
Kee M. Tung
Supervisory Patent Examiner (ID: 576, Phone: (571)272-7794 , Office: P/2611 )
| Most Active Art Unit | 2676 |
| Art Unit(s) | 2611, 2677, 2311, 2415, 2676, 2671, 2776, 2317, 2745, 2303, 2773, 2628 |
| Total Applications | 1406 |
| Issued Applications | 1046 |
| Pending Applications | 77 |
| Abandoned Applications | 286 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11695468
[patent_doc_number] => 20170171184
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-15
[patent_title] => 'Authentication And Secure Channel Setup For Communication Handoff Scenario'
[patent_app_type] => utility
[patent_app_number] => 15/445129
[patent_app_country] => US
[patent_app_date] => 2017-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 25530
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15445129
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/445129 | Authentication And Secure Channel Setup For Communication Handoff Scenario | Feb 27, 2017 | Abandoned |
Array
(
[id] => 13376741
[patent_doc_number] => 20180239912
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-23
[patent_title] => DATA SECURITY METHOD AND LOCAL DEVICE WITH SWITCH(ES)
[patent_app_type] => utility
[patent_app_number] => 15/439929
[patent_app_country] => US
[patent_app_date] => 2017-02-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6505
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -2
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15439929
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/439929 | DATA SECURITY METHOD AND LOCAL DEVICE WITH SWITCH(ES) | Feb 21, 2017 | Abandoned |
Array
(
[id] => 14902125
[patent_doc_number] => 20190294828
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-26
[patent_title] => MOBILE INFORMATION TERMINAL AND METHOD FOR CONTROLLING SAME
[patent_app_type] => utility
[patent_app_number] => 16/340440
[patent_app_country] => US
[patent_app_date] => 2017-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14556
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 58
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16340440
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/340440 | MOBILE INFORMATION TERMINAL AND METHOD FOR CONTROLLING SAME | Feb 8, 2017 | Abandoned |
Array
(
[id] => 11622241
[patent_doc_number] => 20170132428
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-11
[patent_title] => 'REQUESTING MODIFICATION RIGHTS TO A LINKED FILE SET'
[patent_app_type] => utility
[patent_app_number] => 15/410150
[patent_app_country] => US
[patent_app_date] => 2017-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8665
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15410150
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/410150 | Requesting modification rights to a linked file set | Jan 18, 2017 | Issued |
Array
(
[id] => 11572756
[patent_doc_number] => 20170111400
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-20
[patent_title] => 'METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 15/395839
[patent_app_country] => US
[patent_app_date] => 2016-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3168
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15395839
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/395839 | Method for providing wireless application privilege management | Dec 29, 2016 | Issued |
Array
(
[id] => 11572756
[patent_doc_number] => 20170111400
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-20
[patent_title] => 'METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 15/395839
[patent_app_country] => US
[patent_app_date] => 2016-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3168
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15395839
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/395839 | Method for providing wireless application privilege management | Dec 29, 2016 | Issued |
Array
(
[id] => 11572756
[patent_doc_number] => 20170111400
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-20
[patent_title] => 'METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 15/395839
[patent_app_country] => US
[patent_app_date] => 2016-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3168
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15395839
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/395839 | Method for providing wireless application privilege management | Dec 29, 2016 | Issued |
Array
(
[id] => 11572756
[patent_doc_number] => 20170111400
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-20
[patent_title] => 'METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 15/395839
[patent_app_country] => US
[patent_app_date] => 2016-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3168
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15395839
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/395839 | Method for providing wireless application privilege management | Dec 29, 2016 | Issued |
Array
(
[id] => 12018954
[patent_doc_number] => 09811661
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-11-07
[patent_title] => 'System and method for protecting computers from unauthorized remote administration'
[patent_app_type] => utility
[patent_app_number] => 15/386423
[patent_app_country] => US
[patent_app_date] => 2016-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 10416
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15386423
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/386423 | System and method for protecting computers from unauthorized remote administration | Dec 20, 2016 | Issued |
Array
(
[id] => 11556984
[patent_doc_number] => 20170103231
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-13
[patent_title] => 'SYSTEM AND METHOD FOR DISTRIBUTED, POLICY-BASED CONFIDENTIALITY MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 15/385292
[patent_app_country] => US
[patent_app_date] => 2016-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 6865
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15385292
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/385292 | SYSTEM AND METHOD FOR DISTRIBUTED, POLICY-BASED CONFIDENTIALITY MANAGEMENT | Dec 19, 2016 | Abandoned |
Array
(
[id] => 13100883
[patent_doc_number] => 10069794
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-04
[patent_title] => Systems and methods for passing network traffic content
[patent_app_type] => utility
[patent_app_number] => 15/383624
[patent_app_country] => US
[patent_app_date] => 2016-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5725
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15383624
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/383624 | Systems and methods for passing network traffic content | Dec 18, 2016 | Issued |
Array
(
[id] => 12782122
[patent_doc_number] => 20180152543
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-31
[patent_title] => EMERGENCY DATA CUTOFF FOR STORAGE SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 15/362844
[patent_app_country] => US
[patent_app_date] => 2016-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4868
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15362844
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/362844 | EMERGENCY DATA CUTOFF FOR STORAGE SYSTEMS | Nov 28, 2016 | Abandoned |
Array
(
[id] => 11899241
[patent_doc_number] => 09769190
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-19
[patent_title] => 'Methods and apparatus to identify malicious activity in a network'
[patent_app_type] => utility
[patent_app_number] => 15/354214
[patent_app_country] => US
[patent_app_date] => 2016-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12304
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15354214
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/354214 | Methods and apparatus to identify malicious activity in a network | Nov 16, 2016 | Issued |
Array
(
[id] => 14335049
[patent_doc_number] => 10298558
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-21
[patent_title] => User authentication relying on recurring public events for shared secrets
[patent_app_type] => utility
[patent_app_number] => 15/343294
[patent_app_country] => US
[patent_app_date] => 2016-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7476
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15343294
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/343294 | User authentication relying on recurring public events for shared secrets | Nov 3, 2016 | Issued |
Array
(
[id] => 16150557
[patent_doc_number] => 10708369
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-07
[patent_title] => Control of internet browsing in a secure environment
[patent_app_type] => utility
[patent_app_number] => 15/341572
[patent_app_country] => US
[patent_app_date] => 2016-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7750
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 277
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15341572
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/341572 | Control of internet browsing in a secure environment | Nov 1, 2016 | Issued |
Array
(
[id] => 12296703
[patent_doc_number] => 09935926
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-03
[patent_title] => Methods and apparatus to identify media distributed via a network
[patent_app_type] => utility
[patent_app_number] => 15/331454
[patent_app_country] => US
[patent_app_date] => 2016-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8817
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15331454
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/331454 | Methods and apparatus to identify media distributed via a network | Oct 20, 2016 | Issued |
Array
(
[id] => 12148653
[patent_doc_number] => 09882926
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-30
[patent_title] => 'Detecting stored cross-site scripting vulnerabilities in web applications'
[patent_app_type] => utility
[patent_app_number] => 15/283701
[patent_app_country] => US
[patent_app_date] => 2016-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 3359
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15283701
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/283701 | Detecting stored cross-site scripting vulnerabilities in web applications | Oct 2, 2016 | Issued |
Array
(
[id] => 12971674
[patent_doc_number] => 09876816
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-23
[patent_title] => Detecting stored cross-site scripting vulnerabilities in web applications
[patent_app_type] => utility
[patent_app_number] => 15/283664
[patent_app_country] => US
[patent_app_date] => 2016-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 3260
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15283664
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/283664 | Detecting stored cross-site scripting vulnerabilities in web applications | Oct 2, 2016 | Issued |
Array
(
[id] => 11960482
[patent_doc_number] => 20170264634
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-14
[patent_title] => 'SYSTEMS AND METHODS FOR SUPPORTING INFORMATION SECURITY AND SUB-SYSTEM OPERATIONAL PROTOCOL CONFORMANCE'
[patent_app_type] => utility
[patent_app_number] => 15/275931
[patent_app_country] => US
[patent_app_date] => 2016-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 16024
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15275931
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/275931 | Systems and methods for supporting information security and sub-system operational protocol conformance | Sep 25, 2016 | Issued |
Array
(
[id] => 11354506
[patent_doc_number] => 20160373247
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'MMT TRANSMISSION SYSTEM, ENCRYPTION PROCESSING DEVICE, AND RECEIVER'
[patent_app_type] => utility
[patent_app_number] => 15/256424
[patent_app_country] => US
[patent_app_date] => 2016-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7721
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15256424
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/256424 | MMT transmission system, encryption processing device, and receiver | Sep 1, 2016 | Issued |