
Thomas Ho
Examiner (ID: 4713, Phone: (571)270-7862 , Office: P/2494 )
| Most Active Art Unit | 2494 |
| Art Unit(s) | 2494, 2134, 2132 |
| Total Applications | 419 |
| Issued Applications | 325 |
| Pending Applications | 5 |
| Abandoned Applications | 92 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14524071
[patent_doc_number] => 10339299
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-07-02
[patent_title] => Runtime management of application components
[patent_app_type] => utility
[patent_app_number] => 15/451678
[patent_app_country] => US
[patent_app_date] => 2017-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 31486
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15451678
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/451678 | Runtime management of application components | Mar 6, 2017 | Issued |
Array
(
[id] => 14431491
[patent_doc_number] => 10320565
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-11
[patent_title] => Generating an elliptic curve point in an elliptic curve cryptographic system
[patent_app_type] => utility
[patent_app_number] => 15/445888
[patent_app_country] => US
[patent_app_date] => 2017-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 10229
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15445888
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/445888 | Generating an elliptic curve point in an elliptic curve cryptographic system | Feb 27, 2017 | Issued |
Array
(
[id] => 14096133
[patent_doc_number] => 10243992
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-26
[patent_title] => Secure content delivery over a domain portal
[patent_app_type] => utility
[patent_app_number] => 15/425974
[patent_app_country] => US
[patent_app_date] => 2017-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 12771
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15425974
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/425974 | Secure content delivery over a domain portal | Feb 5, 2017 | Issued |
Array
(
[id] => 11824086
[patent_doc_number] => 20170213023
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-27
[patent_title] => 'Application Trust Listing Service'
[patent_app_type] => utility
[patent_app_number] => 15/424507
[patent_app_country] => US
[patent_app_date] => 2017-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6026
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15424507
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/424507 | Application Trust Listing Service | Feb 2, 2017 | Abandoned |
Array
(
[id] => 12163552
[patent_doc_number] => 20180034818
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'SYSTEMS AND METHODS TO MANAGE MEDIA CONTENT ITEMS'
[patent_app_type] => utility
[patent_app_number] => 15/421428
[patent_app_country] => US
[patent_app_date] => 2017-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 19614
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15421428
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/421428 | Systems and methods to manage media content items | Jan 30, 2017 | Issued |
Array
(
[id] => 15172207
[patent_doc_number] => 10491623
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-26
[patent_title] => Social network security monitoring
[patent_app_type] => utility
[patent_app_number] => 15/401691
[patent_app_country] => US
[patent_app_date] => 2017-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6518
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 372
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15401691
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/401691 | Social network security monitoring | Jan 8, 2017 | Issued |
Array
(
[id] => 15172183
[patent_doc_number] => 10491611
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-26
[patent_title] => Method and protection apparatus to prevent malicious information communication in IP networks by exploiting benign networking protocols
[patent_app_type] => utility
[patent_app_number] => 15/400743
[patent_app_country] => US
[patent_app_date] => 2017-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12204
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15400743
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/400743 | Method and protection apparatus to prevent malicious information communication in IP networks by exploiting benign networking protocols | Jan 5, 2017 | Issued |
Array
(
[id] => 13809587
[patent_doc_number] => 10182064
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-01-15
[patent_title] => Prioritizing the scanning of messages using the reputation of the message destinations
[patent_app_type] => utility
[patent_app_number] => 15/396659
[patent_app_country] => US
[patent_app_date] => 2016-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 20
[patent_no_of_words] => 16267
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15396659
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/396659 | Prioritizing the scanning of messages using the reputation of the message destinations | Dec 30, 2016 | Issued |
Array
(
[id] => 12899764
[patent_doc_number] => 20180191763
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-05
[patent_title] => SYSTEM AND METHOD FOR DETERMINING NETWORK SECURITY THREATS
[patent_app_type] => utility
[patent_app_number] => 15/396273
[patent_app_country] => US
[patent_app_date] => 2016-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7349
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15396273
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/396273 | System and method for determining network security threats | Dec 29, 2016 | Issued |
Array
(
[id] => 14740671
[patent_doc_number] => 10389752
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-20
[patent_title] => Price mining prevention systems and related methods
[patent_app_type] => utility
[patent_app_number] => 15/379137
[patent_app_country] => US
[patent_app_date] => 2016-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7430
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15379137
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/379137 | Price mining prevention systems and related methods | Dec 13, 2016 | Issued |
Array
(
[id] => 14331423
[patent_doc_number] => 10296732
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-05-21
[patent_title] => Computer software product grant management system
[patent_app_type] => utility
[patent_app_number] => 15/364826
[patent_app_country] => US
[patent_app_date] => 2016-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 71
[patent_figures_cnt] => 77
[patent_no_of_words] => 28486
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 333
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15364826
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/364826 | Computer software product grant management system | Nov 29, 2016 | Issued |
Array
(
[id] => 14705197
[patent_doc_number] => 10380348
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-13
[patent_title] => IoT device risk assessment
[patent_app_type] => utility
[patent_app_number] => 15/357989
[patent_app_country] => US
[patent_app_date] => 2016-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 30035
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15357989
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/357989 | IoT device risk assessment | Nov 20, 2016 | Issued |
Array
(
[id] => 15705265
[patent_doc_number] => 10608827
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-31
[patent_title] => Systems and methods for computer digital certificate management and analysis
[patent_app_type] => utility
[patent_app_number] => 15/355780
[patent_app_country] => US
[patent_app_date] => 2016-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 4573
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15355780
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/355780 | Systems and methods for computer digital certificate management and analysis | Nov 17, 2016 | Issued |
Array
(
[id] => 11682287
[patent_doc_number] => 09680838
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-06-13
[patent_title] => 'System and method for communicating with inmates in privileged communication'
[patent_app_type] => utility
[patent_app_number] => 15/354417
[patent_app_country] => US
[patent_app_date] => 2016-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7862
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15354417
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/354417 | System and method for communicating with inmates in privileged communication | Nov 16, 2016 | Issued |
Array
(
[id] => 14179483
[patent_doc_number] => 10263768
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-16
[patent_title] => Protection of a calculation against side-channel attacks
[patent_app_type] => utility
[patent_app_number] => 15/354016
[patent_app_country] => US
[patent_app_date] => 2016-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 3141
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15354016
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/354016 | Protection of a calculation against side-channel attacks | Nov 16, 2016 | Issued |
Array
(
[id] => 11405642
[patent_doc_number] => 20170026180
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-26
[patent_title] => 'METHOD AND DATABASE SYSTEM FOR SECURE STORAGE AND COMMUNICATION OF INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 15/288161
[patent_app_country] => US
[patent_app_date] => 2016-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 13684
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15288161
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/288161 | METHOD AND DATABASE SYSTEM FOR SECURE STORAGE AND COMMUNICATION OF INFORMATION | Oct 6, 2016 | Abandoned |
Array
(
[id] => 12618015
[patent_doc_number] => 20180097835
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-05
[patent_title] => IDENTIFYING AND USING DNS CONTEXTUAL FLOWS
[patent_app_type] => utility
[patent_app_number] => 15/285805
[patent_app_country] => US
[patent_app_date] => 2016-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5451
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15285805
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/285805 | Identifying and using DNS contextual flows | Oct 4, 2016 | Issued |
Array
(
[id] => 12612201
[patent_doc_number] => 20180095897
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-05
[patent_title] => TECHNIQUES TO PROTECT FUSES AGAINST NON-DESTRUCTIVE ATTACKS
[patent_app_type] => utility
[patent_app_number] => 15/283087
[patent_app_country] => US
[patent_app_date] => 2016-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8294
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15283087
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/283087 | Techniques to protect fuses against non-destructive attacks | Sep 29, 2016 | Issued |
Array
(
[id] => 11398871
[patent_doc_number] => 20170019408
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-19
[patent_title] => 'AUTHORIZATION POLICY OBJECTS SHARABLE ACROSS APPLICATIONS, PERSISTENCE MODEL, AND APPLICATION-LEVEL DECISION-COMBINING ALGORITHM'
[patent_app_type] => utility
[patent_app_number] => 15/278902
[patent_app_country] => US
[patent_app_date] => 2016-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 16033
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15278902
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/278902 | Authorization policy objects sharable across applications, persistence model, and application-level decision-combining algorithm | Sep 27, 2016 | Issued |
Array
(
[id] => 12956536
[patent_doc_number] => 09838355
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-12-05
[patent_title] => Collaborative analytics for independently administered network domains
[patent_app_type] => utility
[patent_app_number] => 15/276072
[patent_app_country] => US
[patent_app_date] => 2016-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 4573
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15276072
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/276072 | Collaborative analytics for independently administered network domains | Sep 25, 2016 | Issued |