
Longbit Chai
Examiner (ID: 16906, Phone: (571)272-3788 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2131, 2431 |
| Total Applications | 1625 |
| Issued Applications | 1346 |
| Pending Applications | 90 |
| Abandoned Applications | 216 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 4837563
[patent_doc_number] => 20080134333
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-06-05
[patent_title] => 'Detecting exploits in electronic objects'
[patent_app_type] => utility
[patent_app_number] => 11/633076
[patent_app_country] => US
[patent_app_date] => 2006-12-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9527
[patent_no_of_claims] => 46
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0134/20080134333.pdf
[firstpage_image] =>[orig_patent_app_number] => 11633076
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/633076 | Detecting exploits in electronic objects | Dec 3, 2006 | Abandoned |
Array
(
[id] => 5252135
[patent_doc_number] => 20070133591
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-06-14
[patent_title] => 'Synchronizing token time base'
[patent_app_type] => utility
[patent_app_number] => 11/634029
[patent_app_country] => US
[patent_app_date] => 2006-12-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4914
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0133/20070133591.pdf
[firstpage_image] =>[orig_patent_app_number] => 11634029
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/634029 | Synchronizing token time base | Dec 3, 2006 | Abandoned |
Array
(
[id] => 5198092
[patent_doc_number] => 20070297410
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-12-27
[patent_title] => 'Real-time stateful packet inspection method and apparatus'
[patent_app_type] => utility
[patent_app_number] => 11/633174
[patent_app_country] => US
[patent_app_date] => 2006-12-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4225
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0297/20070297410.pdf
[firstpage_image] =>[orig_patent_app_number] => 11633174
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/633174 | Real-time stateful packet inspection method and apparatus | Dec 3, 2006 | Issued |
Array
(
[id] => 5065145
[patent_doc_number] => 20070226787
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-09-27
[patent_title] => 'Method and system for secure external TPM password generation and use'
[patent_app_type] => utility
[patent_app_number] => 11/607504
[patent_app_country] => US
[patent_app_date] => 2006-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4865
[patent_no_of_claims] => 49
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0226/20070226787.pdf
[firstpage_image] =>[orig_patent_app_number] => 11607504
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/607504 | Method and system for secure external TPM password generation and use | Nov 29, 2006 | Issued |
Array
(
[id] => 5064854
[patent_doc_number] => 20070226496
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-09-27
[patent_title] => 'Method and system for secure external TPM password generation and use'
[patent_app_type] => utility
[patent_app_number] => 11/633045
[patent_app_country] => US
[patent_app_date] => 2006-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4879
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0226/20070226496.pdf
[firstpage_image] =>[orig_patent_app_number] => 11633045
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/633045 | Method and system for secure external TPM password generation and use | Nov 29, 2006 | Issued |
Array
(
[id] => 8366905
[patent_doc_number] => 08255985
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-08-28
[patent_title] => 'Methods, network services, and computer program products for recommending security policies to firewalls'
[patent_app_type] => utility
[patent_app_number] => 11/598490
[patent_app_country] => US
[patent_app_date] => 2006-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5615
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 312
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11598490
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/598490 | Methods, network services, and computer program products for recommending security policies to firewalls | Nov 12, 2006 | Issued |
Array
(
[id] => 5108764
[patent_doc_number] => 20070067642
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-03-22
[patent_title] => 'Systems and methods for multi-factor remote user authentication'
[patent_app_type] => utility
[patent_app_number] => 11/520201
[patent_app_country] => US
[patent_app_date] => 2006-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 8092
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 26
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0067/20070067642.pdf
[firstpage_image] =>[orig_patent_app_number] => 11520201
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/520201 | Systems and methods for multi-factor remote user authentication | Sep 12, 2006 | Issued |
Array
(
[id] => 805159
[patent_doc_number] => 07424116
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-09-09
[patent_title] => 'Method and apparatus for providing authentication in a communication system'
[patent_app_type] => utility
[patent_app_number] => 11/468824
[patent_app_country] => US
[patent_app_date] => 2006-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 17
[patent_no_of_words] => 14988
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/424/07424116.pdf
[firstpage_image] =>[orig_patent_app_number] => 11468824
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/468824 | Method and apparatus for providing authentication in a communication system | Aug 30, 2006 | Issued |
Array
(
[id] => 4671938
[patent_doc_number] => 20080046999
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-02-21
[patent_title] => 'Computer information protecting method'
[patent_app_type] => utility
[patent_app_number] => 11/497963
[patent_app_country] => US
[patent_app_date] => 2006-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2551
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0046/20080046999.pdf
[firstpage_image] =>[orig_patent_app_number] => 11497963
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/497963 | Computer information protecting method | Aug 1, 2006 | Abandoned |
Array
(
[id] => 4659366
[patent_doc_number] => 20080028228
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-01-31
[patent_title] => 'Method and system for access authentication'
[patent_app_type] => utility
[patent_app_number] => 11/496673
[patent_app_country] => US
[patent_app_date] => 2006-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 7358
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0028/20080028228.pdf
[firstpage_image] =>[orig_patent_app_number] => 11496673
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/496673 | Method and system for access authentication | Jul 30, 2006 | Issued |
Array
(
[id] => 6646825
[patent_doc_number] => 20100174908
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-08
[patent_title] => 'METHOD AND SYSTEM FOR SECURELY EXCHANGING ENCRYPTION KEY DETERMINATION INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 11/494285
[patent_app_country] => US
[patent_app_date] => 2006-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 3859
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0174/20100174908.pdf
[firstpage_image] =>[orig_patent_app_number] => 11494285
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/494285 | Method and system for securely exchanging encryption key determination information | Jul 26, 2006 | Issued |
Array
(
[id] => 4956529
[patent_doc_number] => 20080189553
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-08-07
[patent_title] => 'MEMORY BASED AUTHENTICATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 11/309300
[patent_app_country] => US
[patent_app_date] => 2006-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5907
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0189/20080189553.pdf
[firstpage_image] =>[orig_patent_app_number] => 11309300
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/309300 | MEMORY BASED AUTHENTICATION SYSTEM | Jul 23, 2006 | Abandoned |
Array
(
[id] => 5200967
[patent_doc_number] => 20070300285
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-12-27
[patent_title] => 'Techniques for managing security contexts'
[patent_app_type] => utility
[patent_app_number] => 11/471905
[patent_app_country] => US
[patent_app_date] => 2006-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6834
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0300/20070300285.pdf
[firstpage_image] =>[orig_patent_app_number] => 11471905
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/471905 | Techniques for managing security contexts | Jun 20, 2006 | Issued |
Array
(
[id] => 192956
[patent_doc_number] => 07644283
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-01-05
[patent_title] => 'Media analysis method and system for locating and reporting the presence of steganographic activity'
[patent_app_type] => utility
[patent_app_number] => 11/420665
[patent_app_country] => US
[patent_app_date] => 2006-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 15
[patent_no_of_words] => 9864
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/644/07644283.pdf
[firstpage_image] =>[orig_patent_app_number] => 11420665
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/420665 | Media analysis method and system for locating and reporting the presence of steganographic activity | May 25, 2006 | Issued |
Array
(
[id] => 234056
[patent_doc_number] => 07599492
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2009-10-06
[patent_title] => 'Fast cryptographic key recovery system and method'
[patent_app_type] => utility
[patent_app_number] => 11/279909
[patent_app_country] => US
[patent_app_date] => 2006-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5182
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/599/07599492.pdf
[firstpage_image] =>[orig_patent_app_number] => 11279909
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/279909 | Fast cryptographic key recovery system and method | Apr 16, 2006 | Issued |
Array
(
[id] => 5861213
[patent_doc_number] => 20060229997
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-10-12
[patent_title] => 'SYSTEM AND METHOD FOR MANAGING MULTI-ZONE INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 11/308570
[patent_app_country] => US
[patent_app_date] => 2006-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1451
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0229/20060229997.pdf
[firstpage_image] =>[orig_patent_app_number] => 11308570
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/308570 | SYSTEM AND METHOD FOR MANAGING MULTI-ZONE INFORMATION | Apr 7, 2006 | Abandoned |
Array
(
[id] => 97307
[patent_doc_number] => 07739507
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-06-15
[patent_title] => 'Hardware multimedia endpoint and personal computer'
[patent_app_type] => utility
[patent_app_number] => 11/279077
[patent_app_country] => US
[patent_app_date] => 2006-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 13
[patent_no_of_words] => 9301
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/739/07739507.pdf
[firstpage_image] =>[orig_patent_app_number] => 11279077
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/279077 | Hardware multimedia endpoint and personal computer | Apr 6, 2006 | Issued |
Array
(
[id] => 4499085
[patent_doc_number] => 07886159
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-02-08
[patent_title] => 'Data providing system and apparatus and methods of same'
[patent_app_type] => utility
[patent_app_number] => 11/397002
[patent_app_country] => US
[patent_app_date] => 2006-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 98
[patent_figures_cnt] => 120
[patent_no_of_words] => 59704
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/886/07886159.pdf
[firstpage_image] =>[orig_patent_app_number] => 11397002
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/397002 | Data providing system and apparatus and methods of same | Apr 2, 2006 | Issued |
Array
(
[id] => 5633782
[patent_doc_number] => 20060150253
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-07-06
[patent_title] => 'Security Component for a Computing Device'
[patent_app_type] => utility
[patent_app_number] => 11/276722
[patent_app_country] => US
[patent_app_date] => 2006-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8631
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0150/20060150253.pdf
[firstpage_image] =>[orig_patent_app_number] => 11276722
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/276722 | Security component for a computing device | Mar 9, 2006 | Issued |
Array
(
[id] => 5789633
[patent_doc_number] => 20060206941
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-09-14
[patent_title] => 'Communications system with distributed risk management'
[patent_app_type] => utility
[patent_app_number] => 11/369817
[patent_app_country] => US
[patent_app_date] => 2006-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8948
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0206/20060206941.pdf
[firstpage_image] =>[orig_patent_app_number] => 11369817
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/369817 | Communications system with distributed risk management | Mar 7, 2006 | Abandoned |