
Lamont B. Koo
Examiner (ID: 10711, Phone: (571)272-0984 , Office: P/2823 )
| Most Active Art Unit | 2813 |
| Art Unit(s) | 2813, 2823 |
| Total Applications | 615 |
| Issued Applications | 463 |
| Pending Applications | 62 |
| Abandoned Applications | 107 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14560511
[patent_doc_number] => 10348733
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-09
[patent_title] => Managing security restrictions on a resource in a defined environment
[patent_app_type] => utility
[patent_app_number] => 15/641420
[patent_app_country] => US
[patent_app_date] => 2017-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5607
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15641420
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/641420 | Managing security restrictions on a resource in a defined environment | Jul 4, 2017 | Issued |
Array
(
[id] => 14560573
[patent_doc_number] => 10348764
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-09
[patent_title] => System and method for intercepting encrypted traffic and indicating network status
[patent_app_type] => utility
[patent_app_number] => 15/636279
[patent_app_country] => US
[patent_app_date] => 2017-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4318
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15636279
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/636279 | System and method for intercepting encrypted traffic and indicating network status | Jun 27, 2017 | Issued |
Array
(
[id] => 13783441
[patent_doc_number] => 20190005259
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-03
[patent_title] => Catheter Authorization System And Method
[patent_app_type] => utility
[patent_app_number] => 15/635605
[patent_app_country] => US
[patent_app_date] => 2017-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4317
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15635605
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/635605 | Catheter authorization system and method | Jun 27, 2017 | Issued |
Array
(
[id] => 18106860
[patent_doc_number] => 11546770
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-03
[patent_title] => Systems and methods for delivering radio applications to reconfigurable radio equipment
[patent_app_type] => utility
[patent_app_number] => 16/481289
[patent_app_country] => US
[patent_app_date] => 2017-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 23694
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16481289
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/481289 | Systems and methods for delivering radio applications to reconfigurable radio equipment | Jun 22, 2017 | Issued |
Array
(
[id] => 12121356
[patent_doc_number] => 20180004942
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-04
[patent_title] => 'METHOD FOR DETECTING A CYBER ATTACK'
[patent_app_type] => utility
[patent_app_number] => 15/628196
[patent_app_country] => US
[patent_app_date] => 2017-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 12341
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15628196
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/628196 | Method for detecting a cyber attack | Jun 19, 2017 | Issued |
Array
(
[id] => 12532767
[patent_doc_number] => 10007777
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-06-26
[patent_title] => Single input unlock for computing devices
[patent_app_type] => utility
[patent_app_number] => 15/627036
[patent_app_country] => US
[patent_app_date] => 2017-06-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11223
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15627036
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/627036 | Single input unlock for computing devices | Jun 18, 2017 | Issued |
Array
(
[id] => 14873217
[patent_doc_number] => 20190286850
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-19
[patent_title] => METHOD OF PROTECTING DATA EXCHANGED BETWEEN A SERVICE USER AND A SERVICE PROVIDER
[patent_app_type] => utility
[patent_app_number] => 16/318747
[patent_app_country] => US
[patent_app_date] => 2017-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5262
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16318747
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/318747 | Method of protecting data exchanged between a service user and a service provider | Jun 15, 2017 | Issued |
Array
(
[id] => 14772763
[patent_doc_number] => 10397800
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-27
[patent_title] => System and method for network access point installation and access control
[patent_app_type] => utility
[patent_app_number] => 15/624678
[patent_app_country] => US
[patent_app_date] => 2017-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 21
[patent_no_of_words] => 10164
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15624678
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/624678 | System and method for network access point installation and access control | Jun 14, 2017 | Issued |
Array
(
[id] => 15141701
[patent_doc_number] => 10484352
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-19
[patent_title] => Data operations using a proxy encryption key
[patent_app_type] => utility
[patent_app_number] => 15/616392
[patent_app_country] => US
[patent_app_date] => 2017-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 8
[patent_no_of_words] => 7104
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15616392
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/616392 | Data operations using a proxy encryption key | Jun 6, 2017 | Issued |
Array
(
[id] => 14890769
[patent_doc_number] => 10425444
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-24
[patent_title] => Social engineering attack prevention
[patent_app_type] => utility
[patent_app_number] => 15/616448
[patent_app_country] => US
[patent_app_date] => 2017-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 8055
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15616448
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/616448 | Social engineering attack prevention | Jun 6, 2017 | Issued |
Array
(
[id] => 16945150
[patent_doc_number] => 11057411
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-06
[patent_title] => Log analysis device, log analysis method, and log analysis program
[patent_app_type] => utility
[patent_app_number] => 16/311040
[patent_app_country] => US
[patent_app_date] => 2017-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 7136
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16311040
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/311040 | Log analysis device, log analysis method, and log analysis program | Jun 6, 2017 | Issued |
Array
(
[id] => 15111247
[patent_doc_number] => 10476965
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-11-12
[patent_title] => Apparatus, system and method for sharing tangible objects
[patent_app_type] => utility
[patent_app_number] => 15/614737
[patent_app_country] => US
[patent_app_date] => 2017-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 10359
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 310
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15614737
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/614737 | Apparatus, system and method for sharing tangible objects | Jun 5, 2017 | Issued |
Array
(
[id] => 13596101
[patent_doc_number] => 20180349599
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-06
[patent_title] => ENRICHING NETFLOW DATA WITH PASSIVE DNS DATA FOR BOTNET DETECTION
[patent_app_type] => utility
[patent_app_number] => 15/615002
[patent_app_country] => US
[patent_app_date] => 2017-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6225
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15615002
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/615002 | Enriching netflow data with passive DNS data for botnet detection | Jun 5, 2017 | Issued |
Array
(
[id] => 14432197
[patent_doc_number] => 10320920
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-11
[patent_title] => Automatic migration of communication sessions using a private cloud-cloud technology
[patent_app_type] => utility
[patent_app_number] => 15/602236
[patent_app_country] => US
[patent_app_date] => 2017-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 9072
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15602236
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/602236 | Automatic migration of communication sessions using a private cloud-cloud technology | May 22, 2017 | Issued |
Array
(
[id] => 15141723
[patent_doc_number] => 10484363
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-19
[patent_title] => Method and apparatus for authenticating a device using Bluetooth technology
[patent_app_type] => utility
[patent_app_number] => 15/602830
[patent_app_country] => US
[patent_app_date] => 2017-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 11781
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15602830
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/602830 | Method and apparatus for authenticating a device using Bluetooth technology | May 22, 2017 | Issued |
Array
(
[id] => 12096225
[patent_doc_number] => 20170353318
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-07
[patent_title] => 'PROVIDING ACCESS TO A HARDWARE RESOURCE BASED ON A CANARY VALUE'
[patent_app_type] => utility
[patent_app_number] => 15/603335
[patent_app_country] => US
[patent_app_date] => 2017-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5739
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15603335
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/603335 | Providing access to a hardware resource based on a canary value | May 22, 2017 | Issued |
Array
(
[id] => 15317837
[patent_doc_number] => 10523643
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-12-31
[patent_title] => Systems and methods for enhanced security based on user vulnerability
[patent_app_type] => utility
[patent_app_number] => 15/602891
[patent_app_country] => US
[patent_app_date] => 2017-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 14028
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15602891
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/602891 | Systems and methods for enhanced security based on user vulnerability | May 22, 2017 | Issued |
Array
(
[id] => 13696427
[patent_doc_number] => 20170359168
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => MEMORY OPTIMIZATION FOR NESTED HASH OPERATIONS
[patent_app_type] => utility
[patent_app_number] => 15/603342
[patent_app_country] => US
[patent_app_date] => 2017-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5335
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15603342
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/603342 | Memory optimization for nested hash operations | May 22, 2017 | Issued |
Array
(
[id] => 12082148
[patent_doc_number] => 20170344735
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-30
[patent_title] => 'ELECTRONIC DEVICE AND UNLOCKING METHOD THEREFOR'
[patent_app_type] => utility
[patent_app_number] => 15/603431
[patent_app_country] => US
[patent_app_date] => 2017-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2200
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15603431
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/603431 | Electronic device and unlocking method therefor | May 22, 2017 | Issued |
Array
(
[id] => 12062610
[patent_doc_number] => 20170338954
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-23
[patent_title] => 'ELECTRONIC SUBSCRIBER IDENTITY MODULE (eSIM) PROVISIONING ERROR RECOVERY'
[patent_app_type] => utility
[patent_app_number] => 15/602027
[patent_app_country] => US
[patent_app_date] => 2017-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11384
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15602027
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/602027 | Electronic subscriber identity module (eSIM) provisioning error recovery | May 21, 2017 | Issued |