
Lamont B. Koo
Examiner (ID: 10711, Phone: (571)272-0984 , Office: P/2823 )
| Most Active Art Unit | 2813 |
| Art Unit(s) | 2813, 2823 |
| Total Applications | 615 |
| Issued Applications | 463 |
| Pending Applications | 62 |
| Abandoned Applications | 107 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11912266
[patent_doc_number] => 09781098
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-03
[patent_title] => 'Generic server framework for device authentication and management and a generic framework for endpoint command dispatch'
[patent_app_type] => utility
[patent_app_number] => 14/689983
[patent_app_country] => US
[patent_app_date] => 2015-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7718
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14689983
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/689983 | Generic server framework for device authentication and management and a generic framework for endpoint command dispatch | Apr 16, 2015 | Issued |
Array
(
[id] => 11926694
[patent_doc_number] => 09794290
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-17
[patent_title] => 'Quantitative security improvement system based on crowdsourcing'
[patent_app_type] => utility
[patent_app_number] => 14/690340
[patent_app_country] => US
[patent_app_date] => 2015-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5491
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14690340
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/690340 | Quantitative security improvement system based on crowdsourcing | Apr 16, 2015 | Issued |
Array
(
[id] => 11110024
[patent_doc_number] => 20160306995
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-20
[patent_title] => 'Customized Trusted Computer For Secure Data Processing and Storage'
[patent_app_type] => utility
[patent_app_number] => 14/690354
[patent_app_country] => US
[patent_app_date] => 2015-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9226
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14690354
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/690354 | Customized trusted computer for secure data processing and storage | Apr 16, 2015 | Issued |
Array
(
[id] => 12459729
[patent_doc_number] => 09985784
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-29
[patent_title] => Efficient smooth encodings for modular exponentiation
[patent_app_type] => utility
[patent_app_number] => 14/689139
[patent_app_country] => US
[patent_app_date] => 2015-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12442
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14689139
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/689139 | Efficient smooth encodings for modular exponentiation | Apr 16, 2015 | Issued |
Array
(
[id] => 10741875
[patent_doc_number] => 20160088026
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'RULE BASED DEVICE ENROLLMENT'
[patent_app_type] => utility
[patent_app_number] => 14/689733
[patent_app_country] => US
[patent_app_date] => 2015-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 15328
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14689733
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/689733 | Rule based device enrollment | Apr 16, 2015 | Issued |
Array
(
[id] => 10653220
[patent_doc_number] => 09369495
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-14
[patent_title] => 'Sensor aware security policies with embedded controller hardened enforcement'
[patent_app_type] => utility
[patent_app_number] => 14/685043
[patent_app_country] => US
[patent_app_date] => 2015-04-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6201
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14685043
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/685043 | Sensor aware security policies with embedded controller hardened enforcement | Apr 12, 2015 | Issued |
Array
(
[id] => 10591554
[patent_doc_number] => 09313180
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-04-12
[patent_title] => 'Systems and methods for quantum key generation'
[patent_app_type] => utility
[patent_app_number] => 14/680522
[patent_app_country] => US
[patent_app_date] => 2015-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8205
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14680522
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/680522 | Systems and methods for quantum key generation | Apr 6, 2015 | Issued |
Array
(
[id] => 10465236
[patent_doc_number] => 20150350251
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'SYSTEM AND METHOD FOR ASSIGNING SECURITY LEVELS FOR INSTANT MESSAGING CONTACTS ACROSS DEVICE PARTITIONS'
[patent_app_type] => utility
[patent_app_number] => 14/644131
[patent_app_country] => US
[patent_app_date] => 2015-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 43
[patent_figures_cnt] => 43
[patent_no_of_words] => 20262
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14644131
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/644131 | System and method for assigning security levels for instant messaging contacts across device partitions | Mar 9, 2015 | Issued |
Array
(
[id] => 12460263
[patent_doc_number] => 09985963
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-29
[patent_title] => Method and system for authenticating liveness face, and computer program product thereof
[patent_app_type] => utility
[patent_app_number] => 14/888621
[patent_app_country] => US
[patent_app_date] => 2015-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 12465
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14888621
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/888621 | Method and system for authenticating liveness face, and computer program product thereof | Feb 14, 2015 | Issued |
Array
(
[id] => 11029942
[patent_doc_number] => 20160226899
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-04
[patent_title] => 'INSPECTED CONTENT DELIVERY WITH PEER-TO-PEER STREAMING'
[patent_app_type] => utility
[patent_app_number] => 14/613558
[patent_app_country] => US
[patent_app_date] => 2015-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6682
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14613558
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/613558 | Inspected content delivery with peer-to-peer streaming | Feb 3, 2015 | Issued |
Array
(
[id] => 10264772
[patent_doc_number] => 20150149769
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-28
[patent_title] => 'SECURING A SECRET OF A USER'
[patent_app_type] => utility
[patent_app_number] => 14/613453
[patent_app_country] => US
[patent_app_date] => 2015-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10119
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14613453
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/613453 | Securing a secret of a user | Feb 3, 2015 | Issued |
Array
(
[id] => 11245732
[patent_doc_number] => 09471775
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-10-18
[patent_title] => 'Security protocols for low latency execution of program code'
[patent_app_type] => utility
[patent_app_number] => 14/613688
[patent_app_country] => US
[patent_app_date] => 2015-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 14214
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14613688
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/613688 | Security protocols for low latency execution of program code | Feb 3, 2015 | Issued |
Array
(
[id] => 11525565
[patent_doc_number] => 09608987
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-28
[patent_title] => 'Systems and methods for the secure sharing of data'
[patent_app_type] => utility
[patent_app_number] => 14/614262
[patent_app_country] => US
[patent_app_date] => 2015-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 14427
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14614262
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/614262 | Systems and methods for the secure sharing of data | Feb 3, 2015 | Issued |
Array
(
[id] => 10344606
[patent_doc_number] => 20150229611
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-13
[patent_title] => 'KEYWORD ORDERED STORAGE, SEARCH AND RETRIEVAL ON ENCRYPTED DATA FOR MULTIUSER SCENARIO'
[patent_app_type] => utility
[patent_app_number] => 14/614241
[patent_app_country] => US
[patent_app_date] => 2015-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4069
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14614241
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/614241 | Keyword ordered storage, search and retrieval on encrypted data for multiuser scenario | Feb 3, 2015 | Issued |
Array
(
[id] => 12251127
[patent_doc_number] => 09923924
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-20
[patent_title] => 'Endpoint policy change'
[patent_app_type] => utility
[patent_app_number] => 14/613843
[patent_app_country] => US
[patent_app_date] => 2015-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 5712
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 68
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14613843
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/613843 | Endpoint policy change | Feb 3, 2015 | Issued |
Array
(
[id] => 11181774
[patent_doc_number] => 09413786
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-08-09
[patent_title] => 'Dynamic enterprise security control based on user risk factors'
[patent_app_type] => utility
[patent_app_number] => 14/613746
[patent_app_country] => US
[patent_app_date] => 2015-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9472
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 350
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14613746
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/613746 | Dynamic enterprise security control based on user risk factors | Feb 3, 2015 | Issued |
Array
(
[id] => 10337602
[patent_doc_number] => 20150222607
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-06
[patent_title] => 'PORTABLE SECURITY DEVICE, METHOD FOR SECURING A DATA EXCHANGE AND COMPUTER PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 14/613287
[patent_app_country] => US
[patent_app_date] => 2015-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3397
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14613287
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/613287 | Portable security device, method for securing a data exchange and computer program product | Feb 2, 2015 | Issued |
Array
(
[id] => 11029949
[patent_doc_number] => 20160226904
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-04
[patent_title] => 'GLOBAL CLUSTERING OF INCIDENTS BASED ON MALWARE SIMILARITY AND ONLINE TRUSTFULNESS'
[patent_app_type] => utility
[patent_app_number] => 14/612623
[patent_app_country] => US
[patent_app_date] => 2015-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 16279
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14612623
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/612623 | Global clustering of incidents based on malware similarity and online trustfulness | Feb 2, 2015 | Issued |
Array
(
[id] => 11765897
[patent_doc_number] => 09374373
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-06-21
[patent_title] => 'Encryption techniques for improved sharing and distribution of encrypted content'
[patent_app_type] => utility
[patent_app_number] => 14/613062
[patent_app_country] => US
[patent_app_date] => 2015-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 18479
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14613062
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/613062 | Encryption techniques for improved sharing and distribution of encrypted content | Feb 2, 2015 | Issued |
Array
(
[id] => 11029933
[patent_doc_number] => 20160226889
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-04
[patent_title] => 'System and Method for Detecting and Protecting Against Malicious Content'
[patent_app_type] => utility
[patent_app_number] => 14/612679
[patent_app_country] => US
[patent_app_date] => 2015-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 13161
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14612679
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/612679 | System and method for detecting and protecting against malicious | Feb 2, 2015 | Issued |