Chuck Y Mah
Examiner (ID: 15501, Phone: (571)272-7059 , Office: P/3677 )
Most Active Art Unit | 3677 |
Art Unit(s) | 3209, 3626, 3205, 3676, 3677 |
Total Applications | 3890 |
Issued Applications | 3179 |
Pending Applications | 150 |
Abandoned Applications | 561 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 10867558
[patent_doc_number] => 08893289
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-18
[patent_title] => 'Internal privacy invasion detection and prevention system'
[patent_app_type] => utility
[patent_app_number] => 13/546663
[patent_app_country] => US
[patent_app_date] => 2012-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8223
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13546663
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/546663 | Internal privacy invasion detection and prevention system | Jul 10, 2012 | Issued |
Array
(
[id] => 9999262
[patent_doc_number] => 09043879
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-05-26
[patent_title] => 'Facilitating enforcement of PRL restrictions'
[patent_app_type] => utility
[patent_app_number] => 13/546688
[patent_app_country] => US
[patent_app_date] => 2012-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 7641
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13546688
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/546688 | Facilitating enforcement of PRL restrictions | Jul 10, 2012 | Issued |
Array
(
[id] => 9968172
[patent_doc_number] => 09015808
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-04-21
[patent_title] => 'Restricting mobile device services between an occurrence of an account change and acquisition of a security code'
[patent_app_type] => utility
[patent_app_number] => 13/546786
[patent_app_country] => US
[patent_app_date] => 2012-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7652
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13546786
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/546786 | Restricting mobile device services between an occurrence of an account change and acquisition of a security code | Jul 10, 2012 | Issued |
Array
(
[id] => 9584409
[patent_doc_number] => 08774415
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-08
[patent_title] => 'Key sharing device, key sharing method, and computer program product'
[patent_app_type] => utility
[patent_app_number] => 13/545181
[patent_app_country] => US
[patent_app_date] => 2012-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 7040
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13545181
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/545181 | Key sharing device, key sharing method, and computer program product | Jul 9, 2012 | Issued |
Array
(
[id] => 8915527
[patent_doc_number] => 20130177152
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-11
[patent_title] => 'Cryptographic Key Spilt Combiner'
[patent_app_type] => utility
[patent_app_number] => 13/544132
[patent_app_country] => US
[patent_app_date] => 2012-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 3712
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13544132
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/544132 | Cryptographic key split combiner | Jul 8, 2012 | Issued |
Array
(
[id] => 8672456
[patent_doc_number] => 20130046994
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-02-21
[patent_title] => 'INTEGRATED GENOMIC AND PROTEOMIC SECURITY PROTOCOL'
[patent_app_type] => utility
[patent_app_number] => 13/534442
[patent_app_country] => US
[patent_app_date] => 2012-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 35
[patent_figures_cnt] => 35
[patent_no_of_words] => 12999
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13534442
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/534442 | Integrated genomic and proteomic security protocol | Jun 26, 2012 | Issued |
Array
(
[id] => 8518214
[patent_doc_number] => 20120317622
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-12-13
[patent_title] => 'HARDWARE IDENTITY IN MULTI-FACTOR AUTHENTICATION AT THE APPLICATION LAYER'
[patent_app_type] => utility
[patent_app_number] => 13/517584
[patent_app_country] => US
[patent_app_date] => 2012-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4619
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13517584
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/517584 | Hardware identity in multi-factor authentication at the application layer | Jun 12, 2012 | Issued |
Array
(
[id] => 10867154
[patent_doc_number] => 08892879
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-11-18
[patent_title] => 'System and method for securing and tracking files'
[patent_app_type] => utility
[patent_app_number] => 13/467155
[patent_app_country] => US
[patent_app_date] => 2012-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7798
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13467155
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/467155 | System and method for securing and tracking files | May 8, 2012 | Issued |
Array
(
[id] => 9968215
[patent_doc_number] => 09015851
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-21
[patent_title] => 'Electronic book content protection'
[patent_app_type] => utility
[patent_app_number] => 13/453146
[patent_app_country] => US
[patent_app_date] => 2012-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7515
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 69
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13453146
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/453146 | Electronic book content protection | Apr 22, 2012 | Issued |
Array
(
[id] => 9110265
[patent_doc_number] => 20130283397
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-24
[patent_title] => 'METHOD AND APPARATUS FOR PROVISIONING A MOBILE APPLICATION'
[patent_app_type] => utility
[patent_app_number] => 13/452196
[patent_app_country] => US
[patent_app_date] => 2012-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6294
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13452196
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/452196 | Method and apparatus for provisioning a mobile application | Apr 19, 2012 | Issued |
Array
(
[id] => 9578825
[patent_doc_number] => 08769260
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-07-01
[patent_title] => 'Messaging system with user-friendly encryption and decryption'
[patent_app_type] => utility
[patent_app_number] => 13/443337
[patent_app_country] => US
[patent_app_date] => 2012-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 4245
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13443337
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/443337 | Messaging system with user-friendly encryption and decryption | Apr 9, 2012 | Issued |
Array
(
[id] => 8498083
[patent_doc_number] => 20120297491
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-22
[patent_title] => 'NETWORK SECURITY SMART LOAD BALANCING'
[patent_app_type] => utility
[patent_app_number] => 13/431989
[patent_app_country] => US
[patent_app_date] => 2012-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5165
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13431989
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/431989 | Network security smart load balancing | Mar 27, 2012 | Issued |
Array
(
[id] => 9282941
[patent_doc_number] => 20140032909
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-30
[patent_title] => 'METHOD AND APPARATUS FOR PUBLIC KEY CRYPTOGRAPHY'
[patent_app_type] => utility
[patent_app_number] => 13/423858
[patent_app_country] => US
[patent_app_date] => 2012-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5134
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13423858
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/423858 | Method and apparatus for public key cryptography | Mar 18, 2012 | Issued |
Array
(
[id] => 10164609
[patent_doc_number] => 09195834
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-11-24
[patent_title] => 'Cloud authentication'
[patent_app_type] => utility
[patent_app_number] => 13/370078
[patent_app_country] => US
[patent_app_date] => 2012-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 15
[patent_no_of_words] => 19872
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 14
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13370078
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/370078 | Cloud authentication | Feb 8, 2012 | Issued |
Array
(
[id] => 9358582
[patent_doc_number] => 08677136
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-18
[patent_title] => 'Authenticating messages using cryptographic algorithm constants supplied to a storage-constrained target'
[patent_app_type] => utility
[patent_app_number] => 13/326489
[patent_app_country] => US
[patent_app_date] => 2011-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2309
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13326489
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/326489 | Authenticating messages using cryptographic algorithm constants supplied to a storage-constrained target | Dec 14, 2011 | Issued |
Array
(
[id] => 8242828
[patent_doc_number] => 20120151565
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-14
[patent_title] => 'SYSTEM, APPARATUS AND METHOD FOR IDENTIFYING AND BLOCKING ANOMALOUS OR IMPROPER USE OF IDENTITY INFORMATION ON COMPUTER NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 13/323372
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 4386
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323372
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/323372 | SYSTEM, APPARATUS AND METHOD FOR IDENTIFYING AND BLOCKING ANOMALOUS OR IMPROPER USE OF IDENTITY INFORMATION ON COMPUTER NETWORKS | Dec 11, 2011 | Abandoned |
Array
(
[id] => 8255306
[patent_doc_number] => 20120159622
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-21
[patent_title] => 'METHOD AND APPARATUS FOR GENERATING ADAPTIVE SECURITY MODEL'
[patent_app_type] => utility
[patent_app_number] => 13/323263
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3618
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0159/20120159622.pdf
[firstpage_image] =>[orig_patent_app_number] => 13323263
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/323263 | METHOD AND APPARATUS FOR GENERATING ADAPTIVE SECURITY MODEL | Dec 11, 2011 | Abandoned |
Array
(
[id] => 9358931
[patent_doc_number] => 08677488
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-18
[patent_title] => 'Distributed denial of service attack detection apparatus and method, and distributed denial of service attack detection and prevention apparatus for reducing false-positive'
[patent_app_type] => utility
[patent_app_number] => 13/323050
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5936
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323050
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/323050 | Distributed denial of service attack detection apparatus and method, and distributed denial of service attack detection and prevention apparatus for reducing false-positive | Dec 11, 2011 | Issued |
Array
(
[id] => 8242840
[patent_doc_number] => 20120151575
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-14
[patent_title] => 'APPARATUS AND METHOD FOR CERTIFICATING SECURITY IN PORTABLE TERMINAL'
[patent_app_type] => utility
[patent_app_number] => 13/316823
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2740
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13316823
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/316823 | APPARATUS AND METHOD FOR CERTIFICATING SECURITY IN PORTABLE TERMINAL | Dec 11, 2011 | Abandoned |
Array
(
[id] => 8312094
[patent_doc_number] => 20120189118
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-07-26
[patent_title] => 'METHOD AND SYSTEM FOR ENCRYPTION OF A DATASTREAM'
[patent_app_type] => utility
[patent_app_number] => 13/316725
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6040
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13316725
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/316725 | Method and system for encryption of a datastream | Dec 11, 2011 | Issued |