Search

Michael W. Chao

Examiner (ID: 13273)

Most Active Art Unit
2492
Art Unit(s)
2492, 2442
Total Applications
606
Issued Applications
384
Pending Applications
72
Abandoned Applications
167

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 13993151 [patent_doc_number] => 20190065733 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-28 [patent_title] => DEVICE LIFECYCLE DISTRIBUTED LEDGER [patent_app_type] => utility [patent_app_number] => 15/689235 [patent_app_country] => US [patent_app_date] => 2017-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9710 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 56 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689235 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/689235
Device lifecycle distributed ledger Aug 28, 2017 Issued
Array ( [id] => 13993263 [patent_doc_number] => 20190065789 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-28 [patent_title] => DEVICE AND METHOD FOR POWER SOURCE BASED DEVICE AUTHENTICATION [patent_app_type] => utility [patent_app_number] => 15/689335 [patent_app_country] => US [patent_app_date] => 2017-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8196 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 92 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689335 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/689335
DEVICE AND METHOD FOR POWER SOURCE BASED DEVICE AUTHENTICATION Aug 28, 2017 Abandoned
Array ( [id] => 13998831 [patent_doc_number] => 20190068573 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-28 [patent_title] => DETECTION OF THE NETWORK LOGON PROTOCOL USED IN PASS-THROUGH AUTHENTICATION [patent_app_type] => utility [patent_app_number] => 15/689229 [patent_app_country] => US [patent_app_date] => 2017-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6083 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 63 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689229 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/689229
Detection of the network logon protocol used in pass-through authentication Aug 28, 2017 Issued
Array ( [id] => 16772990 [patent_doc_number] => 10984099 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-04-20 [patent_title] => Unauthorized authentication events [patent_app_type] => utility [patent_app_number] => 15/689043 [patent_app_country] => US [patent_app_date] => 2017-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 4415 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 163 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689043 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/689043
Unauthorized authentication events Aug 28, 2017 Issued
Array ( [id] => 17684172 [patent_doc_number] => 11368442 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-06-21 [patent_title] => Receiving an encrypted communication from a user in a second secure communication network [patent_app_type] => utility [patent_app_number] => 15/689253 [patent_app_country] => US [patent_app_date] => 2017-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 11965 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 188 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689253 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/689253
Receiving an encrypted communication from a user in a second secure communication network Aug 28, 2017 Issued
Array ( [id] => 12224549 [patent_doc_number] => 20180062908 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-01 [patent_title] => 'ALLOCATION OF VIRTUAL INTERFACES TO CONTAINERS' [patent_app_type] => utility [patent_app_number] => 15/689438 [patent_app_country] => US [patent_app_date] => 2017-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5448 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689438 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/689438
Allocation of virtual interfaces to containers Aug 28, 2017 Issued
Array ( [id] => 15891787 [patent_doc_number] => 10652259 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-05-12 [patent_title] => Information processing apparatus, method and medium for classifying unauthorized activity [patent_app_type] => utility [patent_app_number] => 15/689327 [patent_app_country] => US [patent_app_date] => 2017-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 13070 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 244 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689327 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/689327
Information processing apparatus, method and medium for classifying unauthorized activity Aug 28, 2017 Issued
Array ( [id] => 16410951 [patent_doc_number] => 10819524 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-10-27 [patent_title] => Methods for header extension preservation, security, authentication, and protocol translation for RTP over MPRTP [patent_app_type] => utility [patent_app_number] => 15/689742 [patent_app_country] => US [patent_app_date] => 2017-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 9912 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 117 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15689742 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/689742
Methods for header extension preservation, security, authentication, and protocol translation for RTP over MPRTP Aug 28, 2017 Issued
Array ( [id] => 15521499 [patent_doc_number] => 10567360 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-02-18 [patent_title] => SSH key validation in a hyper-converged computing environment [patent_app_type] => utility [patent_app_number] => 15/687561 [patent_app_country] => US [patent_app_date] => 2017-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6851 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 197 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15687561 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/687561
SSH key validation in a hyper-converged computing environment Aug 27, 2017 Issued
Array ( [id] => 15111059 [patent_doc_number] => 10476870 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-11-12 [patent_title] => Local claim-based security service with cross-browser compatibility [patent_app_type] => utility [patent_app_number] => 15/686391 [patent_app_country] => US [patent_app_date] => 2017-08-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7490 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 148 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15686391 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/686391
Local claim-based security service with cross-browser compatibility Aug 24, 2017 Issued
Array ( [id] => 12875896 [patent_doc_number] => 20180183807 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-06-28 [patent_title] => METHOD FOR AUDITING CLOUD ACCESS IN REAL TIME [patent_app_type] => utility [patent_app_number] => 15/686438 [patent_app_country] => US [patent_app_date] => 2017-08-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 1995 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -3 [patent_words_short_claim] => 234 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15686438 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/686438
METHOD FOR AUDITING CLOUD ACCESS IN REAL TIME Aug 24, 2017 Abandoned
Array ( [id] => 16232894 [patent_doc_number] => 10740446 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-08-11 [patent_title] => Methods and systems for remote sensing device control based on facial information [patent_app_type] => utility [patent_app_number] => 15/685521 [patent_app_country] => US [patent_app_date] => 2017-08-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6979 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15685521 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/685521
Methods and systems for remote sensing device control based on facial information Aug 23, 2017 Issued
Array ( [id] => 12207780 [patent_doc_number] => 20180053006 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-02-22 [patent_title] => 'PRIMARY DEVICE, AN ACCESSORY DEVICE, AND METHODS FOR PROCESSING OPERATIONS ON THE PRIMARY DEVICE AND THE ACCESSORY DEVICE' [patent_app_type] => utility [patent_app_number] => 15/678609 [patent_app_country] => US [patent_app_date] => 2017-08-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 12568 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15678609 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/678609
Primary device, an accessory device, and methods for processing operations on the primary device and the accessory device Aug 15, 2017 Issued
Array ( [id] => 15111019 [patent_doc_number] => 10476850 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-11-12 [patent_title] => Supporting unknown unicast traffic using policy-based encryption virtualized networks [patent_app_type] => utility [patent_app_number] => 15/675482 [patent_app_country] => US [patent_app_date] => 2017-08-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 7666 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 138 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15675482 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/675482
Supporting unknown unicast traffic using policy-based encryption virtualized networks Aug 10, 2017 Issued
Array ( [id] => 13850047 [patent_doc_number] => 20190028508 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-01-24 [patent_title] => GATEWAY APPARATUS, DETECTING METHOD OF MALICIOUS DOMAIN AND HACKED HOST THEREOF, AND NON-TRANSITORY COMPUTER READABLE MEDIUM [patent_app_type] => utility [patent_app_number] => 15/667632 [patent_app_country] => US [patent_app_date] => 2017-08-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3380 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -7 [patent_words_short_claim] => 108 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15667632 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/667632
Gateway apparatus, detecting method of malicious domain and hacked host thereof, and non-transitory computer readable medium Aug 2, 2017 Issued
Array ( [id] => 16537675 [patent_doc_number] => 10880298 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-12-29 [patent_title] => Method for generating a key and access control method [patent_app_type] => utility [patent_app_number] => 15/668551 [patent_app_country] => US [patent_app_date] => 2017-08-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5732 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 309 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15668551 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/668551
Method for generating a key and access control method Aug 2, 2017 Issued
Array ( [id] => 13849995 [patent_doc_number] => 20190028482 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-01-24 [patent_title] => WIRELESS NETWORK STEERING [patent_app_type] => utility [patent_app_number] => 15/656184 [patent_app_country] => US [patent_app_date] => 2017-07-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11679 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 100 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15656184 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/656184
Wireless network steering Jul 20, 2017 Issued
Array ( [id] => 13834335 [patent_doc_number] => 20190020652 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-01-17 [patent_title] => SYSTEM AND METHOD FOR LOCAL DATA IP BASED NETWORK SECURITY FOR PREVENTING DATA BREACH ATTEMPTS IN A MULTI-TENANT PROTECTION STORAGE DEPLOYMENT [patent_app_type] => utility [patent_app_number] => 15/650600 [patent_app_country] => US [patent_app_date] => 2017-07-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6941 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 98 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15650600 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/650600
System and method for local data IP based network security for preventing data breach attempts in a multi-tenant protection storage deployment Jul 13, 2017 Issued
Array ( [id] => 13801113 [patent_doc_number] => 20190014095 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-01-10 [patent_title] => FACILITATING PROVISIONING OF AN OUT-OF-BAND PSEUDONYM OVER A SECURE COMMUNICATION CHANNEL [patent_app_type] => utility [patent_app_number] => 15/643142 [patent_app_country] => US [patent_app_date] => 2017-07-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12547 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 91 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15643142 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/643142
FACILITATING PROVISIONING OF AN OUT-OF-BAND PSEUDONYM OVER A SECURE COMMUNICATION CHANNEL Jul 5, 2017 Abandoned
Array ( [id] => 14369201 [patent_doc_number] => 10305923 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-05-28 [patent_title] => Server-supported malware detection and protection [patent_app_type] => utility [patent_app_number] => 15/639520 [patent_app_country] => US [patent_app_date] => 2017-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 17827 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 333 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15639520 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/639520
Server-supported malware detection and protection Jun 29, 2017 Issued
Menu