
Shu Chun Gao
Examiner (ID: 15008, Phone: (571)270-5999 , Office: P/2492 )
| Most Active Art Unit | 2437 |
| Art Unit(s) | 2437, 2492 |
| Total Applications | 435 |
| Issued Applications | 360 |
| Pending Applications | 18 |
| Abandoned Applications | 66 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15876015
[patent_doc_number] => 20200145411
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => BIOMETRIC CLOUD AUTHENTICATION GATEWAY DATABASE SYSTEM AND METHOD OF USE
[patent_app_type] => utility
[patent_app_number] => 16/725401
[patent_app_country] => US
[patent_app_date] => 2019-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10589
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16725401
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/725401 | Biometric cloud authentication gateway database system and method of use | Dec 22, 2019 | Issued |
Array
(
[id] => 16903481
[patent_doc_number] => 20210182397
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-17
[patent_title] => Ransomware Detection and Mitigation
[patent_app_type] => utility
[patent_app_number] => 16/711819
[patent_app_country] => US
[patent_app_date] => 2019-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16097
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16711819
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/711819 | Ransomware detection and mitigation | Dec 11, 2019 | Issued |
Array
(
[id] => 17942699
[patent_doc_number] => 11477171
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-18
[patent_title] => Client authentication management based upon modeling
[patent_app_type] => utility
[patent_app_number] => 16/699112
[patent_app_country] => US
[patent_app_date] => 2019-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 12524
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16699112
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/699112 | Client authentication management based upon modeling | Nov 28, 2019 | Issued |
Array
(
[id] => 15941759
[patent_doc_number] => 20200162513
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-21
[patent_title] => CONNECTING A CLOUD NETWORK TO THE INTERNET
[patent_app_type] => utility
[patent_app_number] => 16/688846
[patent_app_country] => US
[patent_app_date] => 2019-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21084
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -39
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16688846
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/688846 | Connecting a cloud network to the internet | Nov 18, 2019 | Issued |
Array
(
[id] => 15445127
[patent_doc_number] => 20200036747
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-30
[patent_title] => KEY THROTTLING TO MITIGATE UNAUTHORIZED FILE ACCESS
[patent_app_type] => utility
[patent_app_number] => 16/589489
[patent_app_country] => US
[patent_app_date] => 2019-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 39402
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16589489
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/589489 | Key throttling to mitigate unauthorized file access | Sep 30, 2019 | Issued |
Array
(
[id] => 15371625
[patent_doc_number] => 20200021577
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-16
[patent_title] => CONTAINER INDEPENDENT SECURE FILE SYSTEM FOR SECURITY APPLICATION CONTAINERS
[patent_app_type] => utility
[patent_app_number] => 16/583321
[patent_app_country] => US
[patent_app_date] => 2019-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4785
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16583321
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/583321 | Container independent secure file system for security application containers | Sep 25, 2019 | Issued |
Array
(
[id] => 15353591
[patent_doc_number] => 20200014687
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-09
[patent_title] => IDENTIFYING ACCOUNTS HAVING SHARED CREDENTIALS
[patent_app_type] => utility
[patent_app_number] => 16/576006
[patent_app_country] => US
[patent_app_date] => 2019-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8874
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16576006
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/576006 | Identifying accounts having shared credentials | Sep 18, 2019 | Issued |
Array
(
[id] => 17788802
[patent_doc_number] => 11411948
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-09
[patent_title] => Systems and methods for applying attestation tokens to LISP messages
[patent_app_type] => utility
[patent_app_number] => 16/574771
[patent_app_country] => US
[patent_app_date] => 2019-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 12423
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16574771
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/574771 | Systems and methods for applying attestation tokens to LISP messages | Sep 17, 2019 | Issued |
Array
(
[id] => 16003493
[patent_doc_number] => 20200177617
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-04
[patent_title] => GENERATING ATTACK GRAPHS IN AGILE SECURITY PLATFORMS
[patent_app_type] => utility
[patent_app_number] => 16/554833
[patent_app_country] => US
[patent_app_date] => 2019-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12633
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16554833
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/554833 | Generating attack graphs in agile security platforms | Aug 28, 2019 | Issued |
Array
(
[id] => 18155075
[patent_doc_number] => 11568055
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-31
[patent_title] => System and method for automatically detecting a security vulnerability in a source code using a machine learning model
[patent_app_type] => utility
[patent_app_number] => 16/549019
[patent_app_country] => US
[patent_app_date] => 2019-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7010
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16549019
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/549019 | System and method for automatically detecting a security vulnerability in a source code using a machine learning model | Aug 22, 2019 | Issued |
Array
(
[id] => 18155094
[patent_doc_number] => 11568074
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-31
[patent_title] => Memory system
[patent_app_type] => utility
[patent_app_number] => 16/549506
[patent_app_country] => US
[patent_app_date] => 2019-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 18
[patent_no_of_words] => 12780
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16549506
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/549506 | Memory system | Aug 22, 2019 | Issued |
Array
(
[id] => 16661764
[patent_doc_number] => 20210058401
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-25
[patent_title] => METHODS AND APPARATUS TO DECONFLICT MALWARE OR CONTENT REMEDIATION
[patent_app_type] => utility
[patent_app_number] => 16/547250
[patent_app_country] => US
[patent_app_date] => 2019-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16471
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16547250
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/547250 | Methods and apparatus to deconflict malware or content remediation | Aug 20, 2019 | Issued |
Array
(
[id] => 18132205
[patent_doc_number] => 11558425
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-17
[patent_title] => Dynamic access controls using verifiable claims
[patent_app_type] => utility
[patent_app_number] => 16/527425
[patent_app_country] => US
[patent_app_date] => 2019-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4783
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16527425
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/527425 | Dynamic access controls using verifiable claims | Jul 30, 2019 | Issued |
Array
(
[id] => 15047891
[patent_doc_number] => 20190334950
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-31
[patent_title] => PRIVATE KEY OPERATIONS
[patent_app_type] => utility
[patent_app_number] => 16/506046
[patent_app_country] => US
[patent_app_date] => 2019-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17650
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16506046
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/506046 | PRIVATE KEY OPERATIONS | Jul 8, 2019 | Abandoned |
Array
(
[id] => 17425336
[patent_doc_number] => 11258806
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-02-22
[patent_title] => System and method for automatically associating cybersecurity intelligence to cyberthreat actors
[patent_app_type] => utility
[patent_app_number] => 16/450579
[patent_app_country] => US
[patent_app_date] => 2019-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9720
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16450579
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/450579 | System and method for automatically associating cybersecurity intelligence to cyberthreat actors | Jun 23, 2019 | Issued |
Array
(
[id] => 16411119
[patent_doc_number] => 10819693
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-27
[patent_title] => Disposable browsers and authentication techniques for a secure online user environment
[patent_app_type] => utility
[patent_app_number] => 16/450866
[patent_app_country] => US
[patent_app_date] => 2019-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11535
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 228
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16450866
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/450866 | Disposable browsers and authentication techniques for a secure online user environment | Jun 23, 2019 | Issued |
Array
(
[id] => 15258267
[patent_doc_number] => 20190377867
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-12
[patent_title] => THREAT MITIGATION SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 16/433032
[patent_app_country] => US
[patent_app_date] => 2019-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21240
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16433032
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/433032 | Threat mitigation system and method | Jun 5, 2019 | Issued |
Array
(
[id] => 16488942
[patent_doc_number] => 20200382557
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-03
[patent_title] => Reliability Prediction for Cloud Security Policies
[patent_app_type] => utility
[patent_app_number] => 16/428858
[patent_app_country] => US
[patent_app_date] => 2019-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8685
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16428858
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/428858 | Reliability prediction for cloud security policies | May 30, 2019 | Issued |
Array
(
[id] => 15367907
[patent_doc_number] => 20200019718
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-16
[patent_title] => Method for managing the access authority to cloud storage and the system therefor
[patent_app_type] => utility
[patent_app_number] => 16/423170
[patent_app_country] => US
[patent_app_date] => 2019-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 23577
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -42
[patent_words_short_claim] => 302
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16423170
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/423170 | Method for managing the access authority to cloud storage and the system therefor | May 27, 2019 | Issued |
Array
(
[id] => 14841079
[patent_doc_number] => 20190278940
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-12
[patent_title] => DATA PROTECTION BASED ON USER INPUT DURING DEVICE BOOT-UP, USER LOGIN, AND DEVICE SHUT-DOWN STATES
[patent_app_type] => utility
[patent_app_number] => 16/423746
[patent_app_country] => US
[patent_app_date] => 2019-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17960
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 228
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16423746
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/423746 | Data protection based on user input during device boot-up, user login, and device shut-down states | May 27, 2019 | Issued |