Mong L Chin
Examiner (ID: 7114)
Most Active Art Unit | 2722 |
Art Unit(s) | 2722 |
Total Applications | 1 |
Issued Applications | 1 |
Pending Applications | 0 |
Abandoned Applications | 0 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 16355483
[patent_doc_number] => 10795995
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-10-06
[patent_title] => Identifying malicious creatives to supply side platforms (SSP)
[patent_app_type] => utility
[patent_app_number] => 16/857013
[patent_app_country] => US
[patent_app_date] => 2020-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 14041
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16857013
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/857013 | Identifying malicious creatives to supply side platforms (SSP) | Apr 22, 2020 | Issued |
Array
(
[id] => 15705691
[patent_doc_number] => 10609041
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-31
[patent_title] => Enforcing granular access control policy
[patent_app_type] => utility
[patent_app_number] => 16/521179
[patent_app_country] => US
[patent_app_date] => 2019-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 8590
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16521179
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/521179 | Enforcing granular access control policy | Jul 23, 2019 | Issued |
Array
(
[id] => 15953393
[patent_doc_number] => 10664606
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-26
[patent_title] => System and method of controlling access to a document file
[patent_app_type] => utility
[patent_app_number] => 16/408556
[patent_app_country] => US
[patent_app_date] => 2019-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 24
[patent_no_of_words] => 29976
[patent_no_of_claims] => 56
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16408556
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/408556 | System and method of controlling access to a document file | May 9, 2019 | Issued |
Array
(
[id] => 14022943
[patent_doc_number] => 20190073465
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-07
[patent_title] => IC CARD, PORTABLE ELECTRONIC DEVICE, AND METHOD OF CONTROLLING AN IC CARD
[patent_app_type] => utility
[patent_app_number] => 16/177868
[patent_app_country] => US
[patent_app_date] => 2018-11-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5415
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16177868
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/177868 | IC CARD, PORTABLE ELECTRONIC DEVICE, AND METHOD OF CONTROLLING AN IC CARD | Oct 31, 2018 | Abandoned |
Array
(
[id] => 14022967
[patent_doc_number] => 20190073477
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-07
[patent_title] => TRUSTED KERNEL-BASED ANTI-ATTACK DATA PROCESSOR
[patent_app_type] => utility
[patent_app_number] => 16/175710
[patent_app_country] => US
[patent_app_date] => 2018-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2164
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16175710
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/175710 | Trusted kernel-based anti-attack data processor | Oct 29, 2018 | Issued |
Array
(
[id] => 16069797
[patent_doc_number] => 10693870
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-23
[patent_title] => Authentication system
[patent_app_type] => utility
[patent_app_number] => 16/175591
[patent_app_country] => US
[patent_app_date] => 2018-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 9120
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16175591
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/175591 | Authentication system | Oct 29, 2018 | Issued |
Array
(
[id] => 13783389
[patent_doc_number] => 20190005233
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-03
[patent_title] => SECURE CODE OPTIMIZATION METHOD AND SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/102045
[patent_app_country] => US
[patent_app_date] => 2018-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8773
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16102045
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/102045 | Secure code optimization method and system | Aug 12, 2018 | Issued |
Array
(
[id] => 16340126
[patent_doc_number] => 10791101
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-29
[patent_title] => Encrypted audio streaming
[patent_app_type] => utility
[patent_app_number] => 16/035837
[patent_app_country] => US
[patent_app_date] => 2018-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8484
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16035837
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/035837 | Encrypted audio streaming | Jul 15, 2018 | Issued |
Array
(
[id] => 13907121
[patent_doc_number] => 20190042765
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-07
[patent_title] => SECURITY DEVICES, ELECTRONIC DEVICES AND METHODS OF OPERATING ELECTRONIC DEVICES
[patent_app_type] => utility
[patent_app_number] => 16/023401
[patent_app_country] => US
[patent_app_date] => 2018-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12034
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16023401
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/023401 | Security devices, electronic devices and methods of operating electronic devices | Jun 28, 2018 | Issued |
Array
(
[id] => 16235101
[patent_doc_number] => 10742675
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-11
[patent_title] => Fraudulent message detection device, electronic control apparatus equipped with fraudulent message detection device, fraudulent message detection method, and fraudulent message detection program
[patent_app_type] => utility
[patent_app_number] => 16/013239
[patent_app_country] => US
[patent_app_date] => 2018-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 8679
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 284
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16013239
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/013239 | Fraudulent message detection device, electronic control apparatus equipped with fraudulent message detection device, fraudulent message detection method, and fraudulent message detection program | Jun 19, 2018 | Issued |
Array
(
[id] => 13486843
[patent_doc_number] => 20180294964
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-11
[patent_title] => UAV AUTHENTICATION METHOD AND SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/003799
[patent_app_country] => US
[patent_app_date] => 2018-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4755
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16003799
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/003799 | UAV authentication method and system | Jun 7, 2018 | Issued |
Array
(
[id] => 13453801
[patent_doc_number] => 20180278443
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-27
[patent_title] => Data Scrambling Method and Scrambling Apparatus
[patent_app_type] => utility
[patent_app_number] => 15/991477
[patent_app_country] => US
[patent_app_date] => 2018-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18518
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 517
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15991477
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/991477 | Data scrambling method and scrambling apparatus | May 28, 2018 | Issued |
Array
(
[id] => 16371409
[patent_doc_number] => 10803171
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-13
[patent_title] => Virus detection method, terminal and server
[patent_app_type] => utility
[patent_app_number] => 15/988131
[patent_app_country] => US
[patent_app_date] => 2018-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 8991
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15988131
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/988131 | Virus detection method, terminal and server | May 23, 2018 | Issued |
Array
(
[id] => 13499767
[patent_doc_number] => 20180301426
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-18
[patent_title] => Protecting Analog Circuits with Parameter Biasing Obfuscation
[patent_app_type] => utility
[patent_app_number] => 15/918278
[patent_app_country] => US
[patent_app_date] => 2018-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5145
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15918278
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/918278 | Protecting analog circuits with parameter biasing obfuscation | Mar 11, 2018 | Issued |
Array
(
[id] => 16478575
[patent_doc_number] => 10853524
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-12-01
[patent_title] => System and method for providing security for robots
[patent_app_type] => utility
[patent_app_number] => 15/916602
[patent_app_country] => US
[patent_app_date] => 2018-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5845
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15916602
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/916602 | System and method for providing security for robots | Mar 8, 2018 | Issued |
Array
(
[id] => 16373561
[patent_doc_number] => 10805339
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-13
[patent_title] => Method to mitigate timing based attacks on key agreement schemes over controller area network
[patent_app_type] => utility
[patent_app_number] => 15/915871
[patent_app_country] => US
[patent_app_date] => 2018-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7439
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15915871
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/915871 | Method to mitigate timing based attacks on key agreement schemes over controller area network | Mar 7, 2018 | Issued |
Array
(
[id] => 14076931
[patent_doc_number] => 20190087353
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-21
[patent_title] => DATA STORAGE APPARATUS
[patent_app_type] => utility
[patent_app_number] => 15/913963
[patent_app_country] => US
[patent_app_date] => 2018-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9700
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 244
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15913963
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/913963 | Data storage apparatus | Mar 6, 2018 | Issued |
Array
(
[id] => 16338222
[patent_doc_number] => 10789179
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-09-29
[patent_title] => Decentralized access management in information processing system utilizing persistent memory
[patent_app_type] => utility
[patent_app_number] => 15/895653
[patent_app_country] => US
[patent_app_date] => 2018-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6952
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15895653
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/895653 | Decentralized access management in information processing system utilizing persistent memory | Feb 12, 2018 | Issued |
Array
(
[id] => 14513127
[patent_doc_number] => 20190200218
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-06-27
[patent_title] => TRANSFERING SOFT TOKENS FROM ONE MOBILE DEVICE TO ANOTHER
[patent_app_type] => utility
[patent_app_number] => 15/851250
[patent_app_country] => US
[patent_app_date] => 2017-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8804
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15851250
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/851250 | Transfering soft tokens from one mobile device to another | Dec 20, 2017 | Issued |
Array
(
[id] => 16065675
[patent_doc_number] => 10691789
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-23
[patent_title] => Authentication/security using user activity mining based live question-answering
[patent_app_type] => utility
[patent_app_number] => 15/846411
[patent_app_country] => US
[patent_app_date] => 2017-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7685
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 325
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15846411
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/846411 | Authentication/security using user activity mining based live question-answering | Dec 18, 2017 | Issued |