
Longbit Chai
Examiner (ID: 14495, Phone: (571)272-3788 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2431, 2131 |
| Total Applications | 1611 |
| Issued Applications | 1339 |
| Pending Applications | 90 |
| Abandoned Applications | 214 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15778189
[patent_doc_number] => 20200120112
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-16
[patent_title] => TECHNIQUES FOR DETECTING KNOWN VULNERABILITIES IN SERVERLESS FUNCTIONS AS A SERVICE (FAAS) PLATFORM
[patent_app_type] => utility
[patent_app_number] => 16/598220
[patent_app_country] => US
[patent_app_date] => 2019-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6882
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16598220
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/598220 | TECHNIQUES FOR DETECTING KNOWN VULNERABILITIES IN SERVERLESS FUNCTIONS AS A SERVICE (FAAS) PLATFORM | Oct 9, 2019 | Abandoned |
Array
(
[id] => 15778129
[patent_doc_number] => 20200120082
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-16
[patent_title] => TECHNIQUES FOR SECURING CREDENTIALS USED BY FUNCTIONS
[patent_app_type] => utility
[patent_app_number] => 16/598239
[patent_app_country] => US
[patent_app_date] => 2019-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6648
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 68
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16598239
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/598239 | TECHNIQUES FOR SECURING CREDENTIALS USED BY FUNCTIONS | Oct 9, 2019 | Abandoned |
Array
(
[id] => 17773434
[patent_doc_number] => 11405396
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-02
[patent_title] => Secure management and provisioning of interaction data using permissioned distributed ledgers
[patent_app_type] => utility
[patent_app_number] => 16/594472
[patent_app_country] => US
[patent_app_date] => 2019-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 21414
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16594472
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/594472 | Secure management and provisioning of interaction data using permissioned distributed ledgers | Oct 6, 2019 | Issued |
Array
(
[id] => 16730021
[patent_doc_number] => 20210097168
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-01
[patent_title] => UNIFORM RESOURCE LOCATOR SECURITY ANALYSIS USING MALICE PATTERNS
[patent_app_type] => utility
[patent_app_number] => 16/584658
[patent_app_country] => US
[patent_app_date] => 2019-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17785
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16584658
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/584658 | Uniform resource locator security analysis using malice patterns | Sep 25, 2019 | Issued |
Array
(
[id] => 16546302
[patent_doc_number] => 20200412717
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-31
[patent_title] => SYSTEMS AND METHODS FOR REAL-TIME DETECTION OF COMPROMISED AUTHENTICATION CREDENTIALS
[patent_app_type] => utility
[patent_app_number] => 16/581031
[patent_app_country] => US
[patent_app_date] => 2019-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10380
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16581031
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/581031 | Systems and methods for real-time detection of compromised authentication credentials | Sep 23, 2019 | Issued |
Array
(
[id] => 16403184
[patent_doc_number] => 20200344042
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-29
[patent_title] => VERIFICATION SYSTEM AND METHOD FOR COOPERATING WITH BLOCKCHAIN AND OFF-CHAIN DEVICES
[patent_app_type] => utility
[patent_app_number] => 16/579306
[patent_app_country] => US
[patent_app_date] => 2019-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7107
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16579306
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/579306 | Verification system and method for cooperating with blockchain and off-chain devices | Sep 22, 2019 | Issued |
Array
(
[id] => 16503264
[patent_doc_number] => 10868672
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-15
[patent_title] => Establishing and verifying identity using biometrics while protecting user privacy
[patent_app_type] => utility
[patent_app_number] => 16/575314
[patent_app_country] => US
[patent_app_date] => 2019-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 21009
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16575314
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/575314 | Establishing and verifying identity using biometrics while protecting user privacy | Sep 17, 2019 | Issued |
Array
(
[id] => 17411252
[patent_doc_number] => 11252159
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-02-15
[patent_title] => Cognitive access control policy management in a multi-cluster container orchestration environment
[patent_app_type] => utility
[patent_app_number] => 16/574357
[patent_app_country] => US
[patent_app_date] => 2019-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8132
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16574357
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/574357 | Cognitive access control policy management in a multi-cluster container orchestration environment | Sep 17, 2019 | Issued |
Array
(
[id] => 15353673
[patent_doc_number] => 20200014728
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-09
[patent_title] => SYSTEMS AND METHODS FOR MONITORING AND CORRECTING COMPUTER SYSTEM SECURITY PRACTICES
[patent_app_type] => utility
[patent_app_number] => 16/573175
[patent_app_country] => US
[patent_app_date] => 2019-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6274
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16573175
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/573175 | Systems and methods for monitoring and correcting computer system security practices | Sep 16, 2019 | Issued |
Array
(
[id] => 16646587
[patent_doc_number] => 10924462
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-16
[patent_title] => Cryptanalysis method and system
[patent_app_type] => utility
[patent_app_number] => 16/566917
[patent_app_country] => US
[patent_app_date] => 2019-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 12019
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16566917
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/566917 | Cryptanalysis method and system | Sep 10, 2019 | Issued |
Array
(
[id] => 15627293
[patent_doc_number] => 20200084051
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-12
[patent_title] => SYSTEMS AND METHODS FOR PRESERVING PRIVACY AND INCENTIVIZING THIRD-PARTY DATA SHARING
[patent_app_type] => utility
[patent_app_number] => 16/568132
[patent_app_country] => US
[patent_app_date] => 2019-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9749
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16568132
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/568132 | Systems and methods for preserving privacy and incentivizing third-party data sharing | Sep 10, 2019 | Issued |
Array
(
[id] => 16537458
[patent_doc_number] => 10880080
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-29
[patent_title] => Cryptographic key generation from biometric data
[patent_app_type] => utility
[patent_app_number] => 16/565067
[patent_app_country] => US
[patent_app_date] => 2019-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10059
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16565067
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/565067 | Cryptographic key generation from biometric data | Sep 8, 2019 | Issued |
Array
(
[id] => 16698916
[patent_doc_number] => 10949518
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-03-16
[patent_title] => Systems and methods for creating a verified digital association
[patent_app_type] => utility
[patent_app_number] => 16/562317
[patent_app_country] => US
[patent_app_date] => 2019-09-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 11785
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16562317
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/562317 | Systems and methods for creating a verified digital association | Sep 4, 2019 | Issued |
Array
(
[id] => 17418120
[patent_doc_number] => 20220053025
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-02-17
[patent_title] => METHOD AND DEVICE FOR CONFIGURING AN ACCESS PROTECTION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 17/276579
[patent_app_country] => US
[patent_app_date] => 2019-09-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5358
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17276579
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/276579 | Method and device for configuring an access protection system | Sep 2, 2019 | Issued |
Array
(
[id] => 18430696
[patent_doc_number] => 11675918
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-06-13
[patent_title] => Policy-based user device security checks
[patent_app_type] => utility
[patent_app_number] => 16/553063
[patent_app_country] => US
[patent_app_date] => 2019-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13386
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 448
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16553063
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/553063 | Policy-based user device security checks | Aug 26, 2019 | Issued |
Array
(
[id] => 15600493
[patent_doc_number] => 20200076781
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => Access Manager for Linux Systems
[patent_app_type] => utility
[patent_app_number] => 16/552862
[patent_app_country] => US
[patent_app_date] => 2019-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10312
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16552862
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/552862 | Access Manager for Linux Systems | Aug 26, 2019 | Abandoned |
Array
(
[id] => 15413103
[patent_doc_number] => 20200026874
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-23
[patent_title] => SEARCHING FOR ENCRYPTED DATA WITHIN A CLOUD BASED PLATFORM
[patent_app_type] => utility
[patent_app_number] => 16/530501
[patent_app_country] => US
[patent_app_date] => 2019-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11700
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16530501
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/530501 | Searching for encrypted data within a cloud based platform | Aug 1, 2019 | Issued |
Array
(
[id] => 17530895
[patent_doc_number] => 11303611
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-04-12
[patent_title] => Policy consolidation for auto-orchestrated data centers
[patent_app_type] => utility
[patent_app_number] => 16/525270
[patent_app_country] => US
[patent_app_date] => 2019-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 7864
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16525270
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/525270 | Policy consolidation for auto-orchestrated data centers | Jul 28, 2019 | Issued |
Array
(
[id] => 15156407
[patent_doc_number] => 20190356681
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-21
[patent_title] => Targeted Attack Protection from Malicious Links in Messages Using Predictive Sandboxing
[patent_app_type] => utility
[patent_app_number] => 16/523439
[patent_app_country] => US
[patent_app_date] => 2019-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8755
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16523439
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/523439 | Targeted attack protection from malicious links in messages using predictive sandboxing | Jul 25, 2019 | Issued |
Array
(
[id] => 15582959
[patent_doc_number] => 10581885
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-03
[patent_title] => Reinforcement learning method in which discount factor is automatically adjusted
[patent_app_type] => utility
[patent_app_number] => 16/517488
[patent_app_country] => US
[patent_app_date] => 2019-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 7396
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16517488
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/517488 | Reinforcement learning method in which discount factor is automatically adjusted | Jul 18, 2019 | Issued |