
Thomas Ho
Examiner (ID: 4713, Phone: (571)270-7862 , Office: P/2494 )
| Most Active Art Unit | 2494 |
| Art Unit(s) | 2494, 2134, 2132 |
| Total Applications | 419 |
| Issued Applications | 325 |
| Pending Applications | 5 |
| Abandoned Applications | 92 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9770513
[patent_doc_number] => 20140294176
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-02
[patent_title] => 'GENERATING DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, GENERATING METHOD, ENCRYPTION METHOD, DECRYPTION METHOD, AND COMPUTER PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 14/163243
[patent_app_country] => US
[patent_app_date] => 2014-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 12674
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14163243
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/163243 | Generating device, encryption device, decryption device, generating method, encryption method, decryption method, and computer program product | Jan 23, 2014 | Issued |
Array
(
[id] => 14646061
[patent_doc_number] => 10367787
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-30
[patent_title] => Intelligent firewall access rules
[patent_app_type] => utility
[patent_app_number] => 15/038388
[patent_app_country] => US
[patent_app_date] => 2013-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7487
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15038388
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/038388 | Intelligent firewall access rules | Dec 19, 2013 | Issued |
Array
(
[id] => 9386577
[patent_doc_number] => 20140090060
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-27
[patent_title] => 'TRUSTED NETWORK INTERFACE'
[patent_app_type] => utility
[patent_app_number] => 14/092665
[patent_app_country] => US
[patent_app_date] => 2013-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4803
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14092665
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/092665 | TRUSTED NETWORK INTERFACE | Nov 26, 2013 | Abandoned |
Array
(
[id] => 10081196
[patent_doc_number] => 09119063
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-25
[patent_title] => 'Unauthorized location detection and countermeasures'
[patent_app_type] => utility
[patent_app_number] => 14/070899
[patent_app_country] => US
[patent_app_date] => 2013-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6786
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 258
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14070899
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/070899 | Unauthorized location detection and countermeasures | Nov 3, 2013 | Issued |
Array
(
[id] => 11786912
[patent_doc_number] => 09396349
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-07-19
[patent_title] => 'Method and apparatus for sharing data from a secured environment'
[patent_app_type] => utility
[patent_app_number] => 14/071254
[patent_app_country] => US
[patent_app_date] => 2013-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 9493
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14071254
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/071254 | Method and apparatus for sharing data from a secured environment | Nov 3, 2013 | Issued |
Array
(
[id] => 11803222
[patent_doc_number] => 09544153
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-01-10
[patent_title] => 'Compression of cryptographic chaining certificates'
[patent_app_type] => utility
[patent_app_number] => 14/070397
[patent_app_country] => US
[patent_app_date] => 2013-11-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6779
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14070397
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/070397 | Compression of cryptographic chaining certificates | Oct 31, 2013 | Issued |
Array
(
[id] => 10342718
[patent_doc_number] => 20150227723
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-13
[patent_title] => 'FLEXIBLE LICENSING ARCHITECTURE'
[patent_app_type] => utility
[patent_app_number] => 14/369091
[patent_app_country] => US
[patent_app_date] => 2013-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3796
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14369091
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/369091 | Flexible licensing architecture | Sep 26, 2013 | Issued |
Array
(
[id] => 11035409
[patent_doc_number] => 20160232366
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'SYSTEMS AND METHODS FOR VERIFICATION AND DEPLOYMENT OF APPLICATIONS TO PROGRAMMABLE DEVICES'
[patent_app_type] => utility
[patent_app_number] => 15/022855
[patent_app_country] => US
[patent_app_date] => 2013-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7907
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15022855
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/022855 | Systems and methods for verification and deployment of applications to programmable devices | Sep 19, 2013 | Issued |
Array
(
[id] => 9808212
[patent_doc_number] => 20150020158
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-15
[patent_title] => 'SHARED SECRET TECHNIQUES FOR UBIQUITOUS COMPUTING DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/358146
[patent_app_country] => US
[patent_app_date] => 2013-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7700
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14358146
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/358146 | Shared secret techniques for ubiquitous computing devices | Jul 8, 2013 | Issued |
| 13/908000 | PRE-PROCESSOR FOR PHYSICAL LAYER SECURITY | Jun 2, 2013 | Abandoned |
Array
(
[id] => 9999314
[patent_doc_number] => 09043931
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-05-26
[patent_title] => 'USB drive with multiple printed circuit board layers for storing data in a memory'
[patent_app_type] => utility
[patent_app_number] => 13/986739
[patent_app_country] => US
[patent_app_date] => 2013-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 9491
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13986739
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/986739 | USB drive with multiple printed circuit board layers for storing data in a memory | May 30, 2013 | Issued |
Array
(
[id] => 15671235
[patent_doc_number] => 10599850
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-24
[patent_title] => Distributed security agent technology
[patent_app_type] => utility
[patent_app_number] => 13/907600
[patent_app_country] => US
[patent_app_date] => 2013-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4038
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 263
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13907600
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/907600 | Distributed security agent technology | May 30, 2013 | Issued |
Array
(
[id] => 10956764
[patent_doc_number] => 20140359786
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-04
[patent_title] => 'MATCHED CONTENT USE RESTRICTION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/906915
[patent_app_country] => US
[patent_app_date] => 2013-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7580
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13906915
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/906915 | Matched content use restriction system | May 30, 2013 | Issued |
Array
(
[id] => 9493136
[patent_doc_number] => 20140143542
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-22
[patent_title] => 'Method and Apparatus for Managing Encrypted Folders in Network System'
[patent_app_type] => utility
[patent_app_number] => 13/905145
[patent_app_country] => US
[patent_app_date] => 2013-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3000
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13905145
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/905145 | Method and Apparatus for Managing Encrypted Folders in Network System | May 29, 2013 | Abandoned |
Array
(
[id] => 11412744
[patent_doc_number] => 09560069
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-01-31
[patent_title] => 'Method and system for protection of messages in an electronic messaging system'
[patent_app_type] => utility
[patent_app_number] => 13/905913
[patent_app_country] => US
[patent_app_date] => 2013-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 20
[patent_no_of_words] => 16687
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13905913
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/905913 | Method and system for protection of messages in an electronic messaging system | May 29, 2013 | Issued |
Array
(
[id] => 10653213
[patent_doc_number] => 09369488
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-06-14
[patent_title] => 'Policy enforcement using natural language processing'
[patent_app_type] => utility
[patent_app_number] => 13/903332
[patent_app_country] => US
[patent_app_date] => 2013-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 7854
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13903332
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/903332 | Policy enforcement using natural language processing | May 27, 2013 | Issued |
Array
(
[id] => 9096834
[patent_doc_number] => 20130276145
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-17
[patent_title] => 'METHOD AND SYSTEM FOR REGISTERING A PRESENCE USER WITH A PRESENCE SERVICE'
[patent_app_type] => utility
[patent_app_number] => 13/899690
[patent_app_country] => US
[patent_app_date] => 2013-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 6085
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13899690
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/899690 | METHOD AND SYSTEM FOR REGISTERING A PRESENCE USER WITH A PRESENCE SERVICE | May 21, 2013 | Abandoned |
Array
(
[id] => 9289717
[patent_doc_number] => 08646076
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-02-04
[patent_title] => 'Method and apparatus for detecting malicious shell codes using debugging events'
[patent_app_type] => utility
[patent_app_number] => 13/875421
[patent_app_country] => US
[patent_app_date] => 2013-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6854
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 307
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13875421
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/875421 | Method and apparatus for detecting malicious shell codes using debugging events | May 1, 2013 | Issued |
Array
(
[id] => 10023728
[patent_doc_number] => 09066234
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-23
[patent_title] => 'Owner privacy in a shared mobile device'
[patent_app_type] => utility
[patent_app_number] => 13/875139
[patent_app_country] => US
[patent_app_date] => 2013-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7422
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13875139
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/875139 | Owner privacy in a shared mobile device | Apr 30, 2013 | Issued |
Array
(
[id] => 10726701
[patent_doc_number] => 20160072850
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'METHOD AND SWITCH FOR LAWFUL INTERCEPTION'
[patent_app_type] => utility
[patent_app_number] => 14/785221
[patent_app_country] => US
[patent_app_date] => 2013-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8309
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14785221
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/785221 | Method and switch for lawful interception | Apr 18, 2013 | Issued |