Search

Minh Nhut Tang

Examiner (ID: 9810)

Most Active Art Unit
2829
Art Unit(s)
2867, 2858, 2829
Total Applications
1807
Issued Applications
1580
Pending Applications
33
Abandoned Applications
201

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 16046489 [patent_doc_number] => 10685118 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-06-16 [patent_title] => System and method for monitoring power consumption to detect malware [patent_app_type] => utility [patent_app_number] => 15/980045 [patent_app_country] => US [patent_app_date] => 2018-05-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5491 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 169 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15980045 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/980045
System and method for monitoring power consumption to detect malware May 14, 2018 Issued
Array ( [id] => 14618665 [patent_doc_number] => 10362047 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-23 [patent_title] => Systems and methods for providing user interfaces based on actions associated with untrusted emails [patent_app_type] => utility [patent_app_number] => 15/972937 [patent_app_country] => US [patent_app_date] => 2018-05-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 27 [patent_figures_cnt] => 27 [patent_no_of_words] => 30454 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 140 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15972937 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/972937
Systems and methods for providing user interfaces based on actions associated with untrusted emails May 6, 2018 Issued
Array ( [id] => 15042775 [patent_doc_number] => 20190332392 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-10-31 [patent_title] => Information Handling Systems And Related Methods For Establishing Trust Between Boot Firmware And Applications Based On User Physical Presence Verification [patent_app_type] => utility [patent_app_number] => 15/966800 [patent_app_country] => US [patent_app_date] => 2018-04-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8783 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 109 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15966800 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/966800
Information handling systems and related methods for establishing trust between boot firmware and applications based on user physical presence verification Apr 29, 2018 Issued
Array ( [id] => 16302589 [patent_doc_number] => 20200288312 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-09-10 [patent_title] => COMMUNICATION SYSTEM AND METHOD [patent_app_type] => utility [patent_app_number] => 16/606961 [patent_app_country] => US [patent_app_date] => 2018-04-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11350 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -11 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16606961 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/606961
Communication system and method Apr 16, 2018 Issued
Array ( [id] => 14400039 [patent_doc_number] => 10313319 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-06-04 [patent_title] => Efficient use of keystreams [patent_app_type] => utility [patent_app_number] => 15/945975 [patent_app_country] => US [patent_app_date] => 2018-04-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 12892 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 107 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15945975 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/945975
Efficient use of keystreams Apr 4, 2018 Issued
Array ( [id] => 14369117 [patent_doc_number] => 10305881 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-05-28 [patent_title] => Controlled token distribution to protect against malicious data and resource access [patent_app_type] => utility [patent_app_number] => 15/911997 [patent_app_country] => US [patent_app_date] => 2018-03-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 23621 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 279 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15911997 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/911997
Controlled token distribution to protect against malicious data and resource access Mar 4, 2018 Issued
Array ( [id] => 13351183 [patent_doc_number] => 20180227131 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-08-09 [patent_title] => ELECTRONIC IDENTIFICATION VERIFICATION METHODS AND SYSTEMS WITH STORAGE OF CERTIFICATION RECORDS TO A SIDE CHAIN [patent_app_type] => utility [patent_app_number] => 15/893479 [patent_app_country] => US [patent_app_date] => 2018-02-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 16521 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -23 [patent_words_short_claim] => 111 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15893479 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/893479
Electronic identification verification methods and systems with storage of certification records to a side chain Feb 8, 2018 Issued
Array ( [id] => 16235034 [patent_doc_number] => 10742607 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-08-11 [patent_title] => Application-aware firewall policy enforcement by data center controller [patent_app_type] => utility [patent_app_number] => 15/890174 [patent_app_country] => US [patent_app_date] => 2018-02-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 9413 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 100 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15890174 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/890174
Application-aware firewall policy enforcement by data center controller Feb 5, 2018 Issued
Array ( [id] => 14658293 [patent_doc_number] => 20190236275 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-08-01 [patent_title] => JUST IN TIME MEMORY ANALYSIS FOR MALWARE DETECTION [patent_app_type] => utility [patent_app_number] => 15/890192 [patent_app_country] => US [patent_app_date] => 2018-02-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10492 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 171 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15890192 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/890192
Just in time memory analysis for malware detection Feb 5, 2018 Issued
Array ( [id] => 14693169 [patent_doc_number] => 20190245700 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-08-08 [patent_title] => Managing And Negotiating Certificates [patent_app_type] => utility [patent_app_number] => 15/890150 [patent_app_country] => US [patent_app_date] => 2018-02-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13501 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 162 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15890150 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/890150
Managing and negotiating certificates Feb 5, 2018 Issued
Array ( [id] => 13351181 [patent_doc_number] => 20180227130 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-08-09 [patent_title] => ELECTRONIC IDENTIFICATION VERIFICATION METHODS AND SYSTEMS [patent_app_type] => utility [patent_app_number] => 15/890333 [patent_app_country] => US [patent_app_date] => 2018-02-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 17145 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 142 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15890333 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/890333
Electronic identification verification methods and systems Feb 5, 2018 Issued
Array ( [id] => 16371442 [patent_doc_number] => 10803204 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-10-13 [patent_title] => Systems and methods for defining and securely sharing objects in preventing data breach or exfiltration [patent_app_type] => utility [patent_app_number] => 15/879588 [patent_app_country] => US [patent_app_date] => 2018-01-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 23187 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 252 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15879588 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/879588
Systems and methods for defining and securely sharing objects in preventing data breach or exfiltration Jan 24, 2018 Issued
Array ( [id] => 13319155 [patent_doc_number] => 20180211115 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-07-26 [patent_title] => Total Property Intelligence System [patent_app_type] => utility [patent_app_number] => 15/879798 [patent_app_country] => US [patent_app_date] => 2018-01-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8739 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -15 [patent_words_short_claim] => 137 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15879798 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/879798
Total property intelligence system Jan 24, 2018 Issued
Array ( [id] => 13319119 [patent_doc_number] => 20180211097 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-07-26 [patent_title] => METHOD AND DEVICE FOR ACQUIRING FEATURE IMAGE, AND USER AUTHENTICATION METHOD [patent_app_type] => utility [patent_app_number] => 15/880006 [patent_app_country] => US [patent_app_date] => 2018-01-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8612 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -19 [patent_words_short_claim] => 101 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15880006 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/880006
METHOD AND DEVICE FOR ACQUIRING FEATURE IMAGE, AND USER AUTHENTICATION METHOD Jan 24, 2018 Abandoned
Array ( [id] => 13333249 [patent_doc_number] => 20180218162 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-08-02 [patent_title] => METHOD AND SYSTEM FOR REACTIVE MINING OF COMPUTER SCREENS [patent_app_type] => utility [patent_app_number] => 15/879470 [patent_app_country] => US [patent_app_date] => 2018-01-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9000 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 104 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15879470 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/879470
Method and system for reactive mining of computer screens Jan 24, 2018 Issued
Array ( [id] => 14560563 [patent_doc_number] => 10348759 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-09 [patent_title] => Threat detection and mitigation through run-time introspection and instrumentation [patent_app_type] => utility [patent_app_number] => 15/874771 [patent_app_country] => US [patent_app_date] => 2018-01-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 17183 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 89 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15874771 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/874771
Threat detection and mitigation through run-time introspection and instrumentation Jan 17, 2018 Issued
Array ( [id] => 17264244 [patent_doc_number] => 20210377229 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-12-02 [patent_title] => INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM, AND RECORDING MEDIUM [patent_app_type] => utility [patent_app_number] => 16/958661 [patent_app_country] => US [patent_app_date] => 2017-12-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7132 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -10 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16958661 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/958661
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM, AND RECORDING MEDIUM Dec 27, 2017 Abandoned
Array ( [id] => 12653151 [patent_doc_number] => 20180109548 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-04-19 [patent_title] => DATA PROTECTION IN A NETWORKED COMPUTING ENVIRONMENT [patent_app_type] => utility [patent_app_number] => 15/842952 [patent_app_country] => US [patent_app_date] => 2017-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8615 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -10 [patent_words_short_claim] => 149 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15842952 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/842952
Data protection in a networked computing environment Dec 14, 2017 Issued
Array ( [id] => 12653148 [patent_doc_number] => 20180109547 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-04-19 [patent_title] => DATA PROTECTION IN A NETWORKED COMPUTING ENVIRONMENT [patent_app_type] => utility [patent_app_number] => 15/842131 [patent_app_country] => US [patent_app_date] => 2017-12-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8615 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -14 [patent_words_short_claim] => 132 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15842131 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/842131
Data protection in a networked computing environment Dec 13, 2017 Issued
Array ( [id] => 13757045 [patent_doc_number] => 10171485 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-01-01 [patent_title] => System conversion in a networked computing environment [patent_app_type] => utility [patent_app_number] => 15/840460 [patent_app_country] => US [patent_app_date] => 2017-12-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9933 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 157 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15840460 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/840460
System conversion in a networked computing environment Dec 12, 2017 Issued
Menu