Chuck Y Mah
Examiner (ID: 15501, Phone: (571)272-7059 , Office: P/3677 )
Most Active Art Unit | 3677 |
Art Unit(s) | 3209, 3626, 3205, 3676, 3677 |
Total Applications | 3890 |
Issued Applications | 3179 |
Pending Applications | 150 |
Abandoned Applications | 561 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 10519861
[patent_doc_number] => 09246921
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-01-26
[patent_title] => 'Secure external access to device automation system'
[patent_app_type] => utility
[patent_app_number] => 14/159398
[patent_app_country] => US
[patent_app_date] => 2014-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7222
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 257
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14159398
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/159398 | Secure external access to device automation system | Jan 19, 2014 | Issued |
Array
(
[id] => 10867570
[patent_doc_number] => 08893301
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-11-18
[patent_title] => 'Method, system, and device for providing a market for digital goods'
[patent_app_type] => utility
[patent_app_number] => 14/154100
[patent_app_country] => US
[patent_app_date] => 2014-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5264
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 430
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14154100
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/154100 | Method, system, and device for providing a market for digital goods | Jan 12, 2014 | Issued |
Array
(
[id] => 10569537
[patent_doc_number] => 09292708
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-22
[patent_title] => 'Protection of interpreted source code in virtual appliances'
[patent_app_type] => utility
[patent_app_number] => 14/086589
[patent_app_country] => US
[patent_app_date] => 2013-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2906
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14086589
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/086589 | Protection of interpreted source code in virtual appliances | Nov 20, 2013 | Issued |
Array
(
[id] => 9365658
[patent_doc_number] => 20140075531
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-13
[patent_title] => 'USING IDENTITY/RESOURCE PROFILE AND DIRECTORY ENABLERS TO SUPPORT IDENTITY MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 14/081578
[patent_app_country] => US
[patent_app_date] => 2013-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9930
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14081578
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/081578 | Using identity/resource profile and directory enablers to support identity management | Nov 14, 2013 | Issued |
Array
(
[id] => 10872237
[patent_doc_number] => 08897451
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-25
[patent_title] => 'Storing secure information using hash techniques'
[patent_app_type] => utility
[patent_app_number] => 14/079519
[patent_app_country] => US
[patent_app_date] => 2013-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 3917
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14079519
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/079519 | Storing secure information using hash techniques | Nov 12, 2013 | Issued |
Array
(
[id] => 10166371
[patent_doc_number] => 09197610
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-11-24
[patent_title] => 'Packet authentication and encryption in virtual networks'
[patent_app_type] => utility
[patent_app_number] => 14/060396
[patent_app_country] => US
[patent_app_date] => 2013-10-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 10589
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14060396
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/060396 | Packet authentication and encryption in virtual networks | Oct 21, 2013 | Issued |
Array
(
[id] => 10653005
[patent_doc_number] => 09369279
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-14
[patent_title] => 'Handling key rotation problems'
[patent_app_type] => utility
[patent_app_number] => 14/034091
[patent_app_country] => US
[patent_app_date] => 2013-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 17069
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14034091
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/034091 | Handling key rotation problems | Sep 22, 2013 | Issued |
Array
(
[id] => 10204252
[patent_doc_number] => 20150089240
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'Biometric management system'
[patent_app_type] => utility
[patent_app_number] => 14/033443
[patent_app_country] => US
[patent_app_date] => 2013-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5934
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14033443
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/033443 | Biometric management system | Sep 20, 2013 | Abandoned |
Array
(
[id] => 9386588
[patent_doc_number] => 20140090071
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-27
[patent_title] => 'Systems and Methods for Runtime Adaptive Security to Protect Variable Assets'
[patent_app_type] => utility
[patent_app_number] => 14/033371
[patent_app_country] => US
[patent_app_date] => 2013-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9567
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14033371
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/033371 | Systems and methods for runtime adaptive security to protect variable assets | Sep 19, 2013 | Issued |
Array
(
[id] => 9934232
[patent_doc_number] => 20150082424
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-19
[patent_title] => 'Active Web Content Whitelisting'
[patent_app_type] => utility
[patent_app_number] => 14/031641
[patent_app_country] => US
[patent_app_date] => 2013-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3669
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14031641
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/031641 | Active Web Content Whitelisting | Sep 18, 2013 | Abandoned |
Array
(
[id] => 11220523
[patent_doc_number] => 09448859
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-20
[patent_title] => 'Exploiting hot application programming interfaces (APIs) and action patterns for efficient storage of API logs on mobile devices for behavioral analysis'
[patent_app_type] => utility
[patent_app_number] => 14/028914
[patent_app_country] => US
[patent_app_date] => 2013-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 16053
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14028914
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/028914 | Exploiting hot application programming interfaces (APIs) and action patterns for efficient storage of API logs on mobile devices for behavioral analysis | Sep 16, 2013 | Issued |
Array
(
[id] => 10172896
[patent_doc_number] => 09203615
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-01
[patent_title] => 'Confidential provisioning of secret keys over the air'
[patent_app_type] => utility
[patent_app_number] => 14/027438
[patent_app_country] => US
[patent_app_date] => 2013-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 6309
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027438
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/027438 | Confidential provisioning of secret keys over the air | Sep 15, 2013 | Issued |
Array
(
[id] => 11200442
[patent_doc_number] => 09430657
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-30
[patent_title] => 'Data encryption system and method'
[patent_app_type] => utility
[patent_app_number] => 14/026346
[patent_app_country] => US
[patent_app_date] => 2013-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 4163
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14026346
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/026346 | Data encryption system and method | Sep 12, 2013 | Issued |
Array
(
[id] => 11803221
[patent_doc_number] => 09544151
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-10
[patent_title] => 'Controlling access to clinical data analyzed by remote computing resources'
[patent_app_type] => utility
[patent_app_number] => 14/427324
[patent_app_country] => US
[patent_app_date] => 2013-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 3641
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14427324
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/427324 | Controlling access to clinical data analyzed by remote computing resources | Sep 12, 2013 | Issued |
Array
(
[id] => 11912320
[patent_doc_number] => 09781152
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-10-03
[patent_title] => 'Methods and systems for performing dynamic risk analysis using user feedback'
[patent_app_type] => utility
[patent_app_number] => 14/023829
[patent_app_country] => US
[patent_app_date] => 2013-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4598
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14023829
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/023829 | Methods and systems for performing dynamic risk analysis using user feedback | Sep 10, 2013 | Issued |
Array
(
[id] => 11175463
[patent_doc_number] => 09408073
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-02
[patent_title] => 'Proximity and behavior-based enterprise security using a mobile device'
[patent_app_type] => utility
[patent_app_number] => 14/024536
[patent_app_country] => US
[patent_app_date] => 2013-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5475
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14024536
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/024536 | Proximity and behavior-based enterprise security using a mobile device | Sep 10, 2013 | Issued |
Array
(
[id] => 10639445
[patent_doc_number] => 09356962
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-31
[patent_title] => 'Extensible multi-tenant cloud-management system and methods for extending functionalities and services provided by a multi-tenant cloud-managment system'
[patent_app_type] => utility
[patent_app_number] => 14/023327
[patent_app_country] => US
[patent_app_date] => 2013-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 36
[patent_figures_cnt] => 38
[patent_no_of_words] => 17458
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14023327
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/023327 | Extensible multi-tenant cloud-management system and methods for extending functionalities and services provided by a multi-tenant cloud-managment system | Sep 9, 2013 | Issued |
Array
(
[id] => 11782787
[patent_doc_number] => 09392014
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'Automated detection of harmful content'
[patent_app_type] => utility
[patent_app_number] => 14/022455
[patent_app_country] => US
[patent_app_date] => 2013-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 5769
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14022455
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/022455 | Automated detection of harmful content | Sep 9, 2013 | Issued |
Array
(
[id] => 11222580
[patent_doc_number] => 09450932
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-20
[patent_title] => 'Mobile device and information protection method thereof'
[patent_app_type] => utility
[patent_app_number] => 14/020170
[patent_app_country] => US
[patent_app_date] => 2013-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4704
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14020170
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/020170 | Mobile device and information protection method thereof | Sep 5, 2013 | Issued |
Array
(
[id] => 9372856
[patent_doc_number] => 20140082729
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-20
[patent_title] => 'SYSTEM AND METHOD FOR ANALYZING REPACKAGED APPLICATION THROUGH RISK CALCULATION'
[patent_app_type] => utility
[patent_app_number] => 14/020008
[patent_app_country] => US
[patent_app_date] => 2013-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4863
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14020008
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/020008 | SYSTEM AND METHOD FOR ANALYZING REPACKAGED APPLICATION THROUGH RISK CALCULATION | Sep 5, 2013 | Abandoned |