
Tin Duc Nguyen
Examiner (ID: 16906, Phone: (571)270-7407 , Office: P/3731 )
| Most Active Art Unit | 3731 |
| Art Unit(s) | 3771, 3731 |
| Total Applications | 396 |
| Issued Applications | 246 |
| Pending Applications | 1 |
| Abandoned Applications | 152 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16802610
[patent_doc_number] => 10997559
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-05-04
[patent_title] => Resource management system
[patent_app_type] => utility
[patent_app_number] => 16/998614
[patent_app_country] => US
[patent_app_date] => 2020-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 6512
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16998614
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/998614 | Resource management system | Aug 19, 2020 | Issued |
Array
(
[id] => 18033013
[patent_doc_number] => 11516219
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-29
[patent_title] => System and method for role mining in identity management artificial intelligence systems using cluster based analysis of network identity graphs
[patent_app_type] => utility
[patent_app_number] => 16/998719
[patent_app_country] => US
[patent_app_date] => 2020-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 23189
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 319
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16998719
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/998719 | System and method for role mining in identity management artificial intelligence systems using cluster based analysis of network identity graphs | Aug 19, 2020 | Issued |
Array
(
[id] => 16782892
[patent_doc_number] => 20210119971
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-22
[patent_title] => DISTRIBUTION OF STATELESS SECURITY FUNCTIONS
[patent_app_type] => utility
[patent_app_number] => 16/985664
[patent_app_country] => US
[patent_app_date] => 2020-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11569
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16985664
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/985664 | Distribution of stateless security functions | Aug 4, 2020 | Issued |
Array
(
[id] => 17717597
[patent_doc_number] => 11381604
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-05
[patent_title] => Resilient self-detection of malicious exfiltration of sensitive data
[patent_app_type] => utility
[patent_app_number] => 16/983418
[patent_app_country] => US
[patent_app_date] => 2020-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 15
[patent_no_of_words] => 8146
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 285
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16983418
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/983418 | Resilient self-detection of malicious exfiltration of sensitive data | Aug 2, 2020 | Issued |
Array
(
[id] => 17957184
[patent_doc_number] => 11483305
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-25
[patent_title] => Windows single sign-on mechanism
[patent_app_type] => utility
[patent_app_number] => 16/943894
[patent_app_country] => US
[patent_app_date] => 2020-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8526
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16943894
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/943894 | Windows single sign-on mechanism | Jul 29, 2020 | Issued |
Array
(
[id] => 18032997
[patent_doc_number] => 11516203
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-29
[patent_title] => System and method for identity management of cloud based computing services in identity management artificial intelligence systems
[patent_app_type] => utility
[patent_app_number] => 16/942416
[patent_app_country] => US
[patent_app_date] => 2020-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 22482
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 349
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16942416
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/942416 | System and method for identity management of cloud based computing services in identity management artificial intelligence systems | Jul 28, 2020 | Issued |
Array
(
[id] => 17744620
[patent_doc_number] => 11392691
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-07-19
[patent_title] => System and method of securing e-mail against phishing and ransomware attack
[patent_app_type] => utility
[patent_app_number] => 16/938977
[patent_app_country] => US
[patent_app_date] => 2020-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9723
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16938977
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/938977 | System and method of securing e-mail against phishing and ransomware attack | Jul 24, 2020 | Issued |
Array
(
[id] => 17372467
[patent_doc_number] => 20220027519
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-01-27
[patent_title] => Authenticated Debug for Computing Systems
[patent_app_type] => utility
[patent_app_number] => 16/936150
[patent_app_country] => US
[patent_app_date] => 2020-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13384
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16936150
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/936150 | Authenticated debug for computing systems | Jul 21, 2020 | Issued |
Array
(
[id] => 16804296
[patent_doc_number] => 10999260
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-05-04
[patent_title] => Secure messaging between cryptographic hardware modules
[patent_app_type] => utility
[patent_app_number] => 16/934754
[patent_app_country] => US
[patent_app_date] => 2020-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 12
[patent_no_of_words] => 15892
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16934754
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/934754 | Secure messaging between cryptographic hardware modules | Jul 20, 2020 | Issued |
Array
(
[id] => 18089578
[patent_doc_number] => 11539722
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-12-27
[patent_title] => Security threat detection based on process information
[patent_app_type] => utility
[patent_app_number] => 16/929074
[patent_app_country] => US
[patent_app_date] => 2020-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5786
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16929074
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/929074 | Security threat detection based on process information | Jul 13, 2020 | Issued |
Array
(
[id] => 16365582
[patent_doc_number] => 20200322333
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-08
[patent_title] => PERSONALIZED SECURITY SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/910550
[patent_app_country] => US
[patent_app_date] => 2020-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8828
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16910550
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/910550 | Personalized security system | Jun 23, 2020 | Issued |
Array
(
[id] => 18001900
[patent_doc_number] => 11503022
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-15
[patent_title] => Personalized security system
[patent_app_type] => utility
[patent_app_number] => 16/910573
[patent_app_country] => US
[patent_app_date] => 2020-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 8830
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16910573
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/910573 | Personalized security system | Jun 23, 2020 | Issued |
Array
(
[id] => 16346626
[patent_doc_number] => 20200311277
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-01
[patent_title] => METHOD, SYSTEM AND DEVICE FOR SECURITY CONFIGURATIONS
[patent_app_type] => utility
[patent_app_number] => 16/897164
[patent_app_country] => US
[patent_app_date] => 2020-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10319
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16897164
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/897164 | METHOD, SYSTEM AND DEVICE FOR SECURITY CONFIGURATIONS | Jun 8, 2020 | Abandoned |
Array
(
[id] => 18033050
[patent_doc_number] => 11516256
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-29
[patent_title] => Certificate authorization policy for security protocol and data model capable devices
[patent_app_type] => utility
[patent_app_number] => 16/879058
[patent_app_country] => US
[patent_app_date] => 2020-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 4839
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16879058
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/879058 | Certificate authorization policy for security protocol and data model capable devices | May 19, 2020 | Issued |
Array
(
[id] => 16527631
[patent_doc_number] => 20200401711
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-24
[patent_title] => Dynamically Controlling Access to Linked Content in Electronic Communications
[patent_app_type] => utility
[patent_app_number] => 16/875216
[patent_app_country] => US
[patent_app_date] => 2020-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17254
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16875216
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/875216 | Dynamically controlling access to linked content in electronic communications | May 14, 2020 | Issued |
Array
(
[id] => 17216674
[patent_doc_number] => 20210350012
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-11
[patent_title] => APPLICATION-SPECIFIC SECURITY
[patent_app_type] => utility
[patent_app_number] => 16/871210
[patent_app_country] => US
[patent_app_date] => 2020-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5461
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16871210
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/871210 | Application-specific security | May 10, 2020 | Issued |
Array
(
[id] => 16242606
[patent_doc_number] => 20200259840
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-13
[patent_title] => SYSTEM AND METHOD FOR OUTLIER AND ANOMALY DETECTION IN IDENTITY MANAGEMENT ARTIFICIAL INTELLIGENCE SYSTEMS USING CLUSTER BASED ANALYSIS OF NETWORK IDENTITY GRAPHS
[patent_app_type] => utility
[patent_app_number] => 16/861335
[patent_app_country] => US
[patent_app_date] => 2020-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 23459
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16861335
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/861335 | System and method for outlier and anomaly detection in identity management artificial intelligence systems using cluster based analysis of network identity graphs | Apr 28, 2020 | Issued |
Array
(
[id] => 16357557
[patent_doc_number] => 10798084
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-10-06
[patent_title] => System and method for identity management of cloud based computing services in identity management artificial intelligence systems
[patent_app_type] => utility
[patent_app_number] => 16/858026
[patent_app_country] => US
[patent_app_date] => 2020-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 21520
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 340
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16858026
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/858026 | System and method for identity management of cloud based computing services in identity management artificial intelligence systems | Apr 23, 2020 | Issued |
Array
(
[id] => 16240565
[patent_doc_number] => 20200257799
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-13
[patent_title] => METHODS AND APPARATUS FOR USING MACHINE LEARNING ON MULTIPLE FILE FRAGMENTS TO IDENTIFY MALWARE
[patent_app_type] => utility
[patent_app_number] => 16/853803
[patent_app_country] => US
[patent_app_date] => 2020-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12811
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16853803
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/853803 | Methods and apparatus for using machine learning on multiple file fragments to identify malware | Apr 20, 2020 | Issued |
Array
(
[id] => 17041712
[patent_doc_number] => 20210258348
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-08-19
[patent_title] => Cloud access security broker systems and methods via a distributed worker pool
[patent_app_type] => utility
[patent_app_number] => 16/833830
[patent_app_country] => US
[patent_app_date] => 2020-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7277
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16833830
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/833830 | Cloud access security broker systems and methods via a distributed worker pool | Mar 29, 2020 | Issued |