
Lamont B. Koo
Examiner (ID: 10711, Phone: (571)272-0984 , Office: P/2823 )
| Most Active Art Unit | 2813 |
| Art Unit(s) | 2813, 2823 |
| Total Applications | 615 |
| Issued Applications | 463 |
| Pending Applications | 62 |
| Abandoned Applications | 107 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11953271
[patent_doc_number] => 20170257422
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-07
[patent_title] => 'MANAGING TRANSMISSION AND STORAGE OF SENSITIVE DATA'
[patent_app_type] => utility
[patent_app_number] => 15/600713
[patent_app_country] => US
[patent_app_date] => 2017-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8879
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15600713
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/600713 | Managing transmission and storage of sensitive data | May 19, 2017 | Issued |
Array
(
[id] => 11938857
[patent_doc_number] => 20170243007
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-24
[patent_title] => 'MULTIPLE SYSTEM IMAGES FOR OVER-THE-AIR UPDATES'
[patent_app_type] => utility
[patent_app_number] => 15/589595
[patent_app_country] => US
[patent_app_date] => 2017-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12225
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15589595
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/589595 | Multiple system images for over-the-air updates | May 7, 2017 | Issued |
Array
(
[id] => 13230861
[patent_doc_number] => 10129222
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-13
[patent_title] => Trusted storage systems and methods
[patent_app_type] => utility
[patent_app_number] => 15/495320
[patent_app_country] => US
[patent_app_date] => 2017-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 11804
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15495320
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/495320 | Trusted storage systems and methods | Apr 23, 2017 | Issued |
Array
(
[id] => 14736551
[patent_doc_number] => 10387677
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-20
[patent_title] => Deniable obfuscation of user locations
[patent_app_type] => utility
[patent_app_number] => 15/489887
[patent_app_country] => US
[patent_app_date] => 2017-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4942
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15489887
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/489887 | Deniable obfuscation of user locations | Apr 17, 2017 | Issued |
Array
(
[id] => 14235903
[patent_doc_number] => 20190130124
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-02
[patent_title] => MULTI-USER PERMISSION STRATEGY TO ACCESS SENSITIVE INFORMATION
[patent_app_type] => utility
[patent_app_number] => 15/932439
[patent_app_country] => US
[patent_app_date] => 2017-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2293
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -2
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15932439
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/932439 | Multi-user permission strategy to access sensitive information | Apr 9, 2017 | Issued |
Array
(
[id] => 12875743
[patent_doc_number] => 20180183756
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-28
[patent_title] => DEEP PACKET INSPECTION WITH ENHANCED DATA PACKET ANALYZERS
[patent_app_type] => utility
[patent_app_number] => 15/479306
[patent_app_country] => US
[patent_app_date] => 2017-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7553
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15479306
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/479306 | Deep packet inspection with enhanced data packet analyzers | Apr 4, 2017 | Issued |
Array
(
[id] => 13008031
[patent_doc_number] => 10027696
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-07-17
[patent_title] => System and method for determining a threat based on correlation of indicators of compromise from other sources
[patent_app_type] => utility
[patent_app_number] => 15/470816
[patent_app_country] => US
[patent_app_date] => 2017-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7107
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15470816
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/470816 | System and method for determining a threat based on correlation of indicators of compromise from other sources | Mar 26, 2017 | Issued |
Array
(
[id] => 14826007
[patent_doc_number] => 10410014
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-10
[patent_title] => Configurable annotations for privacy-sensitive user content
[patent_app_type] => utility
[patent_app_number] => 15/466988
[patent_app_country] => US
[patent_app_date] => 2017-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13913
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15466988
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/466988 | Configurable annotations for privacy-sensitive user content | Mar 22, 2017 | Issued |
Array
(
[id] => 11733871
[patent_doc_number] => 20170195314
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-06
[patent_title] => 'PROVISIONING ACCOUNT CREDENTIALS VIA A TRUSTED CHANNEL'
[patent_app_type] => utility
[patent_app_number] => 15/467476
[patent_app_country] => US
[patent_app_date] => 2017-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8972
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15467476
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/467476 | Provisioning account credentials via a trusted channel | Mar 22, 2017 | Issued |
Array
(
[id] => 15445123
[patent_doc_number] => 20200036745
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-30
[patent_title] => ABNORMALITY DETECTION DEVICE, ABNORMALITY DETECTION METHOD AND ABNORMALITY DETECTION PROGRAM
[patent_app_type] => utility
[patent_app_number] => 16/491892
[patent_app_country] => US
[patent_app_date] => 2017-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12386
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16491892
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/491892 | Abnormality detection device, abnormality detection method and abnormality detection program | Mar 8, 2017 | Issued |
Array
(
[id] => 14431995
[patent_doc_number] => 10320819
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-11
[patent_title] => Intelligent security management
[patent_app_type] => utility
[patent_app_number] => 15/443801
[patent_app_country] => US
[patent_app_date] => 2017-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11024
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15443801
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/443801 | Intelligent security management | Feb 26, 2017 | Issued |
Array
(
[id] => 12155533
[patent_doc_number] => 20180026798
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-25
[patent_title] => 'METHOD FOR THE GENERATION OF A DIGITAL SIGNATURE OF A MESSAGE, CORRESPONDING GENERATION UNIT, ELECTRONIC APPARATUS AND COMPUTER PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 15/441001
[patent_app_country] => US
[patent_app_date] => 2017-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5685
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15441001
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/441001 | Method for the generation of a digital signature of a message, corresponding generation unit, electronic apparatus and computer program product | Feb 22, 2017 | Issued |
Array
(
[id] => 14431853
[patent_doc_number] => 10320748
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-11
[patent_title] => Single packet authorization in a cloud computing environment
[patent_app_type] => utility
[patent_app_number] => 15/441004
[patent_app_country] => US
[patent_app_date] => 2017-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8545
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15441004
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/441004 | Single packet authorization in a cloud computing environment | Feb 22, 2017 | Issued |
Array
(
[id] => 13361897
[patent_doc_number] => 20180232488
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-16
[patent_title] => METHODS AND SYSTEMS FOR WATERMARKING OF ANONYMIZED DATASETS
[patent_app_type] => utility
[patent_app_number] => 15/430520
[patent_app_country] => US
[patent_app_date] => 2017-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19260
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 252
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15430520
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/430520 | Methods and systems for watermarking of anonymized datasets | Feb 11, 2017 | Issued |
Array
(
[id] => 12034990
[patent_doc_number] => 20170325089
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-09
[patent_title] => 'METHOD AND SYSTEM OF USER AUTHENTICATION AND END TO END ENCRYPTION USING DEVICE SYNCHRONIZATION'
[patent_app_type] => utility
[patent_app_number] => 15/430522
[patent_app_country] => US
[patent_app_date] => 2017-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 4288
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15430522
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/430522 | METHOD AND SYSTEM OF USER AUTHENTICATION AND END TO END ENCRYPTION USING DEVICE SYNCHRONIZATION | Feb 11, 2017 | Abandoned |
Array
(
[id] => 11870481
[patent_doc_number] => 20170237766
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-17
[patent_title] => 'REVERSE PROXY COMPUTER: DEPLOYING COUNTERMEASURES IN RESPONSE TO DETECTING AN AUTONOMOUS BROWSER EXECUTING ON A CLIENT COMPUTER'
[patent_app_type] => utility
[patent_app_number] => 15/430224
[patent_app_country] => US
[patent_app_date] => 2017-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 17030
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15430224
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/430224 | Reverse proxy computer: deploying countermeasures in response to detecting an autonomous browser executing on a client computer | Feb 9, 2017 | Issued |
Array
(
[id] => 14755127
[patent_doc_number] => 20190260737
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-22
[patent_title] => METHOD AND APPARATUS FOR FACILITATING FRICTIONLESS TWO-FACTOR AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 15/424595
[patent_app_country] => US
[patent_app_date] => 2017-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12387
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15424595
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/424595 | Method and apparatus for facilitating frictionless two-factor authentication | Feb 2, 2017 | Issued |
Array
(
[id] => 15236499
[patent_doc_number] => 10505990
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-12-10
[patent_title] => Methods for deterministic enforcement of compliance policies and devices thereof
[patent_app_type] => utility
[patent_app_number] => 15/411037
[patent_app_country] => US
[patent_app_date] => 2017-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5322
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15411037
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/411037 | Methods for deterministic enforcement of compliance policies and devices thereof | Jan 19, 2017 | Issued |
Array
(
[id] => 15236499
[patent_doc_number] => 10505990
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-12-10
[patent_title] => Methods for deterministic enforcement of compliance policies and devices thereof
[patent_app_type] => utility
[patent_app_number] => 15/411037
[patent_app_country] => US
[patent_app_date] => 2017-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5322
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15411037
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/411037 | Methods for deterministic enforcement of compliance policies and devices thereof | Jan 19, 2017 | Issued |
Array
(
[id] => 15675249
[patent_doc_number] => 10601872
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-24
[patent_title] => Methods for enhancing enforcement of compliance policies based on security violations and devices thereof
[patent_app_type] => utility
[patent_app_number] => 15/411100
[patent_app_country] => US
[patent_app_date] => 2017-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5203
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15411100
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/411100 | Methods for enhancing enforcement of compliance policies based on security violations and devices thereof | Jan 19, 2017 | Issued |