Search

Chuck Y Mah

Examiner (ID: 15501, Phone: (571)272-7059 , Office: P/3677 )

Most Active Art Unit
3677
Art Unit(s)
3209, 3626, 3205, 3676, 3677
Total Applications
3890
Issued Applications
3179
Pending Applications
150
Abandoned Applications
561

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10519861 [patent_doc_number] => 09246921 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-01-26 [patent_title] => 'Secure external access to device automation system' [patent_app_type] => utility [patent_app_number] => 14/159398 [patent_app_country] => US [patent_app_date] => 2014-01-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7222 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 257 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14159398 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/159398
Secure external access to device automation system Jan 19, 2014 Issued
Array ( [id] => 10867570 [patent_doc_number] => 08893301 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-11-18 [patent_title] => 'Method, system, and device for providing a market for digital goods' [patent_app_type] => utility [patent_app_number] => 14/154100 [patent_app_country] => US [patent_app_date] => 2014-01-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5264 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 430 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14154100 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/154100
Method, system, and device for providing a market for digital goods Jan 12, 2014 Issued
Array ( [id] => 10569537 [patent_doc_number] => 09292708 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-03-22 [patent_title] => 'Protection of interpreted source code in virtual appliances' [patent_app_type] => utility [patent_app_number] => 14/086589 [patent_app_country] => US [patent_app_date] => 2013-11-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2906 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 119 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14086589 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/086589
Protection of interpreted source code in virtual appliances Nov 20, 2013 Issued
Array ( [id] => 9365658 [patent_doc_number] => 20140075531 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-03-13 [patent_title] => 'USING IDENTITY/RESOURCE PROFILE AND DIRECTORY ENABLERS TO SUPPORT IDENTITY MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 14/081578 [patent_app_country] => US [patent_app_date] => 2013-11-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9930 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14081578 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/081578
Using identity/resource profile and directory enablers to support identity management Nov 14, 2013 Issued
Array ( [id] => 10872237 [patent_doc_number] => 08897451 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-11-25 [patent_title] => 'Storing secure information using hash techniques' [patent_app_type] => utility [patent_app_number] => 14/079519 [patent_app_country] => US [patent_app_date] => 2013-11-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 3917 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 95 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14079519 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/079519
Storing secure information using hash techniques Nov 12, 2013 Issued
Array ( [id] => 10166371 [patent_doc_number] => 09197610 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-11-24 [patent_title] => 'Packet authentication and encryption in virtual networks' [patent_app_type] => utility [patent_app_number] => 14/060396 [patent_app_country] => US [patent_app_date] => 2013-10-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 10589 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 147 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14060396 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/060396
Packet authentication and encryption in virtual networks Oct 21, 2013 Issued
Array ( [id] => 10653005 [patent_doc_number] => 09369279 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-06-14 [patent_title] => 'Handling key rotation problems' [patent_app_type] => utility [patent_app_number] => 14/034091 [patent_app_country] => US [patent_app_date] => 2013-09-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 17069 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 134 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14034091 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/034091
Handling key rotation problems Sep 22, 2013 Issued
Array ( [id] => 10204252 [patent_doc_number] => 20150089240 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-26 [patent_title] => 'Biometric management system' [patent_app_type] => utility [patent_app_number] => 14/033443 [patent_app_country] => US [patent_app_date] => 2013-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5934 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14033443 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/033443
Biometric management system Sep 20, 2013 Abandoned
Array ( [id] => 9386588 [patent_doc_number] => 20140090071 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-03-27 [patent_title] => 'Systems and Methods for Runtime Adaptive Security to Protect Variable Assets' [patent_app_type] => utility [patent_app_number] => 14/033371 [patent_app_country] => US [patent_app_date] => 2013-09-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9567 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14033371 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/033371
Systems and methods for runtime adaptive security to protect variable assets Sep 19, 2013 Issued
Array ( [id] => 9934232 [patent_doc_number] => 20150082424 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-19 [patent_title] => 'Active Web Content Whitelisting' [patent_app_type] => utility [patent_app_number] => 14/031641 [patent_app_country] => US [patent_app_date] => 2013-09-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3669 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14031641 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/031641
Active Web Content Whitelisting Sep 18, 2013 Abandoned
Array ( [id] => 11220523 [patent_doc_number] => 09448859 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-09-20 [patent_title] => 'Exploiting hot application programming interfaces (APIs) and action patterns for efficient storage of API logs on mobile devices for behavioral analysis' [patent_app_type] => utility [patent_app_number] => 14/028914 [patent_app_country] => US [patent_app_date] => 2013-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 16053 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 209 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14028914 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/028914
Exploiting hot application programming interfaces (APIs) and action patterns for efficient storage of API logs on mobile devices for behavioral analysis Sep 16, 2013 Issued
Array ( [id] => 10172896 [patent_doc_number] => 09203615 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-01 [patent_title] => 'Confidential provisioning of secret keys over the air' [patent_app_type] => utility [patent_app_number] => 14/027438 [patent_app_country] => US [patent_app_date] => 2013-09-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 6309 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 159 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027438 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/027438
Confidential provisioning of secret keys over the air Sep 15, 2013 Issued
Array ( [id] => 11200442 [patent_doc_number] => 09430657 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-08-30 [patent_title] => 'Data encryption system and method' [patent_app_type] => utility [patent_app_number] => 14/026346 [patent_app_country] => US [patent_app_date] => 2013-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 4163 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 210 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14026346 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/026346
Data encryption system and method Sep 12, 2013 Issued
Array ( [id] => 11803221 [patent_doc_number] => 09544151 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-01-10 [patent_title] => 'Controlling access to clinical data analyzed by remote computing resources' [patent_app_type] => utility [patent_app_number] => 14/427324 [patent_app_country] => US [patent_app_date] => 2013-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 3641 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 188 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14427324 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/427324
Controlling access to clinical data analyzed by remote computing resources Sep 12, 2013 Issued
Array ( [id] => 11912320 [patent_doc_number] => 09781152 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-10-03 [patent_title] => 'Methods and systems for performing dynamic risk analysis using user feedback' [patent_app_type] => utility [patent_app_number] => 14/023829 [patent_app_country] => US [patent_app_date] => 2013-09-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4598 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 209 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14023829 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/023829
Methods and systems for performing dynamic risk analysis using user feedback Sep 10, 2013 Issued
Array ( [id] => 11175463 [patent_doc_number] => 09408073 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-08-02 [patent_title] => 'Proximity and behavior-based enterprise security using a mobile device' [patent_app_type] => utility [patent_app_number] => 14/024536 [patent_app_country] => US [patent_app_date] => 2013-09-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5475 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 127 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14024536 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/024536
Proximity and behavior-based enterprise security using a mobile device Sep 10, 2013 Issued
Array ( [id] => 10639445 [patent_doc_number] => 09356962 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-05-31 [patent_title] => 'Extensible multi-tenant cloud-management system and methods for extending functionalities and services provided by a multi-tenant cloud-managment system' [patent_app_type] => utility [patent_app_number] => 14/023327 [patent_app_country] => US [patent_app_date] => 2013-09-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 36 [patent_figures_cnt] => 38 [patent_no_of_words] => 17458 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14023327 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/023327
Extensible multi-tenant cloud-management system and methods for extending functionalities and services provided by a multi-tenant cloud-managment system Sep 9, 2013 Issued
Array ( [id] => 11782787 [patent_doc_number] => 09392014 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-07-12 [patent_title] => 'Automated detection of harmful content' [patent_app_type] => utility [patent_app_number] => 14/022455 [patent_app_country] => US [patent_app_date] => 2013-09-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 8 [patent_no_of_words] => 5769 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14022455 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/022455
Automated detection of harmful content Sep 9, 2013 Issued
Array ( [id] => 11222580 [patent_doc_number] => 09450932 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-09-20 [patent_title] => 'Mobile device and information protection method thereof' [patent_app_type] => utility [patent_app_number] => 14/020170 [patent_app_country] => US [patent_app_date] => 2013-09-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4704 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 128 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14020170 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/020170
Mobile device and information protection method thereof Sep 5, 2013 Issued
Array ( [id] => 9372856 [patent_doc_number] => 20140082729 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-03-20 [patent_title] => 'SYSTEM AND METHOD FOR ANALYZING REPACKAGED APPLICATION THROUGH RISK CALCULATION' [patent_app_type] => utility [patent_app_number] => 14/020008 [patent_app_country] => US [patent_app_date] => 2013-09-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 4863 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14020008 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/020008
SYSTEM AND METHOD FOR ANALYZING REPACKAGED APPLICATION THROUGH RISK CALCULATION Sep 5, 2013 Abandoned
Menu