Chuck Y Mah
Examiner (ID: 15501, Phone: (571)272-7059 , Office: P/3677 )
Most Active Art Unit | 3677 |
Art Unit(s) | 3209, 3626, 3205, 3676, 3677 |
Total Applications | 3890 |
Issued Applications | 3179 |
Pending Applications | 150 |
Abandoned Applications | 561 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 10956265
[patent_doc_number] => 20140359287
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-04
[patent_title] => 'METHOD AND SYSTEM FOR RECONSTRUCTION OF A DATA OBJECT FROM DISTRIBUTED REDUNDANT DATA PARTS'
[patent_app_type] => utility
[patent_app_number] => 14/291877
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8423
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291877
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/291877 | Method and system for reconstruction of a data object from distributed redundant data parts | May 29, 2014 | Issued |
Array
(
[id] => 10462726
[patent_doc_number] => 20150347741
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'METHOD FOR MANAGING SECURITY OF A DATA PROCESSING SYSTEM WITH CONFIGURABLE SECURITY RESTRICTIONS'
[patent_app_type] => utility
[patent_app_number] => 14/292711
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5610
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292711
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/292711 | Method for managing security of a data processing system with configurable security restrictions | May 29, 2014 | Issued |
Array
(
[id] => 10625461
[patent_doc_number] => 09344421
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-05-17
[patent_title] => 'User access authentication based on network access point'
[patent_app_type] => utility
[patent_app_number] => 14/290914
[patent_app_country] => US
[patent_app_date] => 2014-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7270
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14290914
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/290914 | User access authentication based on network access point | May 28, 2014 | Issued |
Array
(
[id] => 11533585
[patent_doc_number] => 20170093566
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'Management of Cryptographic Keys'
[patent_app_type] => utility
[patent_app_number] => 15/310848
[patent_app_country] => US
[patent_app_date] => 2014-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7070
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15310848
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/310848 | Management of cryptographic keys | May 25, 2014 | Issued |
Array
(
[id] => 10772988
[patent_doc_number] => 20160119144
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'DATA ENCRYPTION AND/OR DECRYPTION BY INTEGRATED CIRCUIT'
[patent_app_type] => utility
[patent_app_number] => 14/285379
[patent_app_country] => US
[patent_app_date] => 2014-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5905
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14285379
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/285379 | DATA ENCRYPTION AND/OR DECRYPTION BY INTEGRATED CIRCUIT | May 21, 2014 | Abandoned |
Array
(
[id] => 9787691
[patent_doc_number] => 20140304511
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-09
[patent_title] => 'Sensor module and method for operating a sensor module'
[patent_app_type] => utility
[patent_app_number] => 14/229194
[patent_app_country] => US
[patent_app_date] => 2014-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7695
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14229194
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/229194 | Sensor module and method for operating a sensor module | Mar 27, 2014 | Abandoned |
Array
(
[id] => 10571099
[patent_doc_number] => 09294288
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-22
[patent_title] => 'Facilitating secure online transactions'
[patent_app_type] => utility
[patent_app_number] => 14/228165
[patent_app_country] => US
[patent_app_date] => 2014-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 6239
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14228165
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/228165 | Facilitating secure online transactions | Mar 26, 2014 | Issued |
Array
(
[id] => 11020322
[patent_doc_number] => 20160217275
[patent_country] => US
[patent_kind] => A9
[patent_issue_date] => 2016-07-28
[patent_title] => 'SYSTEM AND METHOD FOR SECURELY RETRIEVING AND PLAYING DIGITAL MEDIA'
[patent_app_type] => utility
[patent_app_number] => 14/219088
[patent_app_country] => US
[patent_app_date] => 2014-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3626
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14219088
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/219088 | System and method for securely retrieving and playing digital media | Mar 18, 2014 | Issued |
Array
(
[id] => 11020322
[patent_doc_number] => 20160217275
[patent_country] => US
[patent_kind] => A9
[patent_issue_date] => 2016-07-28
[patent_title] => 'SYSTEM AND METHOD FOR SECURELY RETRIEVING AND PLAYING DIGITAL MEDIA'
[patent_app_type] => utility
[patent_app_number] => 14/219088
[patent_app_country] => US
[patent_app_date] => 2014-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3626
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14219088
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/219088 | System and method for securely retrieving and playing digital media | Mar 18, 2014 | Issued |
Array
(
[id] => 11726104
[patent_doc_number] => 09698976
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-07-04
[patent_title] => 'Key management and dynamic perfect forward secrecy'
[patent_app_type] => utility
[patent_app_number] => 14/213736
[patent_app_country] => US
[patent_app_date] => 2014-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 6741
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14213736
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/213736 | Key management and dynamic perfect forward secrecy | Mar 13, 2014 | Issued |
Array
(
[id] => 9564186
[patent_doc_number] => 20140181899
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-26
[patent_title] => 'METHOD AND APPARATUS TO IMPLEMENT SECURITY IN A LONG TERM EVOLUTION WIRELESS DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/194018
[patent_app_country] => US
[patent_app_date] => 2014-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6551
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14194018
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/194018 | Method and apparatus to implement security in a long term evolution wireless device | Feb 27, 2014 | Issued |
Array
(
[id] => 11782547
[patent_doc_number] => 09391771
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'Server-client secret generation with cached data'
[patent_app_type] => utility
[patent_app_number] => 14/390368
[patent_app_country] => US
[patent_app_date] => 2014-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9923
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14390368
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/390368 | Server-client secret generation with cached data | Feb 5, 2014 | Issued |
Array
(
[id] => 10562794
[patent_doc_number] => 09286473
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-15
[patent_title] => 'Quarantine-based mitigation of effects of a local DoS attack'
[patent_app_type] => utility
[patent_app_number] => 14/165439
[patent_app_country] => US
[patent_app_date] => 2014-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 18
[patent_no_of_words] => 8823
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 51
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14165439
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/165439 | Quarantine-based mitigation of effects of a local DoS attack | Jan 26, 2014 | Issued |
Array
(
[id] => 13294905
[patent_doc_number] => 10158660
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-12-18
[patent_title] => Dynamic vulnerability correlation
[patent_app_type] => utility
[patent_app_number] => 14/165410
[patent_app_country] => US
[patent_app_date] => 2014-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 16
[patent_no_of_words] => 10112
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14165410
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/165410 | Dynamic vulnerability correlation | Jan 26, 2014 | Issued |
Array
(
[id] => 10303935
[patent_doc_number] => 20150188935
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-02
[patent_title] => 'ATTACK MITIGATION USING LEARNING MACHINES'
[patent_app_type] => utility
[patent_app_number] => 14/165424
[patent_app_country] => US
[patent_app_date] => 2014-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8532
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14165424
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/165424 | Attack mitigation using learning machines | Jan 26, 2014 | Issued |
Array
(
[id] => 11195717
[patent_doc_number] => 09426542
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-08-23
[patent_title] => 'Automating quality assurance for standardized content sharing'
[patent_app_type] => utility
[patent_app_number] => 14/161369
[patent_app_country] => US
[patent_app_date] => 2014-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4830
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14161369
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/161369 | Automating quality assurance for standardized content sharing | Jan 21, 2014 | Issued |
Array
(
[id] => 10249958
[patent_doc_number] => 20150134954
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-14
[patent_title] => 'SENSOR MANAGEMENT SYSTEM IN AN IOT NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/161653
[patent_app_country] => US
[patent_app_date] => 2014-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9688
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14161653
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/161653 | SENSOR MANAGEMENT SYSTEM IN AN IOT NETWORK | Jan 21, 2014 | Abandoned |
Array
(
[id] => 10204677
[patent_doc_number] => 20150089664
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'ELECTRONIC DEVICE AND UNLOCKING METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/159445
[patent_app_country] => US
[patent_app_date] => 2014-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 10035
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14159445
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/159445 | Electronic device and unlocking method thereof | Jan 20, 2014 | Issued |
Array
(
[id] => 9479738
[patent_doc_number] => 20140137201
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-15
[patent_title] => 'DETERMINING A TRUST LEVEL OF A USER IN A SOCIAL NETWORK ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/160292
[patent_app_country] => US
[patent_app_date] => 2014-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7024
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14160292
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/160292 | Determining a trust level of a user in a social network environment | Jan 20, 2014 | Issued |
Array
(
[id] => 10616955
[patent_doc_number] => 09336401
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-10
[patent_title] => 'Implementing enhanced security with storing data in DRAMs'
[patent_app_type] => utility
[patent_app_number] => 14/158992
[patent_app_country] => US
[patent_app_date] => 2014-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3135
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14158992
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/158992 | Implementing enhanced security with storing data in DRAMs | Jan 19, 2014 | Issued |