
Lamont B. Koo
Examiner (ID: 10711, Phone: (571)272-0984 , Office: P/2823 )
| Most Active Art Unit | 2813 |
| Art Unit(s) | 2813, 2823 |
| Total Applications | 615 |
| Issued Applications | 463 |
| Pending Applications | 62 |
| Abandoned Applications | 107 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16669530
[patent_doc_number] => 10938796
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-02
[patent_title] => Access key retrieval service for clients
[patent_app_type] => utility
[patent_app_number] => 16/443745
[patent_app_country] => US
[patent_app_date] => 2019-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 15251
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16443745
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/443745 | Access key retrieval service for clients | Jun 16, 2019 | Issued |
Array
(
[id] => 14902095
[patent_doc_number] => 20190294813
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-26
[patent_title] => HANDLING SENSITIVE DATA IN AN APPLICATION USING EXTERNAL PROCESSING
[patent_app_type] => utility
[patent_app_number] => 16/440569
[patent_app_country] => US
[patent_app_date] => 2019-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8811
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -3
[patent_words_short_claim] => 238
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16440569
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/440569 | Handling sensitive data in an application using external processing | Jun 12, 2019 | Issued |
Array
(
[id] => 14902037
[patent_doc_number] => 20190294784
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-26
[patent_title] => METHOD FOR DETECTING A CYBER ATTACK
[patent_app_type] => utility
[patent_app_number] => 16/440950
[patent_app_country] => US
[patent_app_date] => 2019-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11859
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16440950
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/440950 | Method for detecting a cyber attack | Jun 12, 2019 | Issued |
Array
(
[id] => 17788568
[patent_doc_number] => 11411712
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-09
[patent_title] => Criterion method of GCCS for three-node VCSEL networks with delay coupling
[patent_app_type] => utility
[patent_app_number] => 16/439617
[patent_app_country] => US
[patent_app_date] => 2019-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 9846
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 3849
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16439617
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/439617 | Criterion method of GCCS for three-node VCSEL networks with delay coupling | Jun 11, 2019 | Issued |
Array
(
[id] => 14906577
[patent_doc_number] => 20190297054
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-26
[patent_title] => Single Packet Authorization in a Cloud Computing Environment
[patent_app_type] => utility
[patent_app_number] => 16/435713
[patent_app_country] => US
[patent_app_date] => 2019-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8590
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 18
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16435713
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/435713 | Single packet authorization in a cloud computing environment | Jun 9, 2019 | Issued |
Array
(
[id] => 17049019
[patent_doc_number] => 11102221
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-24
[patent_title] => Intelligent security management
[patent_app_type] => utility
[patent_app_number] => 16/426830
[patent_app_country] => US
[patent_app_date] => 2019-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11064
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16426830
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/426830 | Intelligent security management | May 29, 2019 | Issued |
Array
(
[id] => 17722355
[patent_doc_number] => 20220215077
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-07
[patent_title] => VIDEO COPYRIGHT PROTECTION METHOD
[patent_app_type] => utility
[patent_app_number] => 17/611578
[patent_app_country] => US
[patent_app_date] => 2019-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1416
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17611578
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/611578 | VIDEO COPYRIGHT PROTECTION METHOD | May 21, 2019 | Abandoned |
Array
(
[id] => 14814021
[patent_doc_number] => 20190273620
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-05
[patent_title] => DATA SHARING METHOD AND DATA SHARING SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/416320
[patent_app_country] => US
[patent_app_date] => 2019-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9568
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16416320
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/416320 | DATA SHARING METHOD AND DATA SHARING SYSTEM | May 19, 2019 | Abandoned |
Array
(
[id] => 16454910
[patent_doc_number] => 20200364336
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-19
[patent_title] => METHOD AND SYSTEM FOR IDENTIFICATION OF SECURE BINARY IMAGES
[patent_app_type] => utility
[patent_app_number] => 16/412963
[patent_app_country] => US
[patent_app_date] => 2019-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5158
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 63
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16412963
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/412963 | Method and system for identification of secure binary images | May 14, 2019 | Issued |
Array
(
[id] => 17366746
[patent_doc_number] => 11233784
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-01-25
[patent_title] => Systems and methods for managing access to shared network resources
[patent_app_type] => utility
[patent_app_number] => 16/403979
[patent_app_country] => US
[patent_app_date] => 2019-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6689
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16403979
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/403979 | Systems and methods for managing access to shared network resources | May 5, 2019 | Issued |
Array
(
[id] => 17724810
[patent_doc_number] => 20220217532
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-07
[patent_title] => AUTHENTICATION METHOD AND APPARATUS
[patent_app_type] => utility
[patent_app_number] => 17/609134
[patent_app_country] => US
[patent_app_date] => 2019-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8402
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 54
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17609134
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/609134 | Authentication method and apparatus | May 5, 2019 | Issued |
Array
(
[id] => 17907612
[patent_doc_number] => 11461467
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-04
[patent_title] => Detecting and mitigating malicious software code embedded in image files using machine learning techniques
[patent_app_type] => utility
[patent_app_number] => 16/400299
[patent_app_country] => US
[patent_app_date] => 2019-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4831
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16400299
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/400299 | Detecting and mitigating malicious software code embedded in image files using machine learning techniques | Apr 30, 2019 | Issued |
Array
(
[id] => 15957423
[patent_doc_number] => 10666636
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-26
[patent_title] => Controlling access to electronic services based on a user's sociometric identification document
[patent_app_type] => utility
[patent_app_number] => 16/399276
[patent_app_country] => US
[patent_app_date] => 2019-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11222
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16399276
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/399276 | Controlling access to electronic services based on a user's sociometric identification document | Apr 29, 2019 | Issued |
Array
(
[id] => 15610017
[patent_doc_number] => 10586074
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-10
[patent_title] => Smart de-identification using date jittering
[patent_app_type] => utility
[patent_app_number] => 16/398771
[patent_app_country] => US
[patent_app_date] => 2019-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 7939
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16398771
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/398771 | Smart de-identification using date jittering | Apr 29, 2019 | Issued |
Array
(
[id] => 15735591
[patent_doc_number] => 10616240
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-07
[patent_title] => Protocols for accessing hosts
[patent_app_type] => utility
[patent_app_number] => 16/398234
[patent_app_country] => US
[patent_app_date] => 2019-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 14
[patent_no_of_words] => 14249
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16398234
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/398234 | Protocols for accessing hosts | Apr 28, 2019 | Issued |
Array
(
[id] => 15735543
[patent_doc_number] => 10616216
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-04-07
[patent_title] => Multi-factor authentication systems and methods
[patent_app_type] => utility
[patent_app_number] => 16/384383
[patent_app_country] => US
[patent_app_date] => 2019-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 10
[patent_no_of_words] => 7499
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16384383
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/384383 | Multi-factor authentication systems and methods | Apr 14, 2019 | Issued |
Array
(
[id] => 15080017
[patent_doc_number] => 10469521
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-11-05
[patent_title] => Using information about exportable data in penetration testing
[patent_app_type] => utility
[patent_app_number] => 16/379820
[patent_app_country] => US
[patent_app_date] => 2019-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 17
[patent_no_of_words] => 26768
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 290
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16379820
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/379820 | Using information about exportable data in penetration testing | Apr 9, 2019 | Issued |
Array
(
[id] => 17223748
[patent_doc_number] => 11176249
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-16
[patent_title] => Cached file reputations
[patent_app_type] => utility
[patent_app_number] => 16/368039
[patent_app_country] => US
[patent_app_date] => 2019-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 15733
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16368039
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/368039 | Cached file reputations | Mar 27, 2019 | Issued |
Array
(
[id] => 17802286
[patent_doc_number] => 11416587
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-08-16
[patent_title] => Security deployment and management mechanism for software container
[patent_app_type] => utility
[patent_app_number] => 16/365488
[patent_app_country] => US
[patent_app_date] => 2019-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12784
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16365488
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/365488 | Security deployment and management mechanism for software container | Mar 25, 2019 | Issued |
Array
(
[id] => 18798242
[patent_doc_number] => 11832108
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-11-28
[patent_title] => Lawful interception in mobile connect
[patent_app_type] => utility
[patent_app_number] => 17/442652
[patent_app_country] => US
[patent_app_date] => 2019-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 4599
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17442652
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/442652 | Lawful interception in mobile connect | Mar 24, 2019 | Issued |