Search

Tin Duc Nguyen

Examiner (ID: 16906, Phone: (571)270-7407 , Office: P/3731 )

Most Active Art Unit
3731
Art Unit(s)
3771, 3731
Total Applications
396
Issued Applications
246
Pending Applications
1
Abandoned Applications
152

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 19540273 [patent_doc_number] => 12132835 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-10-29 [patent_title] => Encrypted file storage [patent_app_type] => utility [patent_app_number] => 17/879931 [patent_app_country] => US [patent_app_date] => 2022-08-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 8698 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 189 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17879931 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/879931
Encrypted file storage Aug 2, 2022 Issued
Array ( [id] => 19514446 [patent_doc_number] => 20240346132 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-17 [patent_title] => System and Method for Formal Modelling of Trusted Edge IoT Security Gateways [patent_app_type] => utility [patent_app_number] => 18/576199 [patent_app_country] => US [patent_app_date] => 2022-07-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5918 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 65 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18576199 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/576199
System and Method for Formal Modelling of Trusted Edge IoT Security Gateways Jul 12, 2022 Pending
Array ( [id] => 17999905 [patent_doc_number] => 11501013 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2022-11-15 [patent_title] => Autonomous machine learning methods for detecting and thwarting malicious database access [patent_app_type] => utility [patent_app_number] => 17/860196 [patent_app_country] => US [patent_app_date] => 2022-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6881 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 220 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17860196 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/860196
Autonomous machine learning methods for detecting and thwarting malicious database access Jul 7, 2022 Issued
Array ( [id] => 17934473 [patent_doc_number] => 20220329599 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-10-13 [patent_title] => SECURE MANAGEMENT AND PROVISIONING OF INTERACTION DATA USING PERMISSIONED DISTRIBUTED LEDGERS [patent_app_type] => utility [patent_app_number] => 17/853046 [patent_app_country] => US [patent_app_date] => 2022-06-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 21414 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17853046 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/853046
Secure management and provisioning of interaction data using permissioned distributed ledgers Jun 28, 2022 Issued
Array ( [id] => 19199883 [patent_doc_number] => 11997142 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2024-05-28 [patent_title] => Systems and methods for multiple custody using mobile devices or wearables [patent_app_type] => utility [patent_app_number] => 17/839359 [patent_app_country] => US [patent_app_date] => 2022-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 17297 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 183 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17839359 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/839359
Systems and methods for multiple custody using mobile devices or wearables Jun 12, 2022 Issued
Array ( [id] => 19475706 [patent_doc_number] => 12105797 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-10-01 [patent_title] => Devices, systems, and methods for standardizing and streamlining the deployment of security information and event management artifacts for multiple tenants [patent_app_type] => utility [patent_app_number] => 18/563447 [patent_app_country] => US [patent_app_date] => 2022-06-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 10438 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 220 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18563447 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/563447
Devices, systems, and methods for standardizing and streamlining the deployment of security information and event management artifacts for multiple tenants Jun 2, 2022 Issued
Array ( [id] => 17994550 [patent_doc_number] => 20220360587 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-11-10 [patent_title] => SYSTEM AND METHOD FOR OUTLIER AND ANOMALY DETECTION IN IDENTITY MANAGEMENT ARTIFICIAL INTELLIGENCE SYSTEMS USING CLUSTER BASED ANALYSIS OF NETWORK IDENTITY GRAPHS [patent_app_type] => utility [patent_app_number] => 17/825545 [patent_app_country] => US [patent_app_date] => 2022-05-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 23510 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -15 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17825545 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/825545
System and method for outlier and anomaly detection in identity management artificial intelligence systems using cluster based analysis of network identity graphs May 25, 2022 Issued
Array ( [id] => 18892031 [patent_doc_number] => 11870815 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-01-09 [patent_title] => Security of network traffic in a containerized computing environment [patent_app_type] => utility [patent_app_number] => 17/749510 [patent_app_country] => US [patent_app_date] => 2022-05-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 14468 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 345 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17749510 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/749510
Security of network traffic in a containerized computing environment May 19, 2022 Issued
Array ( [id] => 17812032 [patent_doc_number] => 20220263867 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-08-18 [patent_title] => Resilient Self-Detection of Malicious Exfiltration of Sensitive Data [patent_app_type] => utility [patent_app_number] => 17/662466 [patent_app_country] => US [patent_app_date] => 2022-05-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8190 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 264 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17662466 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/662466
Resilient self-detection of malicious exfiltration of sensitive data May 8, 2022 Issued
Array ( [id] => 19445518 [patent_doc_number] => 12095820 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-09-17 [patent_title] => User model-based data loss prevention [patent_app_type] => utility [patent_app_number] => 17/735065 [patent_app_country] => US [patent_app_date] => 2022-05-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 9 [patent_no_of_words] => 10043 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 219 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17735065 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/735065
User model-based data loss prevention May 1, 2022 Issued
Array ( [id] => 17753651 [patent_doc_number] => 20220231856 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-07-21 [patent_title] => VERIFICATION SYSTEM AND METHOD FOR CHAINING DATA [patent_app_type] => utility [patent_app_number] => 17/714460 [patent_app_country] => US [patent_app_date] => 2022-04-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13225 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -9 [patent_words_short_claim] => 234 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17714460 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/714460
Verification system and method for chaining data Apr 5, 2022 Issued
Array ( [id] => 20064717 [patent_doc_number] => 20250202939 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-19 [patent_title] => INITIAL SECURITY ACTIVATION FOR MEDIUM ACCESS CONTROL LAYER [patent_app_type] => utility [patent_app_number] => 18/847638 [patent_app_country] => US [patent_app_date] => 2022-03-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4656 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -20 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18847638 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/847638
INITIAL SECURITY ACTIVATION FOR MEDIUM ACCESS CONTROL LAYER Mar 16, 2022 Pending
Array ( [id] => 17810384 [patent_doc_number] => 20220262219 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-08-18 [patent_title] => Eye Glasses with Individual User Awareness [patent_app_type] => utility [patent_app_number] => 17/695795 [patent_app_country] => US [patent_app_date] => 2022-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 174153 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 60 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17695795 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/695795
Eye glasses with individual user awareness Mar 14, 2022 Issued
Array ( [id] => 19295373 [patent_doc_number] => 12034744 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-07-09 [patent_title] => Dynamic power user throttling method for managing SLA guarantees [patent_app_type] => utility [patent_app_number] => 17/688763 [patent_app_country] => US [patent_app_date] => 2022-03-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 14 [patent_no_of_words] => 8862 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 224 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17688763 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/688763
Dynamic power user throttling method for managing SLA guarantees Mar 6, 2022 Issued
Array ( [id] => 17781336 [patent_doc_number] => 20220247686 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-08-04 [patent_title] => DYNAMIC TOKEN BUCKET METHOD ADAPTIVE TO OPAQUE SERVER LIMITS [patent_app_type] => utility [patent_app_number] => 17/688768 [patent_app_country] => US [patent_app_date] => 2022-03-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15409 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17688768 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/688768
Dynamic token bucket method adaptive to opaque server limits Mar 6, 2022 Issued
Array ( [id] => 19162097 [patent_doc_number] => 20240154804 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-05-09 [patent_title] => A METHOD OF REPLACING A CURRENT KEY IN A SECURITY ELEMENT AND CORRESPONDING SECURITY ELEMENT [patent_app_type] => utility [patent_app_number] => 18/549959 [patent_app_country] => US [patent_app_date] => 2022-02-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3164 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -4 [patent_words_short_claim] => 250 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18549959 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/549959
Method of replacing a current key in a security element and corresponding security element Feb 21, 2022 Issued
Array ( [id] => 17694143 [patent_doc_number] => 20220201436 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-06-23 [patent_title] => Processor-Based Learning of User-Specific Uses of Portable Items [patent_app_type] => utility [patent_app_number] => 17/674599 [patent_app_country] => US [patent_app_date] => 2022-02-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 174211 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -25 [patent_words_short_claim] => 459 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17674599 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/674599
Processor-Based Learning of User-Specific Uses of Portable Items Feb 16, 2022 Abandoned
Array ( [id] => 17796874 [patent_doc_number] => 20220255966 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-08-11 [patent_title] => Method and System for Secure Container Application Framework [patent_app_type] => utility [patent_app_number] => 17/592632 [patent_app_country] => US [patent_app_date] => 2022-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15025 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 104 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17592632 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/592632
Method and system for secure container application framework Feb 3, 2022 Issued
Array ( [id] => 18541906 [patent_doc_number] => 20230247023 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-08-03 [patent_title] => CONFIGURING INSTANCES WITH INSTANCE METADATA STORED IN VIRTUAL SECURITY PROCESSORS [patent_app_type] => utility [patent_app_number] => 17/588969 [patent_app_country] => US [patent_app_date] => 2022-01-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8784 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 80 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17588969 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/588969
Configuring instances with instance metadata stored in virtual security processors Jan 30, 2022 Issued
Array ( [id] => 19000078 [patent_doc_number] => 11916945 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-02-27 [patent_title] => Method and apparatus for combining a firewall and a forensics agent to detect and prevent malicious software activity [patent_app_type] => utility [patent_app_number] => 17/587487 [patent_app_country] => US [patent_app_date] => 2022-01-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 8047 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 166 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17587487 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/587487
Method and apparatus for combining a firewall and a forensics agent to detect and prevent malicious software activity Jan 27, 2022 Issued
Menu