
Thomas Ho
Examiner (ID: 4713, Phone: (571)270-7862 , Office: P/2494 )
| Most Active Art Unit | 2494 |
| Art Unit(s) | 2494, 2134, 2132 |
| Total Applications | 419 |
| Issued Applications | 325 |
| Pending Applications | 5 |
| Abandoned Applications | 92 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9934233
[patent_doc_number] => 20150082425
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-19
[patent_title] => 'SECURING ACCESSIBLE SYSTEMS USING BASE FUNCTION ENCODING'
[patent_app_type] => utility
[patent_app_number] => 14/389361
[patent_app_country] => US
[patent_app_date] => 2013-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 26
[patent_no_of_words] => 20363
[patent_no_of_claims] => 56
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14389361
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/389361 | Securing accessible systems using base function encoding | Mar 27, 2013 | Issued |
Array
(
[id] => 8952660
[patent_doc_number] => 20130198441
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-01
[patent_title] => 'SEMICONDUCTOR DEVICE WITH COPYRIGHT PROTECTION FUNCTION'
[patent_app_type] => utility
[patent_app_number] => 13/795484
[patent_app_country] => US
[patent_app_date] => 2013-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 10962
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13795484
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/795484 | Semiconductor device with copyright protection function | Mar 11, 2013 | Issued |
Array
(
[id] => 9871840
[patent_doc_number] => 08959632
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-17
[patent_title] => 'Safely executing an untrusted native code module on a computing device'
[patent_app_type] => utility
[patent_app_number] => 13/787616
[patent_app_country] => US
[patent_app_date] => 2013-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 13429
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13787616
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/787616 | Safely executing an untrusted native code module on a computing device | Mar 5, 2013 | Issued |
Array
(
[id] => 9808216
[patent_doc_number] => 20150020161
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-15
[patent_title] => 'REVERES ACCESS METHOD FOR SECURING FRONT-END APPLICATIONS AND OTHERS'
[patent_app_type] => utility
[patent_app_number] => 14/379305
[patent_app_country] => US
[patent_app_date] => 2013-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1299
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14379305
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/379305 | Reverse access method for securing front-end applications and others | Feb 12, 2013 | Issued |
Array
(
[id] => 10969719
[patent_doc_number] => 20140372752
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-18
[patent_title] => 'METHOD AND DATABASE SYSTEM FOR SECURE STORAGE AND COMMUNICATION OF INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 14/376396
[patent_app_country] => US
[patent_app_date] => 2013-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 13683
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14376396
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/376396 | METHOD AND DATABASE SYSTEM FOR SECURE STORAGE AND COMMUNICATION OF INFORMATION | Jan 31, 2013 | Abandoned |
Array
(
[id] => 10901830
[patent_doc_number] => 08925076
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-30
[patent_title] => 'Application-specific re-adjustment of computer security settings'
[patent_app_type] => utility
[patent_app_number] => 13/711195
[patent_app_country] => US
[patent_app_date] => 2012-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8689
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13711195
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/711195 | Application-specific re-adjustment of computer security settings | Dec 10, 2012 | Issued |
Array
(
[id] => 11786920
[patent_doc_number] => 09396357
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-19
[patent_title] => 'Physically unclonable function (PUF) with improved error correction'
[patent_app_type] => utility
[patent_app_number] => 14/360519
[patent_app_country] => US
[patent_app_date] => 2012-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 13
[patent_no_of_words] => 14645
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14360519
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/360519 | Physically unclonable function (PUF) with improved error correction | Nov 22, 2012 | Issued |
Array
(
[id] => 9102707
[patent_doc_number] => 08566601
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-10-22
[patent_title] => 'Systems and methods for functional encryption using a string of arbitrary length'
[patent_app_type] => utility
[patent_app_number] => 13/610864
[patent_app_country] => US
[patent_app_date] => 2012-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7925
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 276
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13610864
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/610864 | Systems and methods for functional encryption using a string of arbitrary length | Sep 11, 2012 | Issued |
Array
(
[id] => 10526631
[patent_doc_number] => 09253157
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-02
[patent_title] => 'Dynamically defining rules for network access'
[patent_app_type] => utility
[patent_app_number] => 13/450433
[patent_app_country] => US
[patent_app_date] => 2012-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 4526
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 188
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13450433
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/450433 | Dynamically defining rules for network access | Apr 17, 2012 | Issued |
Array
(
[id] => 11306891
[patent_doc_number] => 09514290
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-12-06
[patent_title] => 'Authorization cache'
[patent_app_type] => utility
[patent_app_number] => 14/371665
[patent_app_country] => US
[patent_app_date] => 2012-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 6001
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14371665
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/371665 | Authorization cache | Mar 29, 2012 | Issued |
Array
(
[id] => 10582819
[patent_doc_number] => 09304944
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-05
[patent_title] => 'Secure memory access controller'
[patent_app_type] => utility
[patent_app_number] => 13/434556
[patent_app_country] => US
[patent_app_date] => 2012-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 5347
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13434556
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/434556 | Secure memory access controller | Mar 28, 2012 | Issued |
Array
(
[id] => 9044580
[patent_doc_number] => 20130247218
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-19
[patent_title] => 'System And Method For Verifying Authenticity Of Documents'
[patent_app_type] => utility
[patent_app_number] => 13/989815
[patent_app_country] => US
[patent_app_date] => 2011-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6345
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13989815
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/989815 | System And Method For Verifying Authenticity Of Documents | Dec 1, 2011 | Abandoned |
Array
(
[id] => 10545320
[patent_doc_number] => 09270465
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-23
[patent_title] => 'Control word protection'
[patent_app_type] => utility
[patent_app_number] => 13/990762
[patent_app_country] => US
[patent_app_date] => 2011-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 18
[patent_no_of_words] => 16051
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 298
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13990762
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/990762 | Control word protection | Nov 29, 2011 | Issued |
Array
(
[id] => 10513302
[patent_doc_number] => 09240883
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-19
[patent_title] => 'Multi-key cryptography for encrypting file system acceleration'
[patent_app_type] => utility
[patent_app_number] => 13/292883
[patent_app_country] => US
[patent_app_date] => 2011-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5266
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13292883
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/292883 | Multi-key cryptography for encrypting file system acceleration | Nov 8, 2011 | Issued |
Array
(
[id] => 9540493
[patent_doc_number] => 20140165140
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-12
[patent_title] => 'SYSTEMS AND METHODS FOR EVALUATION OF EVENTS BASED ON A REFERENCE BASELINE ACCORDING TO TEMPORAL POSITION IN A SEQUENCE OF EVENTS'
[patent_app_type] => utility
[patent_app_number] => 14/239885
[patent_app_country] => US
[patent_app_date] => 2011-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8299
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14239885
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/239885 | Systems and methods for evaluation of events based on a reference baseline according to temporal position in a sequence of events | Oct 19, 2011 | Issued |
Array
(
[id] => 7759326
[patent_doc_number] => 20120030187
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-02
[patent_title] => 'SYSTEM, METHOD AND APPARATUS FOR TRACKING DIGITAL CONTENT OBJECTS'
[patent_app_type] => utility
[patent_app_number] => 13/185192
[patent_app_country] => US
[patent_app_date] => 2011-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 13250
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0030/20120030187.pdf
[firstpage_image] =>[orig_patent_app_number] => 13185192
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/185192 | SYSTEM, METHOD AND APPARATUS FOR TRACKING DIGITAL CONTENT OBJECTS | Jul 17, 2011 | Abandoned |
Array
(
[id] => 8479227
[patent_doc_number] => 20120278634
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-11-01
[patent_title] => 'METHOD AND APPARATUS FOR SECURE ACCESS TO EXECUTION CONTEXT'
[patent_app_type] => utility
[patent_app_number] => 13/156832
[patent_app_country] => US
[patent_app_date] => 2011-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 17831
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13156832
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/156832 | METHOD AND APPARATUS FOR SECURE ACCESS TO EXECUTION CONTEXT | Jun 8, 2011 | Abandoned |
Array
(
[id] => 11265218
[patent_doc_number] => 09489515
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-08
[patent_title] => 'System and method for blocking the transmission of sensitive data using dynamic data tainting'
[patent_app_type] => utility
[patent_app_number] => 13/156952
[patent_app_country] => US
[patent_app_date] => 2011-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7007
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13156952
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/156952 | System and method for blocking the transmission of sensitive data using dynamic data tainting | Jun 8, 2011 | Issued |
Array
(
[id] => 10041253
[patent_doc_number] => 09081961
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-14
[patent_title] => 'System and method for analyzing malicious code using a static analyzer'
[patent_app_type] => utility
[patent_app_number] => 13/156971
[patent_app_country] => US
[patent_app_date] => 2011-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9075
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13156971
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/156971 | System and method for analyzing malicious code using a static analyzer | Jun 8, 2011 | Issued |
Array
(
[id] => 10526630
[patent_doc_number] => 09253156
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-02
[patent_title] => 'Dynamically defining network access rules'
[patent_app_type] => utility
[patent_app_number] => 13/157199
[patent_app_country] => US
[patent_app_date] => 2011-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 4498
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13157199
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/157199 | Dynamically defining network access rules | Jun 8, 2011 | Issued |