
Trang T. Doan
Examiner (ID: 5701, Phone: (571)272-0740 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2131, 2431 |
| Total Applications | 760 |
| Issued Applications | 589 |
| Pending Applications | 59 |
| Abandoned Applications | 130 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9604843
[patent_doc_number] => 20140201525
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-17
[patent_title] => 'SYSTEM AND METHOD FOR MULTI-LAYERED SENSITIVE DATA PROTECTION IN A VIRTUAL COMPUTING ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/213881
[patent_app_country] => US
[patent_app_date] => 2014-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 12198
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14213881
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/213881 | System and method for multi-layered sensitive data protection in a virtual computing environment | Mar 13, 2014 | Issued |
Array
(
[id] => 9599474
[patent_doc_number] => 20140196155
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-10
[patent_title] => 'DIGITAL RIGHTS MANAGEMENT (DRM) LOCKER'
[patent_app_type] => utility
[patent_app_number] => 14/204924
[patent_app_country] => US
[patent_app_date] => 2014-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5621
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14204924
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/204924 | Digital rights management (DRM) locker | Mar 10, 2014 | Issued |
Array
(
[id] => 9841240
[patent_doc_number] => 20150033322
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-29
[patent_title] => 'LOGGING ATTACK CONTEXT DATA'
[patent_app_type] => utility
[patent_app_number] => 14/155008
[patent_app_country] => US
[patent_app_date] => 2014-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6352
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14155008
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/155008 | LOGGING ATTACK CONTEXT DATA | Jan 13, 2014 | Abandoned |
Array
(
[id] => 11207196
[patent_doc_number] => 09436823
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-09-06
[patent_title] => 'System and method for detecting malicious code'
[patent_app_type] => utility
[patent_app_number] => 14/109005
[patent_app_country] => US
[patent_app_date] => 2013-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3310
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14109005
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/109005 | System and method for detecting malicious code | Dec 16, 2013 | Issued |
Array
(
[id] => 9903438
[patent_doc_number] => 20150058639
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-26
[patent_title] => 'ENCRYPTION PROCESSING DEVICE AND STORAGE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/108659
[patent_app_country] => US
[patent_app_date] => 2013-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2793
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14108659
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/108659 | ENCRYPTION PROCESSING DEVICE AND STORAGE DEVICE | Dec 16, 2013 | Abandoned |
Array
(
[id] => 10287306
[patent_doc_number] => 20150172304
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-18
[patent_title] => 'SECURE BACKUP WITH ANTI-MALWARE SCAN'
[patent_app_type] => utility
[patent_app_number] => 14/108285
[patent_app_country] => US
[patent_app_date] => 2013-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4086
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14108285
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/108285 | SECURE BACKUP WITH ANTI-MALWARE SCAN | Dec 15, 2013 | Abandoned |
Array
(
[id] => 10132934
[patent_doc_number] => 09166785
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-20
[patent_title] => 'Cryptography processing device and cryptography processing method'
[patent_app_type] => utility
[patent_app_number] => 14/104409
[patent_app_country] => US
[patent_app_date] => 2013-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10775
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14104409
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/104409 | Cryptography processing device and cryptography processing method | Dec 11, 2013 | Issued |
Array
(
[id] => 11316588
[patent_doc_number] => 20160352698
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-01
[patent_title] => 'SECURITY CONTROL METHOD FOR EUICC AND EUICC'
[patent_app_type] => utility
[patent_app_number] => 15/101882
[patent_app_country] => US
[patent_app_date] => 2013-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7186
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15101882
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/101882 | SECURITY CONTROL METHOD FOR EUICC AND EUICC | Dec 4, 2013 | Abandoned |
Array
(
[id] => 9507062
[patent_doc_number] => 08745390
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-06-03
[patent_title] => 'Mutual authentication and key exchange for inter-application communication'
[patent_app_type] => utility
[patent_app_number] => 14/079240
[patent_app_country] => US
[patent_app_date] => 2013-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9439
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 292
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14079240
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/079240 | Mutual authentication and key exchange for inter-application communication | Nov 12, 2013 | Issued |
Array
(
[id] => 9320931
[patent_doc_number] => 20140053269
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-20
[patent_title] => 'ATTACK RESISTANT CONTINUOUS NETWORK SERVICE TRUSTWORTHINESS CONTROLLER'
[patent_app_type] => utility
[patent_app_number] => 14/061914
[patent_app_country] => US
[patent_app_date] => 2013-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 12599
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14061914
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/061914 | ATTACK RESISTANT CONTINUOUS NETWORK SERVICE TRUSTWORTHINESS CONTROLLER | Oct 23, 2013 | Abandoned |
Array
(
[id] => 11340217
[patent_doc_number] => 20160365973
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'Secure Distribution of Watermarked Content'
[patent_app_type] => utility
[patent_app_number] => 14/060867
[patent_app_country] => US
[patent_app_date] => 2013-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 22354
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14060867
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/060867 | Secure Distribution of Watermarked Content | Oct 22, 2013 | Abandoned |
Array
(
[id] => 11359404
[patent_doc_number] => 09536057
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-03
[patent_title] => 'Premises aware security'
[patent_app_type] => utility
[patent_app_number] => 14/126707
[patent_app_country] => US
[patent_app_date] => 2013-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 7073
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14126707
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/126707 | Premises aware security | Oct 17, 2013 | Issued |
Array
(
[id] => 9486840
[patent_doc_number] => 08732803
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-05-20
[patent_title] => 'Automated entity verification'
[patent_app_type] => utility
[patent_app_number] => 14/045127
[patent_app_country] => US
[patent_app_date] => 2013-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 16506
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14045127
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/045127 | Automated entity verification | Oct 2, 2013 | Issued |
Array
(
[id] => 11797555
[patent_doc_number] => 09407435
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-02
[patent_title] => 'Cryptographic key generation based on multiple biometrics'
[patent_app_type] => utility
[patent_app_number] => 14/126469
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 7025
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14126469
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/126469 | Cryptographic key generation based on multiple biometrics | Sep 29, 2013 | Issued |
Array
(
[id] => 9961242
[patent_doc_number] => 09009465
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-14
[patent_title] => 'Augmenting name/prefix based routing protocols with trust anchor in information-centric networks'
[patent_app_type] => utility
[patent_app_number] => 13/970713
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 5022
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13970713
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/970713 | Augmenting name/prefix based routing protocols with trust anchor in information-centric networks | Aug 19, 2013 | Issued |
Array
(
[id] => 10503518
[patent_doc_number] => 09231921
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-05
[patent_title] => 'System and architecture for secure computer devices'
[patent_app_type] => utility
[patent_app_number] => 13/971677
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 4499
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971677
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/971677 | System and architecture for secure computer devices | Aug 19, 2013 | Issued |
Array
(
[id] => 9903712
[patent_doc_number] => 20150058912
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-26
[patent_title] => 'METHOD AND APPARATUS FOR SECURING COMPUTER INTERFACES'
[patent_app_type] => utility
[patent_app_number] => 13/971582
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5633
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971582
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/971582 | Method and apparatus for securing computer interfaces | Aug 19, 2013 | Issued |
Array
(
[id] => 9966745
[patent_doc_number] => 09014370
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-21
[patent_title] => 'High performance hardware-based execution unit for performing C2 block cipher encryption/decryption'
[patent_app_type] => utility
[patent_app_number] => 13/971399
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9408
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971399
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/971399 | High performance hardware-based execution unit for performing C2 block cipher encryption/decryption | Aug 19, 2013 | Issued |
Array
(
[id] => 10152813
[patent_doc_number] => 09185120
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-10
[patent_title] => 'Method and system for mitigating interest flooding attacks in content-centric networks'
[patent_app_type] => utility
[patent_app_number] => 13/971321
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6628
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971321
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/971321 | Method and system for mitigating interest flooding attacks in content-centric networks | Aug 19, 2013 | Issued |
Array
(
[id] => 10124579
[patent_doc_number] => 09158939
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-13
[patent_title] => 'Security chip, program, information processing apparatus, and information processing system'
[patent_app_type] => utility
[patent_app_number] => 13/970692
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 14853
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13970692
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/970692 | Security chip, program, information processing apparatus, and information processing system | Aug 19, 2013 | Issued |