Search

Trang T. Doan

Examiner (ID: 5701, Phone: (571)272-0740 , Office: P/2431 )

Most Active Art Unit
2431
Art Unit(s)
2131, 2431
Total Applications
760
Issued Applications
589
Pending Applications
59
Abandoned Applications
130

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9604843 [patent_doc_number] => 20140201525 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-17 [patent_title] => 'SYSTEM AND METHOD FOR MULTI-LAYERED SENSITIVE DATA PROTECTION IN A VIRTUAL COMPUTING ENVIRONMENT' [patent_app_type] => utility [patent_app_number] => 14/213881 [patent_app_country] => US [patent_app_date] => 2014-03-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 12198 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14213881 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/213881
System and method for multi-layered sensitive data protection in a virtual computing environment Mar 13, 2014 Issued
Array ( [id] => 9599474 [patent_doc_number] => 20140196155 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-10 [patent_title] => 'DIGITAL RIGHTS MANAGEMENT (DRM) LOCKER' [patent_app_type] => utility [patent_app_number] => 14/204924 [patent_app_country] => US [patent_app_date] => 2014-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5621 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14204924 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/204924
Digital rights management (DRM) locker Mar 10, 2014 Issued
Array ( [id] => 9841240 [patent_doc_number] => 20150033322 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-29 [patent_title] => 'LOGGING ATTACK CONTEXT DATA' [patent_app_type] => utility [patent_app_number] => 14/155008 [patent_app_country] => US [patent_app_date] => 2014-01-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6352 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14155008 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/155008
LOGGING ATTACK CONTEXT DATA Jan 13, 2014 Abandoned
Array ( [id] => 11207196 [patent_doc_number] => 09436823 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-09-06 [patent_title] => 'System and method for detecting malicious code' [patent_app_type] => utility [patent_app_number] => 14/109005 [patent_app_country] => US [patent_app_date] => 2013-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3310 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 128 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14109005 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/109005
System and method for detecting malicious code Dec 16, 2013 Issued
Array ( [id] => 9903438 [patent_doc_number] => 20150058639 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-26 [patent_title] => 'ENCRYPTION PROCESSING DEVICE AND STORAGE DEVICE' [patent_app_type] => utility [patent_app_number] => 14/108659 [patent_app_country] => US [patent_app_date] => 2013-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2793 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14108659 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/108659
ENCRYPTION PROCESSING DEVICE AND STORAGE DEVICE Dec 16, 2013 Abandoned
Array ( [id] => 10287306 [patent_doc_number] => 20150172304 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-06-18 [patent_title] => 'SECURE BACKUP WITH ANTI-MALWARE SCAN' [patent_app_type] => utility [patent_app_number] => 14/108285 [patent_app_country] => US [patent_app_date] => 2013-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4086 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14108285 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/108285
SECURE BACKUP WITH ANTI-MALWARE SCAN Dec 15, 2013 Abandoned
Array ( [id] => 10132934 [patent_doc_number] => 09166785 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-20 [patent_title] => 'Cryptography processing device and cryptography processing method' [patent_app_type] => utility [patent_app_number] => 14/104409 [patent_app_country] => US [patent_app_date] => 2013-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 10775 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 246 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14104409 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/104409
Cryptography processing device and cryptography processing method Dec 11, 2013 Issued
Array ( [id] => 11316588 [patent_doc_number] => 20160352698 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-01 [patent_title] => 'SECURITY CONTROL METHOD FOR EUICC AND EUICC' [patent_app_type] => utility [patent_app_number] => 15/101882 [patent_app_country] => US [patent_app_date] => 2013-12-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7186 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15101882 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/101882
SECURITY CONTROL METHOD FOR EUICC AND EUICC Dec 4, 2013 Abandoned
Array ( [id] => 9507062 [patent_doc_number] => 08745390 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-06-03 [patent_title] => 'Mutual authentication and key exchange for inter-application communication' [patent_app_type] => utility [patent_app_number] => 14/079240 [patent_app_country] => US [patent_app_date] => 2013-11-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9439 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 292 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14079240 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/079240
Mutual authentication and key exchange for inter-application communication Nov 12, 2013 Issued
Array ( [id] => 9320931 [patent_doc_number] => 20140053269 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-02-20 [patent_title] => 'ATTACK RESISTANT CONTINUOUS NETWORK SERVICE TRUSTWORTHINESS CONTROLLER' [patent_app_type] => utility [patent_app_number] => 14/061914 [patent_app_country] => US [patent_app_date] => 2013-10-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 12599 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14061914 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/061914
ATTACK RESISTANT CONTINUOUS NETWORK SERVICE TRUSTWORTHINESS CONTROLLER Oct 23, 2013 Abandoned
Array ( [id] => 11340217 [patent_doc_number] => 20160365973 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-15 [patent_title] => 'Secure Distribution of Watermarked Content' [patent_app_type] => utility [patent_app_number] => 14/060867 [patent_app_country] => US [patent_app_date] => 2013-10-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 22354 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14060867 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/060867
Secure Distribution of Watermarked Content Oct 22, 2013 Abandoned
Array ( [id] => 11359404 [patent_doc_number] => 09536057 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-01-03 [patent_title] => 'Premises aware security' [patent_app_type] => utility [patent_app_number] => 14/126707 [patent_app_country] => US [patent_app_date] => 2013-10-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 7073 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14126707 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/126707
Premises aware security Oct 17, 2013 Issued
Array ( [id] => 9486840 [patent_doc_number] => 08732803 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-05-20 [patent_title] => 'Automated entity verification' [patent_app_type] => utility [patent_app_number] => 14/045127 [patent_app_country] => US [patent_app_date] => 2013-10-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 16506 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 176 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14045127 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/045127
Automated entity verification Oct 2, 2013 Issued
Array ( [id] => 11797555 [patent_doc_number] => 09407435 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-08-02 [patent_title] => 'Cryptographic key generation based on multiple biometrics' [patent_app_type] => utility [patent_app_number] => 14/126469 [patent_app_country] => US [patent_app_date] => 2013-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 13 [patent_no_of_words] => 7025 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 188 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14126469 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/126469
Cryptographic key generation based on multiple biometrics Sep 29, 2013 Issued
Array ( [id] => 9961242 [patent_doc_number] => 09009465 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-04-14 [patent_title] => 'Augmenting name/prefix based routing protocols with trust anchor in information-centric networks' [patent_app_type] => utility [patent_app_number] => 13/970713 [patent_app_country] => US [patent_app_date] => 2013-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 8 [patent_no_of_words] => 5022 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 106 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13970713 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/970713
Augmenting name/prefix based routing protocols with trust anchor in information-centric networks Aug 19, 2013 Issued
Array ( [id] => 10503518 [patent_doc_number] => 09231921 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-01-05 [patent_title] => 'System and architecture for secure computer devices' [patent_app_type] => utility [patent_app_number] => 13/971677 [patent_app_country] => US [patent_app_date] => 2013-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 4499 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971677 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/971677
System and architecture for secure computer devices Aug 19, 2013 Issued
Array ( [id] => 9903712 [patent_doc_number] => 20150058912 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-26 [patent_title] => 'METHOD AND APPARATUS FOR SECURING COMPUTER INTERFACES' [patent_app_type] => utility [patent_app_number] => 13/971582 [patent_app_country] => US [patent_app_date] => 2013-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5633 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971582 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/971582
Method and apparatus for securing computer interfaces Aug 19, 2013 Issued
Array ( [id] => 9966745 [patent_doc_number] => 09014370 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-04-21 [patent_title] => 'High performance hardware-based execution unit for performing C2 block cipher encryption/decryption' [patent_app_type] => utility [patent_app_number] => 13/971399 [patent_app_country] => US [patent_app_date] => 2013-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9408 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 177 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971399 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/971399
High performance hardware-based execution unit for performing C2 block cipher encryption/decryption Aug 19, 2013 Issued
Array ( [id] => 10152813 [patent_doc_number] => 09185120 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-10 [patent_title] => 'Method and system for mitigating interest flooding attacks in content-centric networks' [patent_app_type] => utility [patent_app_number] => 13/971321 [patent_app_country] => US [patent_app_date] => 2013-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6628 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 101 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971321 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/971321
Method and system for mitigating interest flooding attacks in content-centric networks Aug 19, 2013 Issued
Array ( [id] => 10124579 [patent_doc_number] => 09158939 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-13 [patent_title] => 'Security chip, program, information processing apparatus, and information processing system' [patent_app_type] => utility [patent_app_number] => 13/970692 [patent_app_country] => US [patent_app_date] => 2013-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 21 [patent_no_of_words] => 14853 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 125 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13970692 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/970692
Security chip, program, information processing apparatus, and information processing system Aug 19, 2013 Issued
Menu