
Trang T. Doan
Examiner (ID: 5701, Phone: (571)272-0740 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2131, 2431 |
| Total Applications | 760 |
| Issued Applications | 589 |
| Pending Applications | 59 |
| Abandoned Applications | 130 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9807925
[patent_doc_number] => 20150019870
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-15
[patent_title] => 'MASTER KEY GENERATION AND DISTRIBUTION FOR STORAGE AREA NETWORK DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/472358
[patent_app_country] => US
[patent_app_date] => 2014-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4509
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14472358
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/472358 | Master key generation and distribution for storage area network devices | Aug 27, 2014 | Issued |
Array
(
[id] => 9841169
[patent_doc_number] => 20150033251
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-29
[patent_title] => 'NETWORK PROTOCOL FOR CONTENTS PROTECTION IN DIGITAL CABLE BROADCASTING SERVICE AND CONDITIONAL ACCESS SYSTEM USING THE PROTOCOL'
[patent_app_type] => utility
[patent_app_number] => 14/340706
[patent_app_country] => US
[patent_app_date] => 2014-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5316
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14340706
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/340706 | NETWORK PROTOCOL FOR CONTENTS PROTECTION IN DIGITAL CABLE BROADCASTING SERVICE AND CONDITIONAL ACCESS SYSTEM USING THE PROTOCOL | Jul 24, 2014 | Abandoned |
Array
(
[id] => 11280727
[patent_doc_number] => 09497215
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-15
[patent_title] => 'Stealth mitigation for simulating the success of an attack'
[patent_app_type] => utility
[patent_app_number] => 14/338653
[patent_app_country] => US
[patent_app_date] => 2014-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7292
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14338653
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/338653 | Stealth mitigation for simulating the success of an attack | Jul 22, 2014 | Issued |
Array
(
[id] => 9840934
[patent_doc_number] => 20150033016
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-29
[patent_title] => 'SYSTEMS AND METHODS FOR SECURING REAL-TIME MESSAGES'
[patent_app_type] => utility
[patent_app_number] => 14/339128
[patent_app_country] => US
[patent_app_date] => 2014-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 17505
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14339128
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/339128 | SYSTEMS AND METHODS FOR SECURING REAL-TIME MESSAGES | Jul 22, 2014 | Abandoned |
Array
(
[id] => 9841258
[patent_doc_number] => 20150033340
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-29
[patent_title] => 'SYSTEMS AND METHODS FOR SELF-TUNING NETWORK INTRUSION DETECTION AND PREVENTION'
[patent_app_type] => utility
[patent_app_number] => 14/338617
[patent_app_country] => US
[patent_app_date] => 2014-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 16651
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14338617
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/338617 | Systems and methods for self-tuning network intrusion detection and prevention | Jul 22, 2014 | Issued |
Array
(
[id] => 10591592
[patent_doc_number] => 09313218
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-04-12
[patent_title] => 'Systems and methods for providing information identifying the trustworthiness of applications on application distribution platforms'
[patent_app_type] => utility
[patent_app_number] => 14/338539
[patent_app_country] => US
[patent_app_date] => 2014-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9797
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14338539
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/338539 | Systems and methods for providing information identifying the trustworthiness of applications on application distribution platforms | Jul 22, 2014 | Issued |
Array
(
[id] => 11688256
[patent_doc_number] => 09686312
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-20
[patent_title] => 'Verifying network attack detector effectiveness'
[patent_app_type] => utility
[patent_app_number] => 14/338852
[patent_app_country] => US
[patent_app_date] => 2014-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 23
[patent_no_of_words] => 10844
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 14
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14338852
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/338852 | Verifying network attack detector effectiveness | Jul 22, 2014 | Issued |
Array
(
[id] => 10228653
[patent_doc_number] => 20150113646
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-23
[patent_title] => 'APPARATUS AND METHOD FOR IMPROVING DETECTION PERFORMANCE OF INTRUSION DETECTION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/338917
[patent_app_country] => US
[patent_app_date] => 2014-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6234
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14338917
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/338917 | Apparatus and method for improving detection performance of intrusion detection system | Jul 22, 2014 | Issued |
Array
(
[id] => 10682610
[patent_doc_number] => 20160028755
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-28
[patent_title] => 'TRAFFIC SEGREGATION IN DDOS ATTACK ARCHITECTURE'
[patent_app_type] => utility
[patent_app_number] => 14/339255
[patent_app_country] => US
[patent_app_date] => 2014-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8806
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14339255
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/339255 | Traffic segregation in DDoS attack architecture | Jul 22, 2014 | Issued |
Array
(
[id] => 12196595
[patent_doc_number] => 09900342
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-20
[patent_title] => 'Behavioral white labeling'
[patent_app_type] => utility
[patent_app_number] => 14/338582
[patent_app_country] => US
[patent_app_date] => 2014-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7327
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14338582
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/338582 | Behavioral white labeling | Jul 22, 2014 | Issued |
Array
(
[id] => 10934856
[patent_doc_number] => 20140337877
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-13
[patent_title] => 'IPTV Follow Me Content System and Method'
[patent_app_type] => utility
[patent_app_number] => 14/331145
[patent_app_country] => US
[patent_app_date] => 2014-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11498
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 12
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14331145
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/331145 | IPTV follow me content system and method | Jul 13, 2014 | Issued |
Array
(
[id] => 10146084
[patent_doc_number] => 09178906
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-11-03
[patent_title] => 'Detecting and remediating malware dropped by files'
[patent_app_type] => utility
[patent_app_number] => 14/329624
[patent_app_country] => US
[patent_app_date] => 2014-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4377
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14329624
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/329624 | Detecting and remediating malware dropped by files | Jul 10, 2014 | Issued |
Array
(
[id] => 9974230
[patent_doc_number] => 09021267
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-28
[patent_title] => 'System and method for using digital signatures to assign permissions'
[patent_app_type] => utility
[patent_app_number] => 14/325635
[patent_app_country] => US
[patent_app_date] => 2014-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 12
[patent_no_of_words] => 3136
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14325635
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/325635 | System and method for using digital signatures to assign permissions | Jul 7, 2014 | Issued |
Array
(
[id] => 11352764
[patent_doc_number] => 20160371504
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'DATA PROTECTION BASED ON USER AND GESTURE RECOGNITION'
[patent_app_type] => utility
[patent_app_number] => 14/403024
[patent_app_country] => US
[patent_app_date] => 2014-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 16569
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14403024
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/403024 | Data protection based on user and gesture recognition | Jun 26, 2014 | Issued |
Array
(
[id] => 11724519
[patent_doc_number] => 09697375
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-04
[patent_title] => 'Fast data protection using dual file systems'
[patent_app_type] => utility
[patent_app_number] => 14/401062
[patent_app_country] => US
[patent_app_date] => 2014-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 12
[patent_no_of_words] => 13048
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14401062
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/401062 | Fast data protection using dual file systems | Jun 26, 2014 | Issued |
Array
(
[id] => 10772980
[patent_doc_number] => 20160119135
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'SYSTEM AND METHOD FOR SECURING MULTIPLE DATA SEGMENTS HAVING DIFFERENT LENGTHS USING PATTERN KEYS HAVING MULTIPLE DIFFERENT STRENGTHS'
[patent_app_type] => utility
[patent_app_number] => 14/274090
[patent_app_country] => US
[patent_app_date] => 2014-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7985
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14274090
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/274090 | SYSTEM AND METHOD FOR SECURING MULTIPLE DATA SEGMENTS HAVING DIFFERENT LENGTHS USING PATTERN KEYS HAVING MULTIPLE DIFFERENT STRENGTHS | May 8, 2014 | Abandoned |
Array
(
[id] => 10379077
[patent_doc_number] => 20150264084
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'SYSTEMS AND METHODS FOR PROTECTING ORGANIZATIONS AGAINST SPEAR PHISHING ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 14/262422
[patent_app_country] => US
[patent_app_date] => 2014-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10815
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14262422
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/262422 | Systems and methods for protecting organizations against spear phishing attacks | Apr 24, 2014 | Issued |
Array
(
[id] => 10922650
[patent_doc_number] => 20140325670
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-30
[patent_title] => 'SYSTEM AND METHOD FOR PROVIDING RISK SCORE BASED ON SENSITIVE INFORMATION INSIDE USER DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/262305
[patent_app_country] => US
[patent_app_date] => 2014-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4054
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14262305
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/262305 | SYSTEM AND METHOD FOR PROVIDING RISK SCORE BASED ON SENSITIVE INFORMATION INSIDE USER DEVICE | Apr 24, 2014 | Abandoned |
Array
(
[id] => 10425203
[patent_doc_number] => 20150310215
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-29
[patent_title] => 'DISCOVERY AND CLASSIFICATION OF ENTERPRISE ASSETS VIA HOST CHARACTERISTICS'
[patent_app_type] => utility
[patent_app_number] => 14/262349
[patent_app_country] => US
[patent_app_date] => 2014-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4938
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14262349
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/262349 | Discovery and classification of enterprise assets via host characteristics | Apr 24, 2014 | Issued |
Array
(
[id] => 13684525
[patent_doc_number] => 20160380999
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-29
[patent_title] => User Identifier Based Device, Identity and Activity Management System
[patent_app_type] => utility
[patent_app_number] => 14/385645
[patent_app_country] => US
[patent_app_date] => 2014-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7544
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14385645
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/385645 | User Identifier Based Device, Identity and Activity Management System | Mar 16, 2014 | Abandoned |