
Bo Bin Jang
Examiner (ID: 6298)
| Most Active Art Unit | 2894 |
| Art Unit(s) | 2818, 2894 |
| Total Applications | 751 |
| Issued Applications | 618 |
| Pending Applications | 75 |
| Abandoned Applications | 74 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17230939
[patent_doc_number] => 20210357496
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-18
[patent_title] => DATA TRANSFER IN SECURE PROCESSING ENVIRONMENTS
[patent_app_type] => utility
[patent_app_number] => 16/320022
[patent_app_country] => US
[patent_app_date] => 2018-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 29005
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16320022
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/320022 | Data transfer in secure processing environments | Mar 20, 2018 | Issued |
Array
(
[id] => 13304959
[patent_doc_number] => 20180204016
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-19
[patent_title] => MANDATORY ACCESS CONTROL METHOD AND APPARATUS, AND PHYSICAL HOST
[patent_app_type] => utility
[patent_app_number] => 15/920007
[patent_app_country] => US
[patent_app_date] => 2018-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13995
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15920007
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/920007 | Mandatory access control method and apparatus, and physical host | Mar 12, 2018 | Issued |
Array
(
[id] => 12920917
[patent_doc_number] => 20180198815
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-12
[patent_title] => COMPUTER ASSET VULNERABILITIES
[patent_app_type] => utility
[patent_app_number] => 15/913219
[patent_app_country] => US
[patent_app_date] => 2018-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14532
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15913219
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/913219 | Computer asset vulnerabilities | Mar 5, 2018 | Issued |
Array
(
[id] => 16338382
[patent_doc_number] => 10789341
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-29
[patent_title] => Method and a device for recognizing an individual by biometric signature
[patent_app_type] => utility
[patent_app_number] => 15/905480
[patent_app_country] => US
[patent_app_date] => 2018-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 4439
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 208
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15905480
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/905480 | Method and a device for recognizing an individual by biometric signature | Feb 25, 2018 | Issued |
Array
(
[id] => 15582823
[patent_doc_number] => 10581817
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-03
[patent_title] => Digital security bubble
[patent_app_type] => utility
[patent_app_number] => 15/905242
[patent_app_country] => US
[patent_app_date] => 2018-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 4885
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15905242
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/905242 | Digital security bubble | Feb 25, 2018 | Issued |
Array
(
[id] => 16263528
[patent_doc_number] => 10754963
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-25
[patent_title] => Secure zones in knowledge graph
[patent_app_type] => utility
[patent_app_number] => 15/904531
[patent_app_country] => US
[patent_app_date] => 2018-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 16
[patent_no_of_words] => 7920
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 280
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15904531
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/904531 | Secure zones in knowledge graph | Feb 25, 2018 | Issued |
Array
(
[id] => 14786539
[patent_doc_number] => 20190268167
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-29
[patent_title] => PROVIDING INTER-ENTERPRISE DATA COMMUNICATIONS BETWEEN ENTERPRISE APPLICATIONS ON AN ELECTRONIC DEVICE
[patent_app_type] => utility
[patent_app_number] => 15/905394
[patent_app_country] => US
[patent_app_date] => 2018-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9797
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15905394
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/905394 | Providing inter-enterprise data communications between enterprise applications on an electronic device | Feb 25, 2018 | Issued |
Array
(
[id] => 16836455
[patent_doc_number] => 11012722
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-18
[patent_title] => System and method for securely transferring data
[patent_app_type] => utility
[patent_app_number] => 15/902259
[patent_app_country] => US
[patent_app_date] => 2018-02-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 13595
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15902259
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/902259 | System and method for securely transferring data | Feb 21, 2018 | Issued |
Array
(
[id] => 14922523
[patent_doc_number] => 10432597
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-10-01
[patent_title] => Digital security bubble
[patent_app_type] => utility
[patent_app_number] => 15/900897
[patent_app_country] => US
[patent_app_date] => 2018-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 4865
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15900897
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/900897 | Digital security bubble | Feb 20, 2018 | Issued |
Array
(
[id] => 15298035
[patent_doc_number] => 20190392153
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-26
[patent_title] => Method and System for Verifying a Data Erasure Process
[patent_app_type] => utility
[patent_app_number] => 16/481416
[patent_app_country] => US
[patent_app_date] => 2018-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8966
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16481416
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/481416 | Method and system for verifying a data erasure process | Feb 1, 2018 | Issued |
Array
(
[id] => 16654485
[patent_doc_number] => 10931686
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-02-23
[patent_title] => Detection of automated requests using session identifiers
[patent_app_type] => utility
[patent_app_number] => 15/886628
[patent_app_country] => US
[patent_app_date] => 2018-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10854
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15886628
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/886628 | Detection of automated requests using session identifiers | Jan 31, 2018 | Issued |
Array
(
[id] => 14678873
[patent_doc_number] => 20190238551
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-01
[patent_title] => Access Control in a Content Management System
[patent_app_type] => utility
[patent_app_number] => 15/885642
[patent_app_country] => US
[patent_app_date] => 2018-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5894
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15885642
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/885642 | Access control in a content management system | Jan 30, 2018 | Issued |
Array
(
[id] => 12781804
[patent_doc_number] => 20180152437
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-31
[patent_title] => Communication Terminal, Communication Method, Program, and Communication System
[patent_app_type] => utility
[patent_app_number] => 15/882093
[patent_app_country] => US
[patent_app_date] => 2018-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15288
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 53
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15882093
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/882093 | Communication terminal, communication method, and communication system | Jan 28, 2018 | Issued |
Array
(
[id] => 13809355
[patent_doc_number] => 10181948
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-01-15
[patent_title] => Secure storage of hashes within a distributed ledger
[patent_app_type] => utility
[patent_app_number] => 15/880209
[patent_app_country] => US
[patent_app_date] => 2018-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 8222
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15880209
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/880209 | Secure storage of hashes within a distributed ledger | Jan 24, 2018 | Issued |
Array
(
[id] => 18291503
[patent_doc_number] => 11620373
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-04-04
[patent_title] => Authentication protection system and method based on trusted environment, and storage medium
[patent_app_type] => utility
[patent_app_number] => 16/627871
[patent_app_country] => US
[patent_app_date] => 2018-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 5239
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16627871
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/627871 | Authentication protection system and method based on trusted environment, and storage medium | Jan 14, 2018 | Issued |
Array
(
[id] => 16271281
[patent_doc_number] => 20200272769
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-27
[patent_title] => METHODS AND APPARATUS FOR PERFORMING SECURE BACK-UP AND RESTORE
[patent_app_type] => utility
[patent_app_number] => 16/476585
[patent_app_country] => US
[patent_app_date] => 2018-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4125
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16476585
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/476585 | Methods and apparatus for performing secure back-up and restore | Jan 8, 2018 | Issued |
Array
(
[id] => 16357537
[patent_doc_number] => 10798064
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-10-06
[patent_title] => Proxy computer system to provide encryption as a service
[patent_app_type] => utility
[patent_app_number] => 15/853618
[patent_app_country] => US
[patent_app_date] => 2017-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10629
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15853618
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/853618 | Proxy computer system to provide encryption as a service | Dec 21, 2017 | Issued |
Array
(
[id] => 13244775
[patent_doc_number] => 10135608
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-20
[patent_title] => Modifying a content descriptor to facilitate delivery of token-authorized encrypted data
[patent_app_type] => utility
[patent_app_number] => 15/832770
[patent_app_country] => US
[patent_app_date] => 2017-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5956
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15832770
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/832770 | Modifying a content descriptor to facilitate delivery of token-authorized encrypted data | Dec 4, 2017 | Issued |
Array
(
[id] => 16325276
[patent_doc_number] => 10785258
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-22
[patent_title] => Counter intelligence bot
[patent_app_type] => utility
[patent_app_number] => 15/828643
[patent_app_country] => US
[patent_app_date] => 2017-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 15031
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15828643
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/828643 | Counter intelligence bot | Nov 30, 2017 | Issued |
Array
(
[id] => 13807525
[patent_doc_number] => 10181029
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-01-15
[patent_title] => Security cloud service framework for hardening in the field code of mobile software applications
[patent_app_type] => utility
[patent_app_number] => 15/816996
[patent_app_country] => US
[patent_app_date] => 2017-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11939
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15816996
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/816996 | Security cloud service framework for hardening in the field code of mobile software applications | Nov 16, 2017 | Issued |