
Trang T. Doan
Examiner (ID: 5701, Phone: (571)272-0740 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2131, 2431 |
| Total Applications | 760 |
| Issued Applications | 589 |
| Pending Applications | 59 |
| Abandoned Applications | 130 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9623309
[patent_doc_number] => 08793504
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-29
[patent_title] => 'Validating a system with multiple subsystems using trusted platform modules and virtual platform modules'
[patent_app_type] => utility
[patent_app_number] => 13/402109
[patent_app_country] => US
[patent_app_date] => 2012-02-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 37
[patent_figures_cnt] => 55
[patent_no_of_words] => 20729
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13402109
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/402109 | Validating a system with multiple subsystems using trusted platform modules and virtual platform modules | Feb 21, 2012 | Issued |
Array
(
[id] => 8214514
[patent_doc_number] => 20120131658
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-24
[patent_title] => 'METHODS AND APPARATUS FOR DYNAMIC USER AUTHENTICATION USING CUSTOMIZABLE CONTEXT-DEPENDENT INTERACTION ACROSS MULTIPLE VERIFICATION OBJECTS'
[patent_app_type] => utility
[patent_app_number] => 13/348165
[patent_app_country] => US
[patent_app_date] => 2012-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7022
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0131/20120131658.pdf
[firstpage_image] =>[orig_patent_app_number] => 13348165
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/348165 | Methods and apparatus for dynamic user authentication using customizable context-dependent interaction across multiple verification objects | Jan 10, 2012 | Issued |
Array
(
[id] => 8491425
[patent_doc_number] => 20120290832
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-15
[patent_title] => 'SYSTEM FOR CONDUCTING REMOTE BIOMETRIC OPERATIONS'
[patent_app_type] => utility
[patent_app_number] => 13/340259
[patent_app_country] => US
[patent_app_date] => 2011-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2903
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13340259
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/340259 | System for conducting remote biometric operations | Dec 28, 2011 | Issued |
Array
(
[id] => 8097903
[patent_doc_number] => 20120084556
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-05
[patent_title] => 'SYSTEM AND METHOD FOR RETRIEVING RELATED CERTIFICATES'
[patent_app_type] => utility
[patent_app_number] => 13/324364
[patent_app_country] => US
[patent_app_date] => 2011-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11390
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0084/20120084556.pdf
[firstpage_image] =>[orig_patent_app_number] => 13324364
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/324364 | System and method for retrieving related certificates | Dec 12, 2011 | Issued |
Array
(
[id] => 9044568
[patent_doc_number] => 20130247206
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-19
[patent_title] => 'SYSTEM AND METHOD FOR GROUPING COMPUTER VULNERABILITIES'
[patent_app_type] => utility
[patent_app_number] => 13/239271
[patent_app_country] => US
[patent_app_date] => 2011-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10503
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13239271
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/239271 | System and method for grouping computer vulnerabilities | Sep 20, 2011 | Issued |
Array
(
[id] => 10536993
[patent_doc_number] => 09262624
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-16
[patent_title] => 'Device-tailored whitelists'
[patent_app_type] => utility
[patent_app_number] => 13/234985
[patent_app_country] => US
[patent_app_date] => 2011-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9336
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13234985
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/234985 | Device-tailored whitelists | Sep 15, 2011 | Issued |
Array
(
[id] => 11285785
[patent_doc_number] => 09501640
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-22
[patent_title] => 'System and method for statistical analysis of comparative entropy'
[patent_app_type] => utility
[patent_app_number] => 13/232718
[patent_app_country] => US
[patent_app_date] => 2011-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 8883
[patent_no_of_claims] => 50
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13232718
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/232718 | System and method for statistical analysis of comparative entropy | Sep 13, 2011 | Issued |
Array
(
[id] => 7671538
[patent_doc_number] => 20110320807
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-29
[patent_title] => 'SYSTEM AND METHOD FOR PROCESSING ENCODED MESSAGES'
[patent_app_type] => utility
[patent_app_number] => 13/228485
[patent_app_country] => US
[patent_app_date] => 2011-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 16171
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13228485
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/228485 | System and method for processing encoded messages | Sep 8, 2011 | Issued |
Array
(
[id] => 11899197
[patent_doc_number] => 09769145
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-19
[patent_title] => 'Method and apparatus for connecting to online service'
[patent_app_type] => utility
[patent_app_number] => 13/226958
[patent_app_country] => US
[patent_app_date] => 2011-09-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 3858
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 12
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13226958
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/226958 | Method and apparatus for connecting to online service | Sep 6, 2011 | Issued |
Array
(
[id] => 8985433
[patent_doc_number] => 08516563
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-20
[patent_title] => 'Methods for authenticating a user without personal information and devices thereof'
[patent_app_type] => utility
[patent_app_number] => 13/218515
[patent_app_country] => US
[patent_app_date] => 2011-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3429
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13218515
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/218515 | Methods for authenticating a user without personal information and devices thereof | Aug 25, 2011 | Issued |
Array
(
[id] => 9540489
[patent_doc_number] => 20140165137
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-12
[patent_title] => 'Data Leak Prevention Systems and Methods'
[patent_app_type] => utility
[patent_app_number] => 14/126700
[patent_app_country] => US
[patent_app_date] => 2011-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8347
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14126700
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/126700 | Data leak prevention systems and methods | Aug 25, 2011 | Issued |
Array
(
[id] => 8536098
[patent_doc_number] => 08312261
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-11-13
[patent_title] => 'Method and system for verification of an endpoint security scan'
[patent_app_type] => utility
[patent_app_number] => 13/208970
[patent_app_country] => US
[patent_app_date] => 2011-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 14
[patent_no_of_words] => 14031
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13208970
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/208970 | Method and system for verification of an endpoint security scan | Aug 11, 2011 | Issued |
Array
(
[id] => 8824204
[patent_doc_number] => 20130125250
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-16
[patent_title] => 'ANTI-TAMPER DEVICE FOR INTEGRATED CIRCUITS'
[patent_app_type] => utility
[patent_app_number] => 13/519654
[patent_app_country] => US
[patent_app_date] => 2011-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 2957
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13519654
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/519654 | Anti-tamper device for integrated circuits | Jul 14, 2011 | Issued |
Array
(
[id] => 9479760
[patent_doc_number] => 20140137223
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-15
[patent_title] => 'METHOD AND APPARATUS FOR AUTHENTICATING USERS OF A HYBRID TERMINAL'
[patent_app_type] => utility
[patent_app_number] => 14/126518
[patent_app_country] => US
[patent_app_date] => 2011-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6703
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14126518
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/126518 | METHOD AND APPARATUS FOR AUTHENTICATING USERS OF A HYBRID TERMINAL | Jun 15, 2011 | Abandoned |
Array
(
[id] => 8687075
[patent_doc_number] => 20130055359
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-02-28
[patent_title] => 'SECRET INFORMATION LEAKAGE PREVENTION SYSTEM, SECRET INFORMATION LEAKAGE PREVENTION METHOD AND SECRET INFORMATION LEAKAGE PREVENTION PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/695543
[patent_app_country] => US
[patent_app_date] => 2011-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11796
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13695543
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/695543 | Secret information leakage prevention system, secret information leakage prevention method and secret information leakage prevention program | May 31, 2011 | Issued |
Array
(
[id] => 8504879
[patent_doc_number] => 20120304287
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-29
[patent_title] => 'AUTOMATIC DETECTION OF SEARCH RESULTS POISONING ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 13/116012
[patent_app_country] => US
[patent_app_date] => 2011-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4495
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13116012
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/116012 | Automatic detection of search results poisoning attacks | May 25, 2011 | Issued |
Array
(
[id] => 9377711
[patent_doc_number] => 08681986
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-25
[patent_title] => 'Single-round password-based key exchange protocols'
[patent_app_type] => utility
[patent_app_number] => 13/115720
[patent_app_country] => US
[patent_app_date] => 2011-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 4829
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13115720
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/115720 | Single-round password-based key exchange protocols | May 24, 2011 | Issued |
Array
(
[id] => 9886302
[patent_doc_number] => 08973088
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-03-03
[patent_title] => 'Policy enforcement using host information profile'
[patent_app_type] => utility
[patent_app_number] => 13/115022
[patent_app_country] => US
[patent_app_date] => 2011-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 13
[patent_no_of_words] => 9309
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 309
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13115022
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/115022 | Policy enforcement using host information profile | May 23, 2011 | Issued |
Array
(
[id] => 9170146
[patent_doc_number] => 08595840
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-11-26
[patent_title] => 'Detection of computer network data streams from a malware and its variants'
[patent_app_type] => utility
[patent_app_number] => 13/114881
[patent_app_country] => US
[patent_app_date] => 2011-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 2674
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13114881
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/114881 | Detection of computer network data streams from a malware and its variants | May 23, 2011 | Issued |
Array
(
[id] => 8230252
[patent_doc_number] => 20120144451
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-07
[patent_title] => 'GEOLOCATING NETWORK NODES IN ATTENUATED ENVIRONMENTS FOR CYBER AND NETWORK SECURITY APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 13/114013
[patent_app_country] => US
[patent_app_date] => 2011-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8281
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13114013
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/114013 | Geolocating network nodes in attenuated environments for cyber and network security applications | May 22, 2011 | Issued |