patent_app_country] => US [patent_app_date] => 2014-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 17505 [patent_no_of_claims] => 33 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14339128 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/339128
SYSTEMS AND METHODS FOR SECURING REAL-TIME MESSAGES Jul 22, 2014 Abandoned
Array ( [id] => 9841258 [patent_doc_number] => 20150033340 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-29 [patent_title] => 'SYSTEMS AND METHODS FOR SELF-TUNING NETWORK INTRUSION DETECTION AND PREVENTION' [patent_app_type] => utility [patent_app_number] => 14/338617 [patent_app_country] => US [patent_app_date] => 2014-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 16651 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14338617 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/338617
Systems and methods for self-tuning network intrusion detection and prevention Jul 22, 2014 Issued
Array ( [id] => 10591592 [patent_doc_number] => 09313218 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-04-12 [patent_title] => 'Systems and methods for providing information identifying the trustworthiness of applications on application distribution platforms' [patent_app_type] => utility [patent_app_number] => 14/338539 [patent_app_country] => US [patent_app_date] => 2014-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9797 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 199 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14338539 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/338539
Systems and methods for providing information identifying the trustworthiness of applications on application distribution platforms Jul 22, 2014 Issued
Array ( [id] => 11688256 [patent_doc_number] => 09686312 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-06-20 [patent_title] => 'Verifying network attack detector effectiveness' [patent_app_type] => utility [patent_app_number] => 14/338852 [patent_app_country] => US [patent_app_date] => 2014-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 23 [patent_no_of_words] => 10844 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 14 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14338852 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/338852
Verifying network attack detector effectiveness Jul 22, 2014 Issued
Array ( [id] => 10228653 [patent_doc_number] => 20150113646 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-04-23 [patent_title] => 'APPARATUS AND METHOD FOR IMPROVING DETECTION PERFORMANCE OF INTRUSION DETECTION SYSTEM' [patent_app_type] => utility [patent_app_number] => 14/338917 [patent_app_country] => US [patent_app_date] => 2014-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6234 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14338917 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/338917
Apparatus and method for improving detection performance of intrusion detection system Jul 22, 2014 Issued
Array ( [id] => 10682610 [patent_doc_number] => 20160028755 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-01-28 [patent_title] => 'TRAFFIC SEGREGATION IN DDOS ATTACK ARCHITECTURE' [patent_app_type] => utility [patent_app_number] => 14/339255 [patent_app_country] => US [patent_app_date] => 2014-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8806 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14339255 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/339255
Traffic segregation in DDoS attack architecture Jul 22, 2014 Issued
Array ( [id] => 12196595 [patent_doc_number] => 09900342 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-02-20 [patent_title] => 'Behavioral white labeling' [patent_app_type] => utility [patent_app_number] => 14/338582 [patent_app_country] => US [patent_app_date] => 2014-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 7327 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 199 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14338582 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/338582
Behavioral white labeling Jul 22, 2014 Issued
Array ( [id] => 10934856 [patent_doc_number] => 20140337877 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-11-13 [patent_title] => 'IPTV Follow Me Content System and Method' [patent_app_type] => utility [patent_app_number] => 14/331145 [patent_app_country] => US [patent_app_date] => 2014-07-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 11498 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 12 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14331145 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/331145
IPTV follow me content system and method Jul 13, 2014 Issued
Array ( [id] => 10146084 [patent_doc_number] => 09178906 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-11-03 [patent_title] => 'Detecting and remediating malware dropped by files' [patent_app_type] => utility [patent_app_number] => 14/329624 [patent_app_country] => US [patent_app_date] => 2014-07-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4377 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 155 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14329624 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/329624
Detecting and remediating malware dropped by files Jul 10, 2014 Issued
Array ( [id] => 9974230 [patent_doc_number] => 09021267 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-04-28 [patent_title] => 'System and method for using digital signatures to assign permissions' [patent_app_type] => utility [patent_app_number] => 14/325635 [patent_app_country] => US [patent_app_date] => 2014-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 12 [patent_no_of_words] => 3136 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14325635 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/325635
System and method for using digital signatures to assign permissions Jul 7, 2014 Issued
Array ( [id] => 11352764 [patent_doc_number] => 20160371504 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-22 [patent_title] => 'DATA PROTECTION BASED ON USER AND GESTURE RECOGNITION' [patent_app_type] => utility [patent_app_number] => 14/403024 [patent_app_country] => US [patent_app_date] => 2014-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 16569 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14403024 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/403024
Data protection based on user and gesture recognition Jun 26, 2014 Issued
Array ( [id] => 11724519 [patent_doc_number] => 09697375 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-07-04 [patent_title] => 'Fast data protection using dual file systems' [patent_app_type] => utility [patent_app_number] => 14/401062 [patent_app_country] => US [patent_app_date] => 2014-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 12 [patent_no_of_words] => 13048 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 237 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14401062 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/401062
Fast data protection using dual file systems Jun 26, 2014 Issued
Array ( [id] => 10772980 [patent_doc_number] => 20160119135 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-04-28 [patent_title] => 'SYSTEM AND METHOD FOR SECURING MULTIPLE DATA SEGMENTS HAVING DIFFERENT LENGTHS USING PATTERN KEYS HAVING MULTIPLE DIFFERENT STRENGTHS' [patent_app_type] => utility [patent_app_number] => 14/274090 [patent_app_country] => US [patent_app_date] => 2014-05-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 7985 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14274090 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/274090
SYSTEM AND METHOD FOR SECURING MULTIPLE DATA SEGMENTS HAVING DIFFERENT LENGTHS USING PATTERN KEYS HAVING MULTIPLE DIFFERENT STRENGTHS May 8, 2014 Abandoned
Array ( [id] => 10379077 [patent_doc_number] => 20150264084 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'SYSTEMS AND METHODS FOR PROTECTING ORGANIZATIONS AGAINST SPEAR PHISHING ATTACKS' [patent_app_type] => utility [patent_app_number] => 14/262422 [patent_app_country] => US [patent_app_date] => 2014-04-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 10815 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14262422 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/262422
Systems and methods for protecting organizations against spear phishing attacks Apr 24, 2014 Issued
Array ( [id] => 10922650 [patent_doc_number] => 20140325670 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-10-30 [patent_title] => 'SYSTEM AND METHOD FOR PROVIDING RISK SCORE BASED ON SENSITIVE INFORMATION INSIDE USER DEVICE' [patent_app_type] => utility [patent_app_number] => 14/262305 [patent_app_country] => US [patent_app_date] => 2014-04-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 4054 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14262305 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/262305
SYSTEM AND METHOD FOR PROVIDING RISK SCORE BASED ON SENSITIVE INFORMATION INSIDE USER DEVICE Apr 24, 2014 Abandoned
Array ( [id] => 10425203 [patent_doc_number] => 20150310215 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-29 [patent_title] => 'DISCOVERY AND CLASSIFICATION OF ENTERPRISE ASSETS VIA HOST CHARACTERISTICS' [patent_app_type] => utility [patent_app_number] => 14/262349 [patent_app_country] => US [patent_app_date] => 2014-04-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4938 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14262349 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/262349
Discovery and classification of enterprise assets via host characteristics Apr 24, 2014 Issued
Array ( [id] => 13684525 [patent_doc_number] => 20160380999 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-29 [patent_title] => User Identifier Based Device, Identity and Activity Management System [patent_app_type] => utility [patent_app_number] => 14/385645 [patent_app_country] => US [patent_app_date] => 2014-03-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7544 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14385645 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/385645
User Identifier Based Device, Identity and Activity Management System Mar 16, 2014 Abandoned
Menu