
Minh Nhut Tang
Examiner (ID: 9810)
| Most Active Art Unit | 2829 |
| Art Unit(s) | 2867, 2858, 2829 |
| Total Applications | 1807 |
| Issued Applications | 1580 |
| Pending Applications | 33 |
| Abandoned Applications | 201 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16434003
[patent_doc_number] => 10834108
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-10
[patent_title] => Data protection in a networked computing environment
[patent_app_type] => utility
[patent_app_number] => 16/509844
[patent_app_country] => US
[patent_app_date] => 2019-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8615
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16509844
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/509844 | Data protection in a networked computing environment | Jul 11, 2019 | Issued |
Array
(
[id] => 15047761
[patent_doc_number] => 20190334885
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-31
[patent_title] => SYSTEMS AND METHODS FOR PROVIDING MULTIMEDIA CONTENT WITHIN AN APPLICATION AND A SECURITY SOLUTION INTEGRATED THEREIN
[patent_app_type] => utility
[patent_app_number] => 16/507907
[patent_app_country] => US
[patent_app_date] => 2019-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11541
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16507907
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/507907 | SYSTEMS AND METHODS FOR PROVIDING MULTIMEDIA CONTENT WITHIN AN APPLICATION AND A SECURITY SOLUTION INTEGRATED THEREIN | Jul 9, 2019 | Abandoned |
Array
(
[id] => 16496857
[patent_doc_number] => 10862920
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-12-08
[patent_title] => Systems and methods for dynamic network security control and configuration
[patent_app_type] => utility
[patent_app_number] => 16/508147
[patent_app_country] => US
[patent_app_date] => 2019-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10773
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16508147
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/508147 | Systems and methods for dynamic network security control and configuration | Jul 9, 2019 | Issued |
Array
(
[id] => 15043595
[patent_doc_number] => 20190332802
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-31
[patent_title] => DATA PROCESSING SYSTEMS FOR IDENTIFYING AND MODIFYING PROCESSES THAT ARE SUBJECT TO DATA SUBJECT ACCESS REQUESTS
[patent_app_type] => utility
[patent_app_number] => 16/505426
[patent_app_country] => US
[patent_app_date] => 2019-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 31799
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16505426
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/505426 | Data processing systems for identifying and modifying processes that are subject to data subject access requests | Jul 7, 2019 | Issued |
Array
(
[id] => 15486903
[patent_doc_number] => 10558802
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-11
[patent_title] => Moving target defenses for data storage devices
[patent_app_type] => utility
[patent_app_number] => 16/453563
[patent_app_country] => US
[patent_app_date] => 2019-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3107
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16453563
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/453563 | Moving target defenses for data storage devices | Jun 25, 2019 | Issued |
Array
(
[id] => 17041536
[patent_doc_number] => 20210258172
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-08-19
[patent_title] => METHOD FOR MONITORING DIGITAL CERTIFICATES
[patent_app_type] => utility
[patent_app_number] => 17/252209
[patent_app_country] => US
[patent_app_date] => 2019-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5805
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 509
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17252209
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/252209 | METHOD FOR MONITORING DIGITAL CERTIFICATES | Jun 24, 2019 | Abandoned |
Array
(
[id] => 15302071
[patent_doc_number] => 20190394171
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-26
[patent_title] => SYSTEMS AND METHODS FOR SECURING COMMUNICATIONS
[patent_app_type] => utility
[patent_app_number] => 16/450934
[patent_app_country] => US
[patent_app_date] => 2019-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20301
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 74
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16450934
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/450934 | Systems and methods for securing communications | Jun 23, 2019 | Issued |
Array
(
[id] => 16516952
[patent_doc_number] => 20200396210
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-17
[patent_title] => DATA SECURITY TOOL
[patent_app_type] => utility
[patent_app_number] => 16/437598
[patent_app_country] => US
[patent_app_date] => 2019-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4066
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16437598
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/437598 | Data security tool | Jun 10, 2019 | Issued |
Array
(
[id] => 14877499
[patent_doc_number] => 20190288991
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-19
[patent_title] => EFFICIENT USE OF KEYSTREAMS
[patent_app_type] => utility
[patent_app_number] => 16/430003
[patent_app_country] => US
[patent_app_date] => 2019-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12913
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16430003
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/430003 | Efficient use of keystreams | Jun 2, 2019 | Issued |
Array
(
[id] => 15215599
[patent_doc_number] => 20190370486
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-05
[patent_title] => BLOCKCHAIN-BASED TRANSACTION PROCESSING METHOD AND APPARATUS
[patent_app_type] => utility
[patent_app_number] => 16/424683
[patent_app_country] => US
[patent_app_date] => 2019-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12656
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16424683
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/424683 | Blockchain-based transaction processing method and apparatus | May 28, 2019 | Issued |
Array
(
[id] => 16173925
[patent_doc_number] => 10715512
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-14
[patent_title] => Controlled token distribution to protect against malicious data and resource access
[patent_app_type] => utility
[patent_app_number] => 16/421925
[patent_app_country] => US
[patent_app_date] => 2019-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 23631
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 310
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16421925
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/421925 | Controlled token distribution to protect against malicious data and resource access | May 23, 2019 | Issued |
Array
(
[id] => 14814249
[patent_doc_number] => 20190273734
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-05
[patent_title] => CONFIGURING CREDENTIALS TO FACILTATE SHARING DATA IN A SECURE MANNER
[patent_app_type] => utility
[patent_app_number] => 16/420033
[patent_app_country] => US
[patent_app_date] => 2019-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13184
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16420033
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/420033 | Configuring credentials to faciltate sharing data in a secure manner | May 21, 2019 | Issued |
Array
(
[id] => 14814245
[patent_doc_number] => 20190273732
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-05
[patent_title] => CUSTOM AUTHENTICATOR FOR ENTERPRISE WEB APPLICATION
[patent_app_type] => utility
[patent_app_number] => 16/420049
[patent_app_country] => US
[patent_app_date] => 2019-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11558
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16420049
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/420049 | Custom authenticator for enterprise web application | May 21, 2019 | Issued |
Array
(
[id] => 16472731
[patent_doc_number] => 20200374269
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-26
[patent_title] => SECURE AUDIO SYSTEMS AND METHODS
[patent_app_type] => utility
[patent_app_number] => 16/420105
[patent_app_country] => US
[patent_app_date] => 2019-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6570
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16420105
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/420105 | SECURE AUDIO SYSTEMS AND METHODS | May 21, 2019 | Abandoned |
Array
(
[id] => 17736910
[patent_doc_number] => 20220222369
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-14
[patent_title] => INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM
[patent_app_type] => utility
[patent_app_number] => 17/607794
[patent_app_country] => US
[patent_app_date] => 2019-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 23269
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17607794
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/607794 | Information processing apparatus, information processing method and program | May 20, 2019 | Issued |
Array
(
[id] => 15957491
[patent_doc_number] => 10666670
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-26
[patent_title] => Managing security breaches in a networked computing environment
[patent_app_type] => utility
[patent_app_number] => 16/416624
[patent_app_country] => US
[patent_app_date] => 2019-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8322
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16416624
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/416624 | Managing security breaches in a networked computing environment | May 19, 2019 | Issued |
Array
(
[id] => 15643331
[patent_doc_number] => 10594687
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-17
[patent_title] => Technologies for enhancing computer security
[patent_app_type] => utility
[patent_app_number] => 16/406321
[patent_app_country] => US
[patent_app_date] => 2019-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7517
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16406321
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/406321 | Technologies for enhancing computer security | May 7, 2019 | Issued |
Array
(
[id] => 17739624
[patent_doc_number] => 20220225086
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-14
[patent_title] => PRIVACY MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 17/607745
[patent_app_country] => US
[patent_app_date] => 2019-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6091
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17607745
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/607745 | Privacy management | May 6, 2019 | Issued |
Array
(
[id] => 16049833
[patent_doc_number] => 10686809
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-16
[patent_title] => Data protection in a networked computing environment
[patent_app_type] => utility
[patent_app_number] => 16/404236
[patent_app_country] => US
[patent_app_date] => 2019-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8618
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16404236
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/404236 | Data protection in a networked computing environment | May 5, 2019 | Issued |
Array
(
[id] => 18494707
[patent_doc_number] => 11700132
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-11
[patent_title] => Systems and methods for secure event and log management
[patent_app_type] => utility
[patent_app_number] => 16/402228
[patent_app_country] => US
[patent_app_date] => 2019-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7302
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16402228
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/402228 | Systems and methods for secure event and log management | May 2, 2019 | Issued |