Search

Longbit Chai

Examiner (ID: 14495, Phone: (571)272-3788 , Office: P/2431 )

Most Active Art Unit
2431
Art Unit(s)
2431, 2131
Total Applications
1611
Issued Applications
1339
Pending Applications
90
Abandoned Applications
214

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 15778189 [patent_doc_number] => 20200120112 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-04-16 [patent_title] => TECHNIQUES FOR DETECTING KNOWN VULNERABILITIES IN SERVERLESS FUNCTIONS AS A SERVICE (FAAS) PLATFORM [patent_app_type] => utility [patent_app_number] => 16/598220 [patent_app_country] => US [patent_app_date] => 2019-10-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6882 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 99 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16598220 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/598220
TECHNIQUES FOR DETECTING KNOWN VULNERABILITIES IN SERVERLESS FUNCTIONS AS A SERVICE (FAAS) PLATFORM Oct 9, 2019 Abandoned
Array ( [id] => 15778129 [patent_doc_number] => 20200120082 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-04-16 [patent_title] => TECHNIQUES FOR SECURING CREDENTIALS USED BY FUNCTIONS [patent_app_type] => utility [patent_app_number] => 16/598239 [patent_app_country] => US [patent_app_date] => 2019-10-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6648 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 68 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16598239 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/598239
TECHNIQUES FOR SECURING CREDENTIALS USED BY FUNCTIONS Oct 9, 2019 Abandoned
Array ( [id] => 17773434 [patent_doc_number] => 11405396 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-08-02 [patent_title] => Secure management and provisioning of interaction data using permissioned distributed ledgers [patent_app_type] => utility [patent_app_number] => 16/594472 [patent_app_country] => US [patent_app_date] => 2019-10-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 21414 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 196 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16594472 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/594472
Secure management and provisioning of interaction data using permissioned distributed ledgers Oct 6, 2019 Issued
Array ( [id] => 16730021 [patent_doc_number] => 20210097168 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-04-01 [patent_title] => UNIFORM RESOURCE LOCATOR SECURITY ANALYSIS USING MALICE PATTERNS [patent_app_type] => utility [patent_app_number] => 16/584658 [patent_app_country] => US [patent_app_date] => 2019-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 17785 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16584658 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/584658
Uniform resource locator security analysis using malice patterns Sep 25, 2019 Issued
Array ( [id] => 16546302 [patent_doc_number] => 20200412717 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-12-31 [patent_title] => SYSTEMS AND METHODS FOR REAL-TIME DETECTION OF COMPROMISED AUTHENTICATION CREDENTIALS [patent_app_type] => utility [patent_app_number] => 16/581031 [patent_app_country] => US [patent_app_date] => 2019-09-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10380 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 80 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16581031 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/581031
Systems and methods for real-time detection of compromised authentication credentials Sep 23, 2019 Issued
Array ( [id] => 16403184 [patent_doc_number] => 20200344042 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-10-29 [patent_title] => VERIFICATION SYSTEM AND METHOD FOR COOPERATING WITH BLOCKCHAIN AND OFF-CHAIN DEVICES [patent_app_type] => utility [patent_app_number] => 16/579306 [patent_app_country] => US [patent_app_date] => 2019-09-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7107 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16579306 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/579306
Verification system and method for cooperating with blockchain and off-chain devices Sep 22, 2019 Issued
Array ( [id] => 16503264 [patent_doc_number] => 10868672 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-12-15 [patent_title] => Establishing and verifying identity using biometrics while protecting user privacy [patent_app_type] => utility [patent_app_number] => 16/575314 [patent_app_country] => US [patent_app_date] => 2019-09-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 21009 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 230 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16575314 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/575314
Establishing and verifying identity using biometrics while protecting user privacy Sep 17, 2019 Issued
Array ( [id] => 17411252 [patent_doc_number] => 11252159 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-02-15 [patent_title] => Cognitive access control policy management in a multi-cluster container orchestration environment [patent_app_type] => utility [patent_app_number] => 16/574357 [patent_app_country] => US [patent_app_date] => 2019-09-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8132 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 199 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16574357 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/574357
Cognitive access control policy management in a multi-cluster container orchestration environment Sep 17, 2019 Issued
Array ( [id] => 15353673 [patent_doc_number] => 20200014728 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-09 [patent_title] => SYSTEMS AND METHODS FOR MONITORING AND CORRECTING COMPUTER SYSTEM SECURITY PRACTICES [patent_app_type] => utility [patent_app_number] => 16/573175 [patent_app_country] => US [patent_app_date] => 2019-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6274 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 211 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16573175 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/573175
Systems and methods for monitoring and correcting computer system security practices Sep 16, 2019 Issued
Array ( [id] => 16646587 [patent_doc_number] => 10924462 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-02-16 [patent_title] => Cryptanalysis method and system [patent_app_type] => utility [patent_app_number] => 16/566917 [patent_app_country] => US [patent_app_date] => 2019-09-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 12019 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16566917 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/566917
Cryptanalysis method and system Sep 10, 2019 Issued
Array ( [id] => 15627293 [patent_doc_number] => 20200084051 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-03-12 [patent_title] => SYSTEMS AND METHODS FOR PRESERVING PRIVACY AND INCENTIVIZING THIRD-PARTY DATA SHARING [patent_app_type] => utility [patent_app_number] => 16/568132 [patent_app_country] => US [patent_app_date] => 2019-09-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9749 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16568132 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/568132
Systems and methods for preserving privacy and incentivizing third-party data sharing Sep 10, 2019 Issued
Array ( [id] => 16537458 [patent_doc_number] => 10880080 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-12-29 [patent_title] => Cryptographic key generation from biometric data [patent_app_type] => utility [patent_app_number] => 16/565067 [patent_app_country] => US [patent_app_date] => 2019-09-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 10059 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 189 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16565067 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/565067
Cryptographic key generation from biometric data Sep 8, 2019 Issued
Array ( [id] => 16698916 [patent_doc_number] => 10949518 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-03-16 [patent_title] => Systems and methods for creating a verified digital association [patent_app_type] => utility [patent_app_number] => 16/562317 [patent_app_country] => US [patent_app_date] => 2019-09-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 11785 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 184 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16562317 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/562317
Systems and methods for creating a verified digital association Sep 4, 2019 Issued
Array ( [id] => 17418120 [patent_doc_number] => 20220053025 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-02-17 [patent_title] => METHOD AND DEVICE FOR CONFIGURING AN ACCESS PROTECTION SYSTEM [patent_app_type] => utility [patent_app_number] => 17/276579 [patent_app_country] => US [patent_app_date] => 2019-09-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5358 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 134 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17276579 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/276579
Method and device for configuring an access protection system Sep 2, 2019 Issued
Array ( [id] => 18430696 [patent_doc_number] => 11675918 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-06-13 [patent_title] => Policy-based user device security checks [patent_app_type] => utility [patent_app_number] => 16/553063 [patent_app_country] => US [patent_app_date] => 2019-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 13386 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 448 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16553063 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/553063
Policy-based user device security checks Aug 26, 2019 Issued
Array ( [id] => 15600493 [patent_doc_number] => 20200076781 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-03-05 [patent_title] => Access Manager for Linux Systems [patent_app_type] => utility [patent_app_number] => 16/552862 [patent_app_country] => US [patent_app_date] => 2019-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10312 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -13 [patent_words_short_claim] => 118 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16552862 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/552862
Access Manager for Linux Systems Aug 26, 2019 Abandoned
Array ( [id] => 15413103 [patent_doc_number] => 20200026874 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-23 [patent_title] => SEARCHING FOR ENCRYPTED DATA WITHIN A CLOUD BASED PLATFORM [patent_app_type] => utility [patent_app_number] => 16/530501 [patent_app_country] => US [patent_app_date] => 2019-08-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11700 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16530501 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/530501
Searching for encrypted data within a cloud based platform Aug 1, 2019 Issued
Array ( [id] => 17530895 [patent_doc_number] => 11303611 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2022-04-12 [patent_title] => Policy consolidation for auto-orchestrated data centers [patent_app_type] => utility [patent_app_number] => 16/525270 [patent_app_country] => US [patent_app_date] => 2019-07-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 22 [patent_figures_cnt] => 22 [patent_no_of_words] => 7864 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 269 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16525270 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/525270
Policy consolidation for auto-orchestrated data centers Jul 28, 2019 Issued
Array ( [id] => 15156407 [patent_doc_number] => 20190356681 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-11-21 [patent_title] => Targeted Attack Protection from Malicious Links in Messages Using Predictive Sandboxing [patent_app_type] => utility [patent_app_number] => 16/523439 [patent_app_country] => US [patent_app_date] => 2019-07-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8755 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 104 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16523439 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/523439
Targeted attack protection from malicious links in messages using predictive sandboxing Jul 25, 2019 Issued
Array ( [id] => 15582959 [patent_doc_number] => 10581885 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-03-03 [patent_title] => Reinforcement learning method in which discount factor is automatically adjusted [patent_app_type] => utility [patent_app_number] => 16/517488 [patent_app_country] => US [patent_app_date] => 2019-07-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 7396 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 214 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16517488 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/517488
Reinforcement learning method in which discount factor is automatically adjusted Jul 18, 2019 Issued
Menu