
Tin Duc Nguyen
Examiner (ID: 16906, Phone: (571)270-7407 , Office: P/3731 )
| Most Active Art Unit | 3731 |
| Art Unit(s) | 3771, 3731 |
| Total Applications | 396 |
| Issued Applications | 246 |
| Pending Applications | 1 |
| Abandoned Applications | 152 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 19540273
[patent_doc_number] => 12132835
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-10-29
[patent_title] => Encrypted file storage
[patent_app_type] => utility
[patent_app_number] => 17/879931
[patent_app_country] => US
[patent_app_date] => 2022-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8698
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17879931
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/879931 | Encrypted file storage | Aug 2, 2022 | Issued |
Array
(
[id] => 19514446
[patent_doc_number] => 20240346132
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-17
[patent_title] => System and Method for Formal Modelling of Trusted Edge IoT Security Gateways
[patent_app_type] => utility
[patent_app_number] => 18/576199
[patent_app_country] => US
[patent_app_date] => 2022-07-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5918
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 65
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18576199
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/576199 | System and Method for Formal Modelling of Trusted Edge IoT Security Gateways | Jul 12, 2022 | Pending |
Array
(
[id] => 17999905
[patent_doc_number] => 11501013
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-11-15
[patent_title] => Autonomous machine learning methods for detecting and thwarting malicious database access
[patent_app_type] => utility
[patent_app_number] => 17/860196
[patent_app_country] => US
[patent_app_date] => 2022-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6881
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17860196
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/860196 | Autonomous machine learning methods for detecting and thwarting malicious database access | Jul 7, 2022 | Issued |
Array
(
[id] => 17934473
[patent_doc_number] => 20220329599
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-10-13
[patent_title] => SECURE MANAGEMENT AND PROVISIONING OF INTERACTION DATA USING PERMISSIONED DISTRIBUTED LEDGERS
[patent_app_type] => utility
[patent_app_number] => 17/853046
[patent_app_country] => US
[patent_app_date] => 2022-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21414
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17853046
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/853046 | Secure management and provisioning of interaction data using permissioned distributed ledgers | Jun 28, 2022 | Issued |
Array
(
[id] => 19199883
[patent_doc_number] => 11997142
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-05-28
[patent_title] => Systems and methods for multiple custody using mobile devices or wearables
[patent_app_type] => utility
[patent_app_number] => 17/839359
[patent_app_country] => US
[patent_app_date] => 2022-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 17297
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17839359
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/839359 | Systems and methods for multiple custody using mobile devices or wearables | Jun 12, 2022 | Issued |
Array
(
[id] => 19475706
[patent_doc_number] => 12105797
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-10-01
[patent_title] => Devices, systems, and methods for standardizing and streamlining the deployment of security information and event management artifacts for multiple tenants
[patent_app_type] => utility
[patent_app_number] => 18/563447
[patent_app_country] => US
[patent_app_date] => 2022-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10438
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18563447
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/563447 | Devices, systems, and methods for standardizing and streamlining the deployment of security information and event management artifacts for multiple tenants | Jun 2, 2022 | Issued |
Array
(
[id] => 17994550
[patent_doc_number] => 20220360587
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-11-10
[patent_title] => SYSTEM AND METHOD FOR OUTLIER AND ANOMALY DETECTION IN IDENTITY MANAGEMENT ARTIFICIAL INTELLIGENCE SYSTEMS USING CLUSTER BASED ANALYSIS OF NETWORK IDENTITY GRAPHS
[patent_app_type] => utility
[patent_app_number] => 17/825545
[patent_app_country] => US
[patent_app_date] => 2022-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 23510
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17825545
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/825545 | System and method for outlier and anomaly detection in identity management artificial intelligence systems using cluster based analysis of network identity graphs | May 25, 2022 | Issued |
Array
(
[id] => 18892031
[patent_doc_number] => 11870815
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-01-09
[patent_title] => Security of network traffic in a containerized computing environment
[patent_app_type] => utility
[patent_app_number] => 17/749510
[patent_app_country] => US
[patent_app_date] => 2022-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 14468
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 345
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17749510
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/749510 | Security of network traffic in a containerized computing environment | May 19, 2022 | Issued |
Array
(
[id] => 17812032
[patent_doc_number] => 20220263867
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-18
[patent_title] => Resilient Self-Detection of Malicious Exfiltration of Sensitive Data
[patent_app_type] => utility
[patent_app_number] => 17/662466
[patent_app_country] => US
[patent_app_date] => 2022-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8190
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17662466
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/662466 | Resilient self-detection of malicious exfiltration of sensitive data | May 8, 2022 | Issued |
Array
(
[id] => 19445518
[patent_doc_number] => 12095820
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-09-17
[patent_title] => User model-based data loss prevention
[patent_app_type] => utility
[patent_app_number] => 17/735065
[patent_app_country] => US
[patent_app_date] => 2022-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 10043
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 219
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17735065
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/735065 | User model-based data loss prevention | May 1, 2022 | Issued |
Array
(
[id] => 17753651
[patent_doc_number] => 20220231856
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-21
[patent_title] => VERIFICATION SYSTEM AND METHOD FOR CHAINING DATA
[patent_app_type] => utility
[patent_app_number] => 17/714460
[patent_app_country] => US
[patent_app_date] => 2022-04-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13225
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17714460
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/714460 | Verification system and method for chaining data | Apr 5, 2022 | Issued |
Array
(
[id] => 20064717
[patent_doc_number] => 20250202939
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-06-19
[patent_title] => INITIAL SECURITY ACTIVATION FOR MEDIUM ACCESS CONTROL LAYER
[patent_app_type] => utility
[patent_app_number] => 18/847638
[patent_app_country] => US
[patent_app_date] => 2022-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4656
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18847638
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/847638 | INITIAL SECURITY ACTIVATION FOR MEDIUM ACCESS CONTROL LAYER | Mar 16, 2022 | Pending |
Array
(
[id] => 17810384
[patent_doc_number] => 20220262219
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-18
[patent_title] => Eye Glasses with Individual User Awareness
[patent_app_type] => utility
[patent_app_number] => 17/695795
[patent_app_country] => US
[patent_app_date] => 2022-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 174153
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 60
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17695795
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/695795 | Eye glasses with individual user awareness | Mar 14, 2022 | Issued |
Array
(
[id] => 19295373
[patent_doc_number] => 12034744
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-07-09
[patent_title] => Dynamic power user throttling method for managing SLA guarantees
[patent_app_type] => utility
[patent_app_number] => 17/688763
[patent_app_country] => US
[patent_app_date] => 2022-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 14
[patent_no_of_words] => 8862
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17688763
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/688763 | Dynamic power user throttling method for managing SLA guarantees | Mar 6, 2022 | Issued |
Array
(
[id] => 17781336
[patent_doc_number] => 20220247686
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-04
[patent_title] => DYNAMIC TOKEN BUCKET METHOD ADAPTIVE TO OPAQUE SERVER LIMITS
[patent_app_type] => utility
[patent_app_number] => 17/688768
[patent_app_country] => US
[patent_app_date] => 2022-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15409
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17688768
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/688768 | Dynamic token bucket method adaptive to opaque server limits | Mar 6, 2022 | Issued |
Array
(
[id] => 19162097
[patent_doc_number] => 20240154804
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-09
[patent_title] => A METHOD OF REPLACING A CURRENT KEY IN A SECURITY ELEMENT AND CORRESPONDING SECURITY ELEMENT
[patent_app_type] => utility
[patent_app_number] => 18/549959
[patent_app_country] => US
[patent_app_date] => 2022-02-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3164
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 250
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18549959
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/549959 | Method of replacing a current key in a security element and corresponding security element | Feb 21, 2022 | Issued |
Array
(
[id] => 17694143
[patent_doc_number] => 20220201436
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-06-23
[patent_title] => Processor-Based Learning of User-Specific Uses of Portable Items
[patent_app_type] => utility
[patent_app_number] => 17/674599
[patent_app_country] => US
[patent_app_date] => 2022-02-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 174211
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -25
[patent_words_short_claim] => 459
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17674599
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/674599 | Processor-Based Learning of User-Specific Uses of Portable Items | Feb 16, 2022 | Abandoned |
Array
(
[id] => 17796874
[patent_doc_number] => 20220255966
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-08-11
[patent_title] => Method and System for Secure Container Application Framework
[patent_app_type] => utility
[patent_app_number] => 17/592632
[patent_app_country] => US
[patent_app_date] => 2022-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15025
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17592632
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/592632 | Method and system for secure container application framework | Feb 3, 2022 | Issued |
Array
(
[id] => 18541906
[patent_doc_number] => 20230247023
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-08-03
[patent_title] => CONFIGURING INSTANCES WITH INSTANCE METADATA STORED IN VIRTUAL SECURITY PROCESSORS
[patent_app_type] => utility
[patent_app_number] => 17/588969
[patent_app_country] => US
[patent_app_date] => 2022-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8784
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17588969
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/588969 | Configuring instances with instance metadata stored in virtual security processors | Jan 30, 2022 | Issued |
Array
(
[id] => 19000078
[patent_doc_number] => 11916945
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-02-27
[patent_title] => Method and apparatus for combining a firewall and a forensics agent to detect and prevent malicious software activity
[patent_app_type] => utility
[patent_app_number] => 17/587487
[patent_app_country] => US
[patent_app_date] => 2022-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8047
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17587487
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/587487 | Method and apparatus for combining a firewall and a forensics agent to detect and prevent malicious software activity | Jan 27, 2022 | Issued |