
Kee M. Tung
Supervisory Patent Examiner (ID: 576, Phone: (571)272-7794 , Office: P/2611 )
| Most Active Art Unit | 2676 |
| Art Unit(s) | 2611, 2677, 2311, 2415, 2676, 2671, 2776, 2317, 2745, 2303, 2773, 2628 |
| Total Applications | 1406 |
| Issued Applications | 1046 |
| Pending Applications | 77 |
| Abandoned Applications | 286 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16701032
[patent_doc_number] => 10951657
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-16
[patent_title] => Systems and methods for authenticating platform trust in a network function virtualization environment
[patent_app_type] => utility
[patent_app_number] => 15/880068
[patent_app_country] => US
[patent_app_date] => 2018-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3668
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15880068
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/880068 | Systems and methods for authenticating platform trust in a network function virtualization environment | Jan 24, 2018 | Issued |
Array
(
[id] => 16134151
[patent_doc_number] => 10700855
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-30
[patent_title] => Reinforcement learning-based encryption and decryption method and client and server system performing the same
[patent_app_type] => utility
[patent_app_number] => 15/880074
[patent_app_country] => US
[patent_app_date] => 2018-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 5946
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15880074
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/880074 | Reinforcement learning-based encryption and decryption method and client and server system performing the same | Jan 24, 2018 | Issued |
Array
(
[id] => 15735057
[patent_doc_number] => 10615972
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-07
[patent_title] => System and methods of managing shared keys in a computer cluster with high availability
[patent_app_type] => utility
[patent_app_number] => 15/876052
[patent_app_country] => US
[patent_app_date] => 2018-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 6379
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15876052
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/876052 | System and methods of managing shared keys in a computer cluster with high availability | Jan 18, 2018 | Issued |
Array
(
[id] => 13213291
[patent_doc_number] => 10121020
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-11-06
[patent_title] => Systems and methods of providing access to secure data
[patent_app_type] => utility
[patent_app_number] => 15/875534
[patent_app_country] => US
[patent_app_date] => 2018-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9790
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 295
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15875534
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/875534 | Systems and methods of providing access to secure data | Jan 18, 2018 | Issued |
Array
(
[id] => 14092625
[patent_doc_number] => 10242220
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-26
[patent_title] => Requesting modification rights to a linked file set
[patent_app_type] => utility
[patent_app_number] => 15/848479
[patent_app_country] => US
[patent_app_date] => 2017-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 14
[patent_no_of_words] => 8449
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15848479
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/848479 | Requesting modification rights to a linked file set | Dec 19, 2017 | Issued |
Array
(
[id] => 13821189
[patent_doc_number] => 10187383
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-22
[patent_title] => Method of pushing passwords, and pushing system
[patent_app_type] => utility
[patent_app_number] => 15/844647
[patent_app_country] => US
[patent_app_date] => 2017-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4981
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 219
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15844647
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/844647 | Method of pushing passwords, and pushing system | Dec 17, 2017 | Issued |
Array
(
[id] => 14092867
[patent_doc_number] => 10242342
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-03-26
[patent_title] => Vehicle interface
[patent_app_type] => utility
[patent_app_number] => 15/839214
[patent_app_country] => US
[patent_app_date] => 2017-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 24885
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15839214
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/839214 | Vehicle interface | Dec 11, 2017 | Issued |
Array
(
[id] => 18671064
[patent_doc_number] => 11777986
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-10-03
[patent_title] => Systems and methods for AIDA based exploit selection
[patent_app_type] => utility
[patent_app_number] => 15/829732
[patent_app_country] => US
[patent_app_date] => 2017-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 32313
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 263
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15829732
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/829732 | Systems and methods for AIDA based exploit selection | Nov 30, 2017 | Issued |
Array
(
[id] => 16821030
[patent_doc_number] => 11005883
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-11
[patent_title] => Application graph builder
[patent_app_type] => utility
[patent_app_number] => 15/788570
[patent_app_country] => US
[patent_app_date] => 2017-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6699
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 321
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15788570
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/788570 | Application graph builder | Oct 18, 2017 | Issued |
Array
(
[id] => 13158277
[patent_doc_number] => 10095865
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-09
[patent_title] => Detecting unauthorized remote administration using dependency rules
[patent_app_type] => utility
[patent_app_number] => 15/784710
[patent_app_country] => US
[patent_app_date] => 2017-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 9565
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15784710
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/784710 | Detecting unauthorized remote administration using dependency rules | Oct 15, 2017 | Issued |
| 15/783926 | System and Method for Location-Based Access Control | Oct 12, 2017 | Abandoned |
Array
(
[id] => 12188371
[patent_doc_number] => 20180047307
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-15
[patent_title] => 'TECHNIQUES FOR ENFORCING A DEPTH ORDER POLICY FOR GRAPHICS IN A DISPLAY SCENE'
[patent_app_type] => utility
[patent_app_number] => 15/728113
[patent_app_country] => US
[patent_app_date] => 2017-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12986
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15728113
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/728113 | TECHNIQUES FOR ENFORCING A DEPTH ORDER POLICY FOR GRAPHICS IN A DISPLAY SCENE | Oct 8, 2017 | Abandoned |
Array
(
[id] => 15506751
[patent_doc_number] => 20200053564
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-13
[patent_title] => METHOD FOR ESTABLISHING A CONNECTION OF A MOBILE TERMINAL TO A MOBILE RADIO COMMUNICATION NETWORK AND COMMUNICATION NETWORK DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/340603
[patent_app_country] => US
[patent_app_date] => 2017-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6049
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16340603
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/340603 | Method for establishing a connection of a mobile terminal to a mobile radio communication network and communication network device | Sep 26, 2017 | Issued |
Array
(
[id] => 14051749
[patent_doc_number] => 20190081982
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-14
[patent_title] => ENDPOINT AGENT FOR ENTERPRISE SECURITY SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/703970
[patent_app_country] => US
[patent_app_date] => 2017-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7981
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15703970
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/703970 | Endpoint agent for enterprise security system | Sep 12, 2017 | Issued |
Array
(
[id] => 17248035
[patent_doc_number] => 20210367780
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-25
[patent_title] => ADAPTER APPARATUS AND PROCESSING METHOD
[patent_app_type] => utility
[patent_app_number] => 16/325720
[patent_app_country] => US
[patent_app_date] => 2017-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6405
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -11
[patent_words_short_claim] => 60
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16325720
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/325720 | ADAPTER APPARATUS AND PROCESSING METHOD | Aug 31, 2017 | Abandoned |
Array
(
[id] => 13087011
[patent_doc_number] => 10063583
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-28
[patent_title] => System and method of mitigating cyber attack risks
[patent_app_type] => utility
[patent_app_number] => 15/688453
[patent_app_country] => US
[patent_app_date] => 2017-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11470
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15688453
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/688453 | System and method of mitigating cyber attack risks | Aug 27, 2017 | Issued |
Array
(
[id] => 15429343
[patent_doc_number] => 10547616
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-28
[patent_title] => Systems and methods for supporting information security and sub-system operational protocol conformance
[patent_app_type] => utility
[patent_app_number] => 15/682120
[patent_app_country] => US
[patent_app_date] => 2017-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 15574
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15682120
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/682120 | Systems and methods for supporting information security and sub-system operational protocol conformance | Aug 20, 2017 | Issued |
Array
(
[id] => 16134551
[patent_doc_number] => 10701058
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-06-30
[patent_title] => System and method for user identification and authentication
[patent_app_type] => utility
[patent_app_number] => 15/672555
[patent_app_country] => US
[patent_app_date] => 2017-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10238
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15672555
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/672555 | System and method for user identification and authentication | Aug 8, 2017 | Issued |
Array
(
[id] => 12062621
[patent_doc_number] => 20170338965
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-23
[patent_title] => 'SYSTEMS AND METHODS FOR SECURE DETOKENIZATION'
[patent_app_type] => utility
[patent_app_number] => 15/673408
[patent_app_country] => US
[patent_app_date] => 2017-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 16412
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15673408
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/673408 | Systems and methods for secure detokenization | Aug 8, 2017 | Issued |
Array
(
[id] => 13696437
[patent_doc_number] => 20170359173
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => AUTONOMOUS PRIVATE KEY RECOVERY
[patent_app_type] => utility
[patent_app_number] => 15/667456
[patent_app_country] => US
[patent_app_date] => 2017-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7545
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15667456
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/667456 | Autonomous private key recovery | Aug 1, 2017 | Issued |