
Henry Tsai
Supervisory Patent Examiner (ID: 203, Phone: (571)272-4176 , Office: P/2184 )
| Most Active Art Unit | 3722 |
| Art Unit(s) | 3722, 2181, 3209, 2183, 3727, 2184 |
| Total Applications | 1098 |
| Issued Applications | 890 |
| Pending Applications | 79 |
| Abandoned Applications | 129 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11688195
[patent_doc_number] => 09686250
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-20
[patent_title] => 'Systems and methods for decryption as a service via a hardware security module'
[patent_app_type] => utility
[patent_app_number] => 15/218352
[patent_app_country] => US
[patent_app_date] => 2016-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 28342
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 250
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15218352
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/218352 | Systems and methods for decryption as a service via a hardware security module | Jul 24, 2016 | Issued |
Array
(
[id] => 13240965
[patent_doc_number] => 10133681
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-20
[patent_title] => Using encryption keys to manage data retention
[patent_app_type] => utility
[patent_app_number] => 15/217863
[patent_app_country] => US
[patent_app_date] => 2016-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9276
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15217863
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/217863 | Using encryption keys to manage data retention | Jul 21, 2016 | Issued |
Array
(
[id] => 13227235
[patent_doc_number] => 10127393
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-13
[patent_title] => Next generation access control system and process for controlling database access
[patent_app_type] => utility
[patent_app_number] => 15/215556
[patent_app_country] => US
[patent_app_date] => 2016-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 12975
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 16
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15215556
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/215556 | Next generation access control system and process for controlling database access | Jul 19, 2016 | Issued |
Array
(
[id] => 13158275
[patent_doc_number] => 10095864
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-09
[patent_title] => System and method for performing event inquiries in a network
[patent_app_type] => utility
[patent_app_number] => 15/215483
[patent_app_country] => US
[patent_app_date] => 2016-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 19566
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15215483
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/215483 | System and method for performing event inquiries in a network | Jul 19, 2016 | Issued |
Array
(
[id] => 13975155
[patent_doc_number] => 10216934
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-02-26
[patent_title] => Inferential exploit attempt detection
[patent_app_type] => utility
[patent_app_number] => 15/213004
[patent_app_country] => US
[patent_app_date] => 2016-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9859
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15213004
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/213004 | Inferential exploit attempt detection | Jul 17, 2016 | Issued |
Array
(
[id] => 11403801
[patent_doc_number] => 20170024339
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-26
[patent_title] => 'Network Unit of Electronic Appliances, Network of Electronic Appliances, and Method of Using Chip Identification Device'
[patent_app_type] => utility
[patent_app_number] => 15/210928
[patent_app_country] => US
[patent_app_date] => 2016-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 72
[patent_figures_cnt] => 72
[patent_no_of_words] => 26786
[patent_no_of_claims] => 42
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15210928
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/210928 | Network unit of electronic appliances, network of electronic appliances, and method of using chip identification device | Jul 14, 2016 | Issued |
Array
(
[id] => 11484430
[patent_doc_number] => 09591001
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-07
[patent_title] => 'Remote processing of mobile applications'
[patent_app_type] => utility
[patent_app_number] => 15/208285
[patent_app_country] => US
[patent_app_date] => 2016-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 27004
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15208285
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/208285 | Remote processing of mobile applications | Jul 11, 2016 | Issued |
Array
(
[id] => 11412701
[patent_doc_number] => 09560025
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-31
[patent_title] => 'Apparatus and method for secure delivery of data from a communication device'
[patent_app_type] => utility
[patent_app_number] => 15/205402
[patent_app_country] => US
[patent_app_date] => 2016-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 12
[patent_no_of_words] => 14001
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15205402
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/205402 | Apparatus and method for secure delivery of data from a communication device | Jul 7, 2016 | Issued |
Array
(
[id] => 12129963
[patent_doc_number] => 20180013549
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-11
[patent_title] => 'MANAGING USER-CONTROLLED SECURITY KEYS IN CLOUD-BASED SCENARIOS'
[patent_app_type] => utility
[patent_app_number] => 15/203663
[patent_app_country] => US
[patent_app_date] => 2016-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5845
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15203663
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/203663 | Managing user-controlled security keys in cloud-based scenarios | Jul 5, 2016 | Issued |
Array
(
[id] => 12292167
[patent_doc_number] => 09934401
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-03
[patent_title] => Hierarchical permissions model within a document
[patent_app_type] => utility
[patent_app_number] => 15/198862
[patent_app_country] => US
[patent_app_date] => 2016-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 23
[patent_no_of_words] => 9836
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15198862
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/198862 | Hierarchical permissions model within a document | Jun 29, 2016 | Issued |
Array
(
[id] => 14741371
[patent_doc_number] => 10390106
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-20
[patent_title] => Device and method for processing image
[patent_app_type] => utility
[patent_app_number] => 15/193713
[patent_app_country] => US
[patent_app_date] => 2016-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 12
[patent_no_of_words] => 9867
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15193713
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/193713 | Device and method for processing image | Jun 26, 2016 | Issued |
Array
(
[id] => 13120815
[patent_doc_number] => 10078762
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-09-18
[patent_title] => Systems and methods for digitally enforcing computer parental controls
[patent_app_type] => utility
[patent_app_number] => 15/191504
[patent_app_country] => US
[patent_app_date] => 2016-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8788
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 433
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15191504
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/191504 | Systems and methods for digitally enforcing computer parental controls | Jun 22, 2016 | Issued |
Array
(
[id] => 11354723
[patent_doc_number] => 20160373464
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'COMMUNICATION SYSTEM, METHOD AND BASE STATION'
[patent_app_type] => utility
[patent_app_number] => 15/185432
[patent_app_country] => US
[patent_app_date] => 2016-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 9623
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15185432
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/185432 | COMMUNICATION SYSTEM, METHOD AND BASE STATION | Jun 16, 2016 | Abandoned |
Array
(
[id] => 11701015
[patent_doc_number] => 09690932
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-27
[patent_title] => 'Predicting and preventing an attacker\'s next actions in a breached network'
[patent_app_type] => utility
[patent_app_number] => 15/175054
[patent_app_country] => US
[patent_app_date] => 2016-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4419
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15175054
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/175054 | Predicting and preventing an attacker's next actions in a breached network | Jun 6, 2016 | Issued |
Array
(
[id] => 14254707
[patent_doc_number] => 10277567
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-30
[patent_title] => Method and server for issuing cryptographic keys to communication devices
[patent_app_type] => utility
[patent_app_number] => 15/174762
[patent_app_country] => US
[patent_app_date] => 2016-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 5951
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15174762
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/174762 | Method and server for issuing cryptographic keys to communication devices | Jun 5, 2016 | Issued |
Array
(
[id] => 12027940
[patent_doc_number] => 20170318039
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-02
[patent_title] => 'DETECTION OF SLEEP DEPRIVATION ATTACK AND MITIGATION'
[patent_app_type] => utility
[patent_app_number] => 15/164792
[patent_app_country] => US
[patent_app_date] => 2016-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 6700
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15164792
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/164792 | Detection of sleep deprivation attack and mitigation | May 24, 2016 | Issued |
Array
(
[id] => 13161627
[patent_doc_number] => 10097552
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-09
[patent_title] => Network of trusted users
[patent_app_type] => utility
[patent_app_number] => 15/164519
[patent_app_country] => US
[patent_app_date] => 2016-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 21537
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15164519
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/164519 | Network of trusted users | May 24, 2016 | Issued |
Array
(
[id] => 11294808
[patent_doc_number] => 20160344740
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-24
[patent_title] => 'SYSTEM AND METHOD FOR ACCESS AND MANAGEMENT OF THINGS OVER A COMMUNICATION NETWORK RELATED THERETO'
[patent_app_type] => utility
[patent_app_number] => 15/161244
[patent_app_country] => US
[patent_app_date] => 2016-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8437
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15161244
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/161244 | System and method for access and management of physical objects over a communication network related thereto | May 21, 2016 | Issued |
Array
(
[id] => 11340362
[patent_doc_number] => 20160366118
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'Token-based Authentication and Authorization Information Signaling and Exchange for Adaptive Streaming'
[patent_app_type] => utility
[patent_app_number] => 15/161039
[patent_app_country] => US
[patent_app_date] => 2016-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 10398
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15161039
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/161039 | Token-based authentication and authorization information signaling and exchange for adaptive streaming | May 19, 2016 | Issued |
Array
(
[id] => 12518331
[patent_doc_number] => 10003586
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-19
[patent_title] => Method and device for generating a secret key
[patent_app_type] => utility
[patent_app_number] => 15/156647
[patent_app_country] => US
[patent_app_date] => 2016-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 2
[patent_no_of_words] => 1479
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15156647
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/156647 | Method and device for generating a secret key | May 16, 2016 | Issued |