Search

Lamont B. Koo

Examiner (ID: 10711, Phone: (571)272-0984 , Office: P/2823 )

Most Active Art Unit
2813
Art Unit(s)
2813, 2823
Total Applications
615
Issued Applications
463
Pending Applications
62
Abandoned Applications
107

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11912266 [patent_doc_number] => 09781098 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-10-03 [patent_title] => 'Generic server framework for device authentication and management and a generic framework for endpoint command dispatch' [patent_app_type] => utility [patent_app_number] => 14/689983 [patent_app_country] => US [patent_app_date] => 2015-04-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 7718 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 185 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14689983 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/689983
Generic server framework for device authentication and management and a generic framework for endpoint command dispatch Apr 16, 2015 Issued
Array ( [id] => 11926694 [patent_doc_number] => 09794290 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-10-17 [patent_title] => 'Quantitative security improvement system based on crowdsourcing' [patent_app_type] => utility [patent_app_number] => 14/690340 [patent_app_country] => US [patent_app_date] => 2015-04-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5491 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 186 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14690340 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/690340
Quantitative security improvement system based on crowdsourcing Apr 16, 2015 Issued
Array ( [id] => 11110024 [patent_doc_number] => 20160306995 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-20 [patent_title] => 'Customized Trusted Computer For Secure Data Processing and Storage' [patent_app_type] => utility [patent_app_number] => 14/690354 [patent_app_country] => US [patent_app_date] => 2015-04-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9226 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14690354 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/690354
Customized trusted computer for secure data processing and storage Apr 16, 2015 Issued
Array ( [id] => 12459729 [patent_doc_number] => 09985784 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-05-29 [patent_title] => Efficient smooth encodings for modular exponentiation [patent_app_type] => utility [patent_app_number] => 14/689139 [patent_app_country] => US [patent_app_date] => 2015-04-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 12442 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 123 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14689139 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/689139
Efficient smooth encodings for modular exponentiation Apr 16, 2015 Issued
Array ( [id] => 10741875 [patent_doc_number] => 20160088026 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-24 [patent_title] => 'RULE BASED DEVICE ENROLLMENT' [patent_app_type] => utility [patent_app_number] => 14/689733 [patent_app_country] => US [patent_app_date] => 2015-04-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 15328 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14689733 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/689733
Rule based device enrollment Apr 16, 2015 Issued
Array ( [id] => 10653220 [patent_doc_number] => 09369495 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-06-14 [patent_title] => 'Sensor aware security policies with embedded controller hardened enforcement' [patent_app_type] => utility [patent_app_number] => 14/685043 [patent_app_country] => US [patent_app_date] => 2015-04-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6201 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 126 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14685043 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/685043
Sensor aware security policies with embedded controller hardened enforcement Apr 12, 2015 Issued
Array ( [id] => 10591554 [patent_doc_number] => 09313180 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-04-12 [patent_title] => 'Systems and methods for quantum key generation' [patent_app_type] => utility [patent_app_number] => 14/680522 [patent_app_country] => US [patent_app_date] => 2015-04-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 8205 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 97 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14680522 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/680522
Systems and methods for quantum key generation Apr 6, 2015 Issued
Array ( [id] => 10465236 [patent_doc_number] => 20150350251 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-03 [patent_title] => 'SYSTEM AND METHOD FOR ASSIGNING SECURITY LEVELS FOR INSTANT MESSAGING CONTACTS ACROSS DEVICE PARTITIONS' [patent_app_type] => utility [patent_app_number] => 14/644131 [patent_app_country] => US [patent_app_date] => 2015-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 43 [patent_figures_cnt] => 43 [patent_no_of_words] => 20262 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644131 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/644131
System and method for assigning security levels for instant messaging contacts across device partitions Mar 9, 2015 Issued
Array ( [id] => 12460263 [patent_doc_number] => 09985963 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-05-29 [patent_title] => Method and system for authenticating liveness face, and computer program product thereof [patent_app_type] => utility [patent_app_number] => 14/888621 [patent_app_country] => US [patent_app_date] => 2015-02-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 8 [patent_no_of_words] => 12465 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 107 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14888621 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/888621
Method and system for authenticating liveness face, and computer program product thereof Feb 14, 2015 Issued
Array ( [id] => 11029942 [patent_doc_number] => 20160226899 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-08-04 [patent_title] => 'INSPECTED CONTENT DELIVERY WITH PEER-TO-PEER STREAMING' [patent_app_type] => utility [patent_app_number] => 14/613558 [patent_app_country] => US [patent_app_date] => 2015-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6682 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14613558 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/613558
Inspected content delivery with peer-to-peer streaming Feb 3, 2015 Issued
Array ( [id] => 10264772 [patent_doc_number] => 20150149769 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-05-28 [patent_title] => 'SECURING A SECRET OF A USER' [patent_app_type] => utility [patent_app_number] => 14/613453 [patent_app_country] => US [patent_app_date] => 2015-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10119 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14613453 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/613453
Securing a secret of a user Feb 3, 2015 Issued
Array ( [id] => 11245732 [patent_doc_number] => 09471775 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-10-18 [patent_title] => 'Security protocols for low latency execution of program code' [patent_app_type] => utility [patent_app_number] => 14/613688 [patent_app_country] => US [patent_app_date] => 2015-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 14214 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 184 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14613688 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/613688
Security protocols for low latency execution of program code Feb 3, 2015 Issued
Array ( [id] => 11525565 [patent_doc_number] => 09608987 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-03-28 [patent_title] => 'Systems and methods for the secure sharing of data' [patent_app_type] => utility [patent_app_number] => 14/614262 [patent_app_country] => US [patent_app_date] => 2015-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 11 [patent_no_of_words] => 14427 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 152 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14614262 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/614262
Systems and methods for the secure sharing of data Feb 3, 2015 Issued
Array ( [id] => 10344606 [patent_doc_number] => 20150229611 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-08-13 [patent_title] => 'KEYWORD ORDERED STORAGE, SEARCH AND RETRIEVAL ON ENCRYPTED DATA FOR MULTIUSER SCENARIO' [patent_app_type] => utility [patent_app_number] => 14/614241 [patent_app_country] => US [patent_app_date] => 2015-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4069 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14614241 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/614241
Keyword ordered storage, search and retrieval on encrypted data for multiuser scenario Feb 3, 2015 Issued
Array ( [id] => 12251127 [patent_doc_number] => 09923924 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-03-20 [patent_title] => 'Endpoint policy change' [patent_app_type] => utility [patent_app_number] => 14/613843 [patent_app_country] => US [patent_app_date] => 2015-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 5712 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 68 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14613843 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/613843
Endpoint policy change Feb 3, 2015 Issued
Array ( [id] => 11181774 [patent_doc_number] => 09413786 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-08-09 [patent_title] => 'Dynamic enterprise security control based on user risk factors' [patent_app_type] => utility [patent_app_number] => 14/613746 [patent_app_country] => US [patent_app_date] => 2015-02-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9472 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 350 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14613746 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/613746
Dynamic enterprise security control based on user risk factors Feb 3, 2015 Issued
Array ( [id] => 10337602 [patent_doc_number] => 20150222607 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-08-06 [patent_title] => 'PORTABLE SECURITY DEVICE, METHOD FOR SECURING A DATA EXCHANGE AND COMPUTER PROGRAM PRODUCT' [patent_app_type] => utility [patent_app_number] => 14/613287 [patent_app_country] => US [patent_app_date] => 2015-02-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3397 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14613287 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/613287
Portable security device, method for securing a data exchange and computer program product Feb 2, 2015 Issued
Array ( [id] => 11029949 [patent_doc_number] => 20160226904 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-08-04 [patent_title] => 'GLOBAL CLUSTERING OF INCIDENTS BASED ON MALWARE SIMILARITY AND ONLINE TRUSTFULNESS' [patent_app_type] => utility [patent_app_number] => 14/612623 [patent_app_country] => US [patent_app_date] => 2015-02-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 16279 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14612623 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/612623
Global clustering of incidents based on malware similarity and online trustfulness Feb 2, 2015 Issued
Array ( [id] => 11765897 [patent_doc_number] => 09374373 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-06-21 [patent_title] => 'Encryption techniques for improved sharing and distribution of encrypted content' [patent_app_type] => utility [patent_app_number] => 14/613062 [patent_app_country] => US [patent_app_date] => 2015-02-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 18479 [patent_no_of_claims] => 33 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 176 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14613062 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/613062
Encryption techniques for improved sharing and distribution of encrypted content Feb 2, 2015 Issued
Array ( [id] => 11029933 [patent_doc_number] => 20160226889 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-08-04 [patent_title] => 'System and Method for Detecting and Protecting Against Malicious Content' [patent_app_type] => utility [patent_app_number] => 14/612679 [patent_app_country] => US [patent_app_date] => 2015-02-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 13161 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14612679 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/612679
System and method for detecting and protecting against malicious Feb 2, 2015 Issued
Menu