Search

Kee M. Tung

Supervisory Patent Examiner (ID: 576, Phone: (571)272-7794 , Office: P/2611 )

Most Active Art Unit
2676
Art Unit(s)
2611, 2677, 2311, 2415, 2676, 2671, 2776, 2317, 2745, 2303, 2773, 2628
Total Applications
1406
Issued Applications
1046
Pending Applications
77
Abandoned Applications
286

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11695468 [patent_doc_number] => 20170171184 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-06-15 [patent_title] => 'Authentication And Secure Channel Setup For Communication Handoff Scenario' [patent_app_type] => utility [patent_app_number] => 15/445129 [patent_app_country] => US [patent_app_date] => 2017-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 25530 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15445129 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/445129
Authentication And Secure Channel Setup For Communication Handoff Scenario Feb 27, 2017 Abandoned
Array ( [id] => 13376741 [patent_doc_number] => 20180239912 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-08-23 [patent_title] => DATA SECURITY METHOD AND LOCAL DEVICE WITH SWITCH(ES) [patent_app_type] => utility [patent_app_number] => 15/439929 [patent_app_country] => US [patent_app_date] => 2017-02-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6505 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -2 [patent_words_short_claim] => 117 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15439929 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/439929
DATA SECURITY METHOD AND LOCAL DEVICE WITH SWITCH(ES) Feb 21, 2017 Abandoned
Array ( [id] => 14902125 [patent_doc_number] => 20190294828 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-09-26 [patent_title] => MOBILE INFORMATION TERMINAL AND METHOD FOR CONTROLLING SAME [patent_app_type] => utility [patent_app_number] => 16/340440 [patent_app_country] => US [patent_app_date] => 2017-02-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14556 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -8 [patent_words_short_claim] => 58 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16340440 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/340440
MOBILE INFORMATION TERMINAL AND METHOD FOR CONTROLLING SAME Feb 8, 2017 Abandoned
Array ( [id] => 11622241 [patent_doc_number] => 20170132428 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-05-11 [patent_title] => 'REQUESTING MODIFICATION RIGHTS TO A LINKED FILE SET' [patent_app_type] => utility [patent_app_number] => 15/410150 [patent_app_country] => US [patent_app_date] => 2017-01-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 8665 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15410150 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/410150
Requesting modification rights to a linked file set Jan 18, 2017 Issued
Array ( [id] => 11572756 [patent_doc_number] => 20170111400 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-04-20 [patent_title] => 'METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 15/395839 [patent_app_country] => US [patent_app_date] => 2016-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 3168 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15395839 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/395839
Method for providing wireless application privilege management Dec 29, 2016 Issued
Array ( [id] => 11572756 [patent_doc_number] => 20170111400 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-04-20 [patent_title] => 'METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 15/395839 [patent_app_country] => US [patent_app_date] => 2016-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 3168 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15395839 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/395839
Method for providing wireless application privilege management Dec 29, 2016 Issued
Array ( [id] => 11572756 [patent_doc_number] => 20170111400 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-04-20 [patent_title] => 'METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 15/395839 [patent_app_country] => US [patent_app_date] => 2016-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 3168 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15395839 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/395839
Method for providing wireless application privilege management Dec 29, 2016 Issued
Array ( [id] => 11572756 [patent_doc_number] => 20170111400 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-04-20 [patent_title] => 'METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 15/395839 [patent_app_country] => US [patent_app_date] => 2016-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 3168 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15395839 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/395839
Method for providing wireless application privilege management Dec 29, 2016 Issued
Array ( [id] => 12018954 [patent_doc_number] => 09811661 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-11-07 [patent_title] => 'System and method for protecting computers from unauthorized remote administration' [patent_app_type] => utility [patent_app_number] => 15/386423 [patent_app_country] => US [patent_app_date] => 2016-12-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 10416 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 237 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15386423 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/386423
System and method for protecting computers from unauthorized remote administration Dec 20, 2016 Issued
Array ( [id] => 11556984 [patent_doc_number] => 20170103231 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-04-13 [patent_title] => 'SYSTEM AND METHOD FOR DISTRIBUTED, POLICY-BASED CONFIDENTIALITY MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 15/385292 [patent_app_country] => US [patent_app_date] => 2016-12-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 6865 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15385292 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/385292
SYSTEM AND METHOD FOR DISTRIBUTED, POLICY-BASED CONFIDENTIALITY MANAGEMENT Dec 19, 2016 Abandoned
Array ( [id] => 13100883 [patent_doc_number] => 10069794 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-09-04 [patent_title] => Systems and methods for passing network traffic content [patent_app_type] => utility [patent_app_number] => 15/383624 [patent_app_country] => US [patent_app_date] => 2016-12-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5725 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 259 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15383624 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/383624
Systems and methods for passing network traffic content Dec 18, 2016 Issued
Array ( [id] => 12782122 [patent_doc_number] => 20180152543 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-05-31 [patent_title] => EMERGENCY DATA CUTOFF FOR STORAGE SYSTEMS [patent_app_type] => utility [patent_app_number] => 15/362844 [patent_app_country] => US [patent_app_date] => 2016-11-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4868 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -15 [patent_words_short_claim] => 100 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15362844 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/362844
EMERGENCY DATA CUTOFF FOR STORAGE SYSTEMS Nov 28, 2016 Abandoned
Array ( [id] => 11899241 [patent_doc_number] => 09769190 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-09-19 [patent_title] => 'Methods and apparatus to identify malicious activity in a network' [patent_app_type] => utility [patent_app_number] => 15/354214 [patent_app_country] => US [patent_app_date] => 2016-11-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 12304 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 158 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15354214 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/354214
Methods and apparatus to identify malicious activity in a network Nov 16, 2016 Issued
Array ( [id] => 14335049 [patent_doc_number] => 10298558 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-05-21 [patent_title] => User authentication relying on recurring public events for shared secrets [patent_app_type] => utility [patent_app_number] => 15/343294 [patent_app_country] => US [patent_app_date] => 2016-11-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7476 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15343294 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/343294
User authentication relying on recurring public events for shared secrets Nov 3, 2016 Issued
Array ( [id] => 16150557 [patent_doc_number] => 10708369 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-07-07 [patent_title] => Control of internet browsing in a secure environment [patent_app_type] => utility [patent_app_number] => 15/341572 [patent_app_country] => US [patent_app_date] => 2016-11-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7750 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 277 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15341572 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/341572
Control of internet browsing in a secure environment Nov 1, 2016 Issued
Array ( [id] => 12296703 [patent_doc_number] => 09935926 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-04-03 [patent_title] => Methods and apparatus to identify media distributed via a network [patent_app_type] => utility [patent_app_number] => 15/331454 [patent_app_country] => US [patent_app_date] => 2016-10-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8817 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 152 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15331454 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/331454
Methods and apparatus to identify media distributed via a network Oct 20, 2016 Issued
Array ( [id] => 12148653 [patent_doc_number] => 09882926 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-01-30 [patent_title] => 'Detecting stored cross-site scripting vulnerabilities in web applications' [patent_app_type] => utility [patent_app_number] => 15/283701 [patent_app_country] => US [patent_app_date] => 2016-10-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 3359 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 99 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15283701 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/283701
Detecting stored cross-site scripting vulnerabilities in web applications Oct 2, 2016 Issued
Array ( [id] => 12971674 [patent_doc_number] => 09876816 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-01-23 [patent_title] => Detecting stored cross-site scripting vulnerabilities in web applications [patent_app_type] => utility [patent_app_number] => 15/283664 [patent_app_country] => US [patent_app_date] => 2016-10-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 3260 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 87 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15283664 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/283664
Detecting stored cross-site scripting vulnerabilities in web applications Oct 2, 2016 Issued
Array ( [id] => 11960482 [patent_doc_number] => 20170264634 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-09-14 [patent_title] => 'SYSTEMS AND METHODS FOR SUPPORTING INFORMATION SECURITY AND SUB-SYSTEM OPERATIONAL PROTOCOL CONFORMANCE' [patent_app_type] => utility [patent_app_number] => 15/275931 [patent_app_country] => US [patent_app_date] => 2016-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 16024 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15275931 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/275931
Systems and methods for supporting information security and sub-system operational protocol conformance Sep 25, 2016 Issued
Array ( [id] => 11354506 [patent_doc_number] => 20160373247 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-22 [patent_title] => 'MMT TRANSMISSION SYSTEM, ENCRYPTION PROCESSING DEVICE, AND RECEIVER' [patent_app_type] => utility [patent_app_number] => 15/256424 [patent_app_country] => US [patent_app_date] => 2016-09-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 7721 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15256424 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/256424
MMT transmission system, encryption processing device, and receiver Sep 1, 2016 Issued
Menu