
Henry Tsai
Supervisory Patent Examiner (ID: 203, Phone: (571)272-4176 , Office: P/2184 )
| Most Active Art Unit | 3722 |
| Art Unit(s) | 3722, 2181, 3209, 2183, 3727, 2184 |
| Total Applications | 1098 |
| Issued Applications | 890 |
| Pending Applications | 79 |
| Abandoned Applications | 129 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10357622
[patent_doc_number] => 20150242627
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'APPARATUS AND METHOD FOR BLOCKING ACTVITY OF MALWARE'
[patent_app_type] => utility
[patent_app_number] => 14/472047
[patent_app_country] => US
[patent_app_date] => 2014-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4912
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14472047
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/472047 | Apparatus and method for blocking activity of malware | Aug 27, 2014 | Issued |
Array
(
[id] => 9912655
[patent_doc_number] => 20150067858
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-05
[patent_title] => 'DETECTING UNWANTED INTRUSIONS INTO AN INFORMATION NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/472114
[patent_app_country] => US
[patent_app_date] => 2014-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7572
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14472114
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/472114 | Detecting unwanted intrusions into an information network | Aug 27, 2014 | Issued |
Array
(
[id] => 10054555
[patent_doc_number] => 09094448
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-28
[patent_title] => 'Methods and systems for evaluating software for known vulnerabilities'
[patent_app_type] => utility
[patent_app_number] => 14/466623
[patent_app_country] => US
[patent_app_date] => 2014-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 8097
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14466623
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/466623 | Methods and systems for evaluating software for known vulnerabilities | Aug 21, 2014 | Issued |
Array
(
[id] => 9841250
[patent_doc_number] => 20150033332
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-29
[patent_title] => 'GRAPHIC DISPLAY OF SECURITY THREATS BASED ON INDICATIONS OF ACCESS TO NEWLY REGISTERED DOMAINS'
[patent_app_type] => utility
[patent_app_number] => 14/445018
[patent_app_country] => US
[patent_app_date] => 2014-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 10287
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14445018
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/445018 | Graphic display of security threats based on indications of access to newly registered domains | Jul 27, 2014 | Issued |
Array
(
[id] => 10521575
[patent_doc_number] => 09248068
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-02
[patent_title] => 'Security threat detection of newly registered domains'
[patent_app_type] => utility
[patent_app_number] => 14/445023
[patent_app_country] => US
[patent_app_date] => 2014-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 16
[patent_no_of_words] => 10287
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14445023
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/445023 | Security threat detection of newly registered domains | Jul 27, 2014 | Issued |
Array
(
[id] => 10890869
[patent_doc_number] => 08914884
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-12-16
[patent_title] => 'System and methods for protecting data from input devices'
[patent_app_type] => utility
[patent_app_number] => 14/336655
[patent_app_country] => US
[patent_app_date] => 2014-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7901
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14336655
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/336655 | System and methods for protecting data from input devices | Jul 20, 2014 | Issued |
Array
(
[id] => 9897389
[patent_doc_number] => 20150052588
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-19
[patent_title] => 'SERIALIZED AUTHENTICATION AND AUTHORIZATION SERVICES'
[patent_app_type] => utility
[patent_app_number] => 14/332847
[patent_app_country] => US
[patent_app_date] => 2014-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8195
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14332847
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/332847 | Serialized authentication and authorization services | Jul 15, 2014 | Issued |
Array
(
[id] => 9801052
[patent_doc_number] => 20150012996
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-08
[patent_title] => 'SERVICE PROVIDER INVOCATION'
[patent_app_type] => utility
[patent_app_number] => 14/332929
[patent_app_country] => US
[patent_app_date] => 2014-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 19667
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14332929
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/332929 | SERVICE PROVIDER INVOCATION | Jul 15, 2014 | Abandoned |
Array
(
[id] => 11832789
[patent_doc_number] => 09729543
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-08
[patent_title] => 'Service provider invocation'
[patent_app_type] => utility
[patent_app_number] => 14/333126
[patent_app_country] => US
[patent_app_date] => 2014-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 19666
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14333126
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/333126 | Service provider invocation | Jul 15, 2014 | Issued |
Array
(
[id] => 9930165
[patent_doc_number] => 20150078357
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-19
[patent_title] => 'ACCESS CONTROL INTERFACES FOR ENHANCED WIRELESS ROUTER'
[patent_app_type] => utility
[patent_app_number] => 14/331600
[patent_app_country] => US
[patent_app_date] => 2014-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6175
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14331600
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/331600 | Access control interfaces for enhanced wireless router | Jul 14, 2014 | Issued |
Array
(
[id] => 10011425
[patent_doc_number] => 09054963
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-09
[patent_title] => 'Rule-based application access management'
[patent_app_type] => utility
[patent_app_number] => 14/324571
[patent_app_country] => US
[patent_app_date] => 2014-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 10937
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 268
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14324571
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/324571 | Rule-based application access management | Jul 6, 2014 | Issued |
Array
(
[id] => 10564501
[patent_doc_number] => 09288185
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-15
[patent_title] => 'Software firewall control'
[patent_app_type] => utility
[patent_app_number] => 14/317807
[patent_app_country] => US
[patent_app_date] => 2014-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8886
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14317807
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/317807 | Software firewall control | Jun 26, 2014 | Issued |
Array
(
[id] => 11848558
[patent_doc_number] => 09736125
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-15
[patent_title] => 'Method and device for generating access stratum key in communications system'
[patent_app_type] => utility
[patent_app_number] => 14/304073
[patent_app_country] => US
[patent_app_date] => 2014-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 19
[patent_no_of_words] => 16182
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14304073
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/304073 | Method and device for generating access stratum key in communications system | Jun 12, 2014 | Issued |
Array
(
[id] => 11181529
[patent_doc_number] => 09413536
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-09
[patent_title] => 'Remote secure device management in smart grid ami networks'
[patent_app_type] => utility
[patent_app_number] => 14/303122
[patent_app_country] => US
[patent_app_date] => 2014-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6303
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 219
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14303122
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/303122 | Remote secure device management in smart grid ami networks | Jun 11, 2014 | Issued |
Array
(
[id] => 9759155
[patent_doc_number] => 20140289856
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-25
[patent_title] => 'Method and Device for Optimizing and Configuring Detection Rule'
[patent_app_type] => utility
[patent_app_number] => 14/300409
[patent_app_country] => US
[patent_app_date] => 2014-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5041
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14300409
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/300409 | Method and device for optimizing and configuring detection rule | Jun 9, 2014 | Issued |
Array
(
[id] => 11345522
[patent_doc_number] => 09529930
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-12-27
[patent_title] => 'Unified ID'
[patent_app_type] => utility
[patent_app_number] => 14/300065
[patent_app_country] => US
[patent_app_date] => 2014-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2277
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14300065
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/300065 | Unified ID | Jun 8, 2014 | Issued |
Array
(
[id] => 10963103
[patent_doc_number] => 20140366134
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-11
[patent_title] => 'Malicious Code Blocking Method Using Management System for Monitoring Status of Vaccine'
[patent_app_type] => utility
[patent_app_number] => 14/299501
[patent_app_country] => US
[patent_app_date] => 2014-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3453
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14299501
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/299501 | Malicious Code Blocking Method Using Management System for Monitoring Status of Vaccine | Jun 8, 2014 | Abandoned |
Array
(
[id] => 10963062
[patent_doc_number] => 20140366092
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-11
[patent_title] => 'DATA TRANSMISSION METHOD AND MOBILE STORAGE DEVICE USING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 14/299135
[patent_app_country] => US
[patent_app_date] => 2014-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1689
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14299135
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/299135 | DATA TRANSMISSION METHOD AND MOBILE STORAGE DEVICE USING THE SAME | Jun 8, 2014 | Abandoned |
Array
(
[id] => 11586865
[patent_doc_number] => 09641526
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-05-02
[patent_title] => 'Location based authentication methods and systems'
[patent_app_type] => utility
[patent_app_number] => 14/298218
[patent_app_country] => US
[patent_app_date] => 2014-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6240
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14298218
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/298218 | Location based authentication methods and systems | Jun 5, 2014 | Issued |
Array
(
[id] => 9911946
[patent_doc_number] => 20150067149
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-05
[patent_title] => 'RULE-BASED APPLICATION ACCESS MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 14/296342
[patent_app_country] => US
[patent_app_date] => 2014-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 10910
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14296342
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/296342 | Rule-based application access management | Jun 3, 2014 | Issued |