
Ko Hung Chan
Examiner (ID: 17019, Phone: (571)272-6816 , Office: P/3631 )
| Most Active Art Unit | 3631 |
| Art Unit(s) | 3637, 3632, 3505, 3631, 2899 |
| Total Applications | 2359 |
| Issued Applications | 1616 |
| Pending Applications | 109 |
| Abandoned Applications | 656 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 5789621
[patent_doc_number] => 20060206935
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-09-14
[patent_title] => 'Apparatus and method for adaptively preventing attacks'
[patent_app_type] => utility
[patent_app_number] => 11/187758
[patent_app_country] => US
[patent_app_date] => 2005-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2516
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0206/20060206935.pdf
[firstpage_image] =>[orig_patent_app_number] => 11187758
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/187758 | Apparatus and method for adaptively preventing attacks | Jul 21, 2005 | Abandoned |
Array
(
[id] => 5243972
[patent_doc_number] => 20070022467
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-01-25
[patent_title] => 'Method and system for limiting access to a shared network device'
[patent_app_type] => utility
[patent_app_number] => 11/187645
[patent_app_country] => US
[patent_app_date] => 2005-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3996
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0022/20070022467.pdf
[firstpage_image] =>[orig_patent_app_number] => 11187645
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/187645 | Method and system for limiting access to a shared network device | Jul 21, 2005 | Abandoned |
Array
(
[id] => 5690087
[patent_doc_number] => 20060288402
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-12-21
[patent_title] => 'Security component for dynamic properties framework'
[patent_app_type] => utility
[patent_app_number] => 11/157487
[patent_app_country] => US
[patent_app_date] => 2005-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2613
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0288/20060288402.pdf
[firstpage_image] =>[orig_patent_app_number] => 11157487
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/157487 | Security component for dynamic properties framework | Jun 19, 2005 | Abandoned |
Array
(
[id] => 5641845
[patent_doc_number] => 20060280300
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-12-14
[patent_title] => 'Cryptographic system'
[patent_app_type] => utility
[patent_app_number] => 11/149129
[patent_app_country] => US
[patent_app_date] => 2005-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3421
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0280/20060280300.pdf
[firstpage_image] =>[orig_patent_app_number] => 11149129
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/149129 | Cryptographic system | Jun 7, 2005 | Abandoned |
Array
(
[id] => 4889432
[patent_doc_number] => 20080263657
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-10-23
[patent_title] => 'Control of Media Components in a Session'
[patent_app_type] => utility
[patent_app_number] => 11/596144
[patent_app_country] => US
[patent_app_date] => 2005-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5056
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0263/20080263657.pdf
[firstpage_image] =>[orig_patent_app_number] => 11596144
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/596144 | Control of Media Components in a Session | May 9, 2005 | Abandoned |
Array
(
[id] => 4788011
[patent_doc_number] => 20080141340
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-06-12
[patent_title] => 'Semiconductor Device Having Power Consumption Analysis Preventing Function'
[patent_app_type] => utility
[patent_app_number] => 11/587134
[patent_app_country] => US
[patent_app_date] => 2005-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4318
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0141/20080141340.pdf
[firstpage_image] =>[orig_patent_app_number] => 11587134
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/587134 | Semiconductor device having power consumption analysis preventing function | May 8, 2005 | Issued |
Array
(
[id] => 4925637
[patent_doc_number] => 20080165000
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-07-10
[patent_title] => 'Suppression of False Alarms in Alarms Arising from Intrusion Detection Probes in a Monitored Information System'
[patent_app_type] => utility
[patent_app_number] => 11/579901
[patent_app_country] => US
[patent_app_date] => 2005-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3993
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0165/20080165000.pdf
[firstpage_image] =>[orig_patent_app_number] => 11579901
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/579901 | Suppression of False Alarms in Alarms Arising from Intrusion Detection Probes in a Monitored Information System | May 8, 2005 | Abandoned |
Array
(
[id] => 5836765
[patent_doc_number] => 20060248597
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-11-02
[patent_title] => 'Ubiquitous personal station with an external case and a control method thereof'
[patent_app_type] => utility
[patent_app_number] => 11/117917
[patent_app_country] => US
[patent_app_date] => 2005-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6881
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0248/20060248597.pdf
[firstpage_image] =>[orig_patent_app_number] => 11117917
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/117917 | Ubiquitous personal station with an external case and a control method thereof | Apr 28, 2005 | Abandoned |
Array
(
[id] => 4646953
[patent_doc_number] => 08024566
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-09-20
[patent_title] => 'Persistent storage implementations for session data within a multi-tiered enterprise network'
[patent_app_type] => utility
[patent_app_number] => 11/118018
[patent_app_country] => US
[patent_app_date] => 2005-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 20
[patent_no_of_words] => 18144
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/024/08024566.pdf
[firstpage_image] =>[orig_patent_app_number] => 11118018
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/118018 | Persistent storage implementations for session data within a multi-tiered enterprise network | Apr 28, 2005 | Issued |
Array
(
[id] => 4841863
[patent_doc_number] => 20080282349
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-11-13
[patent_title] => 'Computer Virus Identifying Information Extraction System, Computer Virus Identifying Information Extraction Method, and Computer Virus Identifying Information Extraction Program'
[patent_app_type] => utility
[patent_app_number] => 11/587558
[patent_app_country] => US
[patent_app_date] => 2005-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6436
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0282/20080282349.pdf
[firstpage_image] =>[orig_patent_app_number] => 11587558
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/587558 | Computer Virus Identifying Information Extraction System, Computer Virus Identifying Information Extraction Method, and Computer Virus Identifying Information Extraction Program | Apr 24, 2005 | Abandoned |
Array
(
[id] => 4731134
[patent_doc_number] => 20080209508
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-08-28
[patent_title] => 'Digital Pen System'
[patent_app_type] => utility
[patent_app_number] => 11/587405
[patent_app_country] => US
[patent_app_date] => 2005-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5634
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 11
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0209/20080209508.pdf
[firstpage_image] =>[orig_patent_app_number] => 11587405
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/587405 | Digital Pen System | Apr 21, 2005 | Abandoned |
Array
(
[id] => 7779945
[patent_doc_number] => 08122261
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-02-21
[patent_title] => 'Data communication apparatus and data communication method'
[patent_app_type] => utility
[patent_app_number] => 11/587091
[patent_app_country] => US
[patent_app_date] => 2005-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6821
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/122/08122261.pdf
[firstpage_image] =>[orig_patent_app_number] => 11587091
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/587091 | Data communication apparatus and data communication method | Apr 20, 2005 | Issued |
Array
(
[id] => 4527682
[patent_doc_number] => 07934088
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-04-26
[patent_title] => 'Method of secure communication between endpoints'
[patent_app_type] => utility
[patent_app_number] => 11/587562
[patent_app_country] => US
[patent_app_date] => 2005-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 9016
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 295
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/934/07934088.pdf
[firstpage_image] =>[orig_patent_app_number] => 11587562
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/587562 | Method of secure communication between endpoints | Mar 30, 2005 | Issued |
Array
(
[id] => 8247132
[patent_doc_number] => 08205075
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-06-19
[patent_title] => 'Authentication device and method'
[patent_app_type] => utility
[patent_app_number] => 11/596022
[patent_app_country] => US
[patent_app_date] => 2005-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 12
[patent_no_of_words] => 10370
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/205/08205075.pdf
[firstpage_image] =>[orig_patent_app_number] => 11596022
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/596022 | Authentication device and method | Mar 22, 2005 | Issued |
Array
(
[id] => 5015379
[patent_doc_number] => 20070258587
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-08
[patent_title] => 'Recording Device, Recording Medium, and Content Protection System'
[patent_app_type] => utility
[patent_app_number] => 11/578571
[patent_app_country] => US
[patent_app_date] => 2005-03-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 32
[patent_figures_cnt] => 32
[patent_no_of_words] => 16464
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0258/20070258587.pdf
[firstpage_image] =>[orig_patent_app_number] => 11578571
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/578571 | Recording device, recording medium, and content protection system | Mar 21, 2005 | Issued |
Array
(
[id] => 4659615
[patent_doc_number] => 20080028477
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-01-31
[patent_title] => 'Chip with Power Supply Device'
[patent_app_type] => utility
[patent_app_number] => 11/579213
[patent_app_country] => US
[patent_app_date] => 2005-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5016
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0028/20080028477.pdf
[firstpage_image] =>[orig_patent_app_number] => 11579213
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/579213 | Chip with Power Supply Device | Feb 1, 2005 | Abandoned |
Array
(
[id] => 5696234
[patent_doc_number] => 20060156381
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-07-13
[patent_title] => 'Approach for deleting electronic documents on network devices using document retention policies'
[patent_app_type] => utility
[patent_app_number] => 11/034483
[patent_app_country] => US
[patent_app_date] => 2005-01-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5235
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0156/20060156381.pdf
[firstpage_image] =>[orig_patent_app_number] => 11034483
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/034483 | Approach for deleting electronic documents on network devices using document retention policies | Jan 11, 2005 | Abandoned |
Array
(
[id] => 5792722
[patent_doc_number] => 20060013403
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-01-19
[patent_title] => 'Factorization-based encryption method'
[patent_app_type] => utility
[patent_app_number] => 10/520251
[patent_app_country] => US
[patent_app_date] => 2003-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2414
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0013/20060013403.pdf
[firstpage_image] =>[orig_patent_app_number] => 10520251
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/520251 | Encryption method based on factorization | Jun 10, 2003 | Issued |