Search

Chuck Y Mah

Examiner (ID: 15501, Phone: (571)272-7059 , Office: P/3677 )

Most Active Art Unit
3677
Art Unit(s)
3209, 3626, 3205, 3676, 3677
Total Applications
3890
Issued Applications
3179
Pending Applications
150
Abandoned Applications
561

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10867558 [patent_doc_number] => 08893289 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-11-18 [patent_title] => 'Internal privacy invasion detection and prevention system' [patent_app_type] => utility [patent_app_number] => 13/546663 [patent_app_country] => US [patent_app_date] => 2012-07-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8223 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13546663 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/546663
Internal privacy invasion detection and prevention system Jul 10, 2012 Issued
Array ( [id] => 9999262 [patent_doc_number] => 09043879 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-05-26 [patent_title] => 'Facilitating enforcement of PRL restrictions' [patent_app_type] => utility [patent_app_number] => 13/546688 [patent_app_country] => US [patent_app_date] => 2012-07-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 7641 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13546688 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/546688
Facilitating enforcement of PRL restrictions Jul 10, 2012 Issued
Array ( [id] => 9968172 [patent_doc_number] => 09015808 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-04-21 [patent_title] => 'Restricting mobile device services between an occurrence of an account change and acquisition of a security code' [patent_app_type] => utility [patent_app_number] => 13/546786 [patent_app_country] => US [patent_app_date] => 2012-07-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 7652 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13546786 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/546786
Restricting mobile device services between an occurrence of an account change and acquisition of a security code Jul 10, 2012 Issued
Array ( [id] => 9584409 [patent_doc_number] => 08774415 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-07-08 [patent_title] => 'Key sharing device, key sharing method, and computer program product' [patent_app_type] => utility [patent_app_number] => 13/545181 [patent_app_country] => US [patent_app_date] => 2012-07-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 7040 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 176 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13545181 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/545181
Key sharing device, key sharing method, and computer program product Jul 9, 2012 Issued
Array ( [id] => 8915527 [patent_doc_number] => 20130177152 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-07-11 [patent_title] => 'Cryptographic Key Spilt Combiner' [patent_app_type] => utility [patent_app_number] => 13/544132 [patent_app_country] => US [patent_app_date] => 2012-07-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 3712 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13544132 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/544132
Cryptographic key split combiner Jul 8, 2012 Issued
Array ( [id] => 8672456 [patent_doc_number] => 20130046994 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-02-21 [patent_title] => 'INTEGRATED GENOMIC AND PROTEOMIC SECURITY PROTOCOL' [patent_app_type] => utility [patent_app_number] => 13/534442 [patent_app_country] => US [patent_app_date] => 2012-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 35 [patent_figures_cnt] => 35 [patent_no_of_words] => 12999 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13534442 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/534442
Integrated genomic and proteomic security protocol Jun 26, 2012 Issued
Array ( [id] => 8518214 [patent_doc_number] => 20120317622 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-12-13 [patent_title] => 'HARDWARE IDENTITY IN MULTI-FACTOR AUTHENTICATION AT THE APPLICATION LAYER' [patent_app_type] => utility [patent_app_number] => 13/517584 [patent_app_country] => US [patent_app_date] => 2012-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4619 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13517584 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/517584
Hardware identity in multi-factor authentication at the application layer Jun 12, 2012 Issued
Array ( [id] => 10867154 [patent_doc_number] => 08892879 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-11-18 [patent_title] => 'System and method for securing and tracking files' [patent_app_type] => utility [patent_app_number] => 13/467155 [patent_app_country] => US [patent_app_date] => 2012-05-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7798 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 146 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13467155 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/467155
System and method for securing and tracking files May 8, 2012 Issued
Array ( [id] => 9968215 [patent_doc_number] => 09015851 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-04-21 [patent_title] => 'Electronic book content protection' [patent_app_type] => utility [patent_app_number] => 13/453146 [patent_app_country] => US [patent_app_date] => 2012-04-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7515 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 69 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13453146 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/453146
Electronic book content protection Apr 22, 2012 Issued
Array ( [id] => 9110265 [patent_doc_number] => 20130283397 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-10-24 [patent_title] => 'METHOD AND APPARATUS FOR PROVISIONING A MOBILE APPLICATION' [patent_app_type] => utility [patent_app_number] => 13/452196 [patent_app_country] => US [patent_app_date] => 2012-04-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6294 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13452196 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/452196
Method and apparatus for provisioning a mobile application Apr 19, 2012 Issued
Array ( [id] => 9578825 [patent_doc_number] => 08769260 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-07-01 [patent_title] => 'Messaging system with user-friendly encryption and decryption' [patent_app_type] => utility [patent_app_number] => 13/443337 [patent_app_country] => US [patent_app_date] => 2012-04-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 10 [patent_no_of_words] => 4245 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13443337 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/443337
Messaging system with user-friendly encryption and decryption Apr 9, 2012 Issued
Array ( [id] => 8498083 [patent_doc_number] => 20120297491 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-11-22 [patent_title] => 'NETWORK SECURITY SMART LOAD BALANCING' [patent_app_type] => utility [patent_app_number] => 13/431989 [patent_app_country] => US [patent_app_date] => 2012-03-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5165 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13431989 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/431989
Network security smart load balancing Mar 27, 2012 Issued
Array ( [id] => 9282941 [patent_doc_number] => 20140032909 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-01-30 [patent_title] => 'METHOD AND APPARATUS FOR PUBLIC KEY CRYPTOGRAPHY' [patent_app_type] => utility [patent_app_number] => 13/423858 [patent_app_country] => US [patent_app_date] => 2012-03-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5134 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13423858 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/423858
Method and apparatus for public key cryptography Mar 18, 2012 Issued
Array ( [id] => 10164609 [patent_doc_number] => 09195834 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-11-24 [patent_title] => 'Cloud authentication' [patent_app_type] => utility [patent_app_number] => 13/370078 [patent_app_country] => US [patent_app_date] => 2012-02-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 15 [patent_no_of_words] => 19872 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 14 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13370078 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/370078
Cloud authentication Feb 8, 2012 Issued
Array ( [id] => 9358582 [patent_doc_number] => 08677136 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-03-18 [patent_title] => 'Authenticating messages using cryptographic algorithm constants supplied to a storage-constrained target' [patent_app_type] => utility [patent_app_number] => 13/326489 [patent_app_country] => US [patent_app_date] => 2011-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 2309 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 158 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13326489 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/326489
Authenticating messages using cryptographic algorithm constants supplied to a storage-constrained target Dec 14, 2011 Issued
Array ( [id] => 8242828 [patent_doc_number] => 20120151565 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-14 [patent_title] => 'SYSTEM, APPARATUS AND METHOD FOR IDENTIFYING AND BLOCKING ANOMALOUS OR IMPROPER USE OF IDENTITY INFORMATION ON COMPUTER NETWORKS' [patent_app_type] => utility [patent_app_number] => 13/323372 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 4386 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323372 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/323372
SYSTEM, APPARATUS AND METHOD FOR IDENTIFYING AND BLOCKING ANOMALOUS OR IMPROPER USE OF IDENTITY INFORMATION ON COMPUTER NETWORKS Dec 11, 2011 Abandoned
Array ( [id] => 8255306 [patent_doc_number] => 20120159622 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-21 [patent_title] => 'METHOD AND APPARATUS FOR GENERATING ADAPTIVE SECURITY MODEL' [patent_app_type] => utility [patent_app_number] => 13/323263 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3618 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0159/20120159622.pdf [firstpage_image] =>[orig_patent_app_number] => 13323263 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/323263
METHOD AND APPARATUS FOR GENERATING ADAPTIVE SECURITY MODEL Dec 11, 2011 Abandoned
Array ( [id] => 9358931 [patent_doc_number] => 08677488 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-03-18 [patent_title] => 'Distributed denial of service attack detection apparatus and method, and distributed denial of service attack detection and prevention apparatus for reducing false-positive' [patent_app_type] => utility [patent_app_number] => 13/323050 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5936 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 166 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323050 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/323050
Distributed denial of service attack detection apparatus and method, and distributed denial of service attack detection and prevention apparatus for reducing false-positive Dec 11, 2011 Issued
Array ( [id] => 8242840 [patent_doc_number] => 20120151575 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-14 [patent_title] => 'APPARATUS AND METHOD FOR CERTIFICATING SECURITY IN PORTABLE TERMINAL' [patent_app_type] => utility [patent_app_number] => 13/316823 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2740 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13316823 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/316823
APPARATUS AND METHOD FOR CERTIFICATING SECURITY IN PORTABLE TERMINAL Dec 11, 2011 Abandoned
Array ( [id] => 8312094 [patent_doc_number] => 20120189118 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-07-26 [patent_title] => 'METHOD AND SYSTEM FOR ENCRYPTION OF A DATASTREAM' [patent_app_type] => utility [patent_app_number] => 13/316725 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6040 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13316725 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/316725
Method and system for encryption of a datastream Dec 11, 2011 Issued
Menu