Caitlyn Mingyun Sun
Examiner (ID: 7751)
Most Active Art Unit | 1795 |
Art Unit(s) | 1795 |
Total Applications | 307 |
Issued Applications | 144 |
Pending Applications | 67 |
Abandoned Applications | 96 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 11646010
[patent_doc_number] => 09667412
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-30
[patent_title] => 'Key, system and method of unlocking electronic device using the key'
[patent_app_type] => utility
[patent_app_number] => 14/690129
[patent_app_country] => US
[patent_app_date] => 2015-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3117
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14690129
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/690129 | Key, system and method of unlocking electronic device using the key | Apr 16, 2015 | Issued |
Array
(
[id] => 13072859
[patent_doc_number] => 10057228
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-21
[patent_title] => Registering content to a digital locker
[patent_app_type] => utility
[patent_app_number] => 14/689846
[patent_app_country] => US
[patent_app_date] => 2015-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 29
[patent_figures_cnt] => 31
[patent_no_of_words] => 8109
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14689846
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/689846 | Registering content to a digital locker | Apr 16, 2015 | Issued |
Array
(
[id] => 10328248
[patent_doc_number] => 20150213251
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-30
[patent_title] => 'METHOD, DEVICE, AND SYSTEM OF PROTECTING A LOG-IN PROCESS OF A COMPUTERIZED SERVICE'
[patent_app_type] => utility
[patent_app_number] => 14/675769
[patent_app_country] => US
[patent_app_date] => 2015-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 16316
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14675769
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/675769 | Method, device, and system of protecting a log-in process of a computerized service | Mar 31, 2015 | Issued |
Array
(
[id] => 11899177
[patent_doc_number] => 09769126
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-19
[patent_title] => 'Secure personal server system and method'
[patent_app_type] => utility
[patent_app_number] => 14/676648
[patent_app_country] => US
[patent_app_date] => 2015-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13783
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14676648
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/676648 | Secure personal server system and method | Mar 31, 2015 | Issued |
Array
(
[id] => 11899256
[patent_doc_number] => 09769206
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-19
[patent_title] => 'Modes of policy participation for feedback instances'
[patent_app_type] => utility
[patent_app_number] => 14/675669
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 29110
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14675669
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/675669 | Modes of policy participation for feedback instances | Mar 30, 2015 | Issued |
Array
(
[id] => 11933593
[patent_doc_number] => 09800603
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-10-24
[patent_title] => 'Self-replicating distributed vulnerability management agent apparatuses, methods, and systems'
[patent_app_type] => utility
[patent_app_number] => 14/675380
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 18424
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14675380
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/675380 | Self-replicating distributed vulnerability management agent apparatuses, methods, and systems | Mar 30, 2015 | Issued |
Array
(
[id] => 11097881
[patent_doc_number] => 20160294851
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'DETECTING A MALICIOUS FILE INFECTION VIA SANDBOXING'
[patent_app_type] => utility
[patent_app_number] => 14/675422
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7850
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14675422
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/675422 | Detecting a malicious file infection via sandboxing | Mar 30, 2015 | Issued |
Array
(
[id] => 11788546
[patent_doc_number] => 09398051
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-19
[patent_title] => 'Enforcing policy-based application and access control in an information management system'
[patent_app_type] => utility
[patent_app_number] => 14/624462
[patent_app_country] => US
[patent_app_date] => 2015-02-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 32
[patent_figures_cnt] => 32
[patent_no_of_words] => 36437
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 206
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14624462
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/624462 | Enforcing policy-based application and access control in an information management system | Feb 16, 2015 | Issued |
Array
(
[id] => 11579756
[patent_doc_number] => 09635030
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-25
[patent_title] => 'Policy enforcement of client devices'
[patent_app_type] => utility
[patent_app_number] => 14/622348
[patent_app_country] => US
[patent_app_date] => 2015-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4890
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14622348
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/622348 | Policy enforcement of client devices | Feb 12, 2015 | Issued |
Array
(
[id] => 11037252
[patent_doc_number] => 20160234208
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'SYSTEMS AND METHODS FOR MUTUAL AUTHENTICATION OF ELECTRONIC DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/615234
[patent_app_country] => US
[patent_app_date] => 2015-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6193
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14615234
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/615234 | Systems and methods for mutual authentication of electronic devices | Feb 4, 2015 | Issued |
Array
(
[id] => 11037234
[patent_doc_number] => 20160234190
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'SECURE USER INPUT MODE USING RANDOMIZED MAPPING BETWEEN ORDERED SETS OF SYMBOLS'
[patent_app_type] => utility
[patent_app_number] => 14/615064
[patent_app_country] => US
[patent_app_date] => 2015-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10224
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14615064
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/615064 | Secure user input mode using randomized mapping between ordered sets of symbols | Feb 4, 2015 | Issued |
Array
(
[id] => 11724496
[patent_doc_number] => 09697352
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-07-04
[patent_title] => 'Incident response management system and method'
[patent_app_type] => utility
[patent_app_number] => 14/614679
[patent_app_country] => US
[patent_app_date] => 2015-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 8881
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 282
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14614679
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/614679 | Incident response management system and method | Feb 4, 2015 | Issued |
Array
(
[id] => 11418364
[patent_doc_number] => 09565204
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-07
[patent_title] => 'Cyber-security system and methods thereof'
[patent_app_type] => utility
[patent_app_number] => 14/615020
[patent_app_country] => US
[patent_app_date] => 2015-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10793
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14615020
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/615020 | Cyber-security system and methods thereof | Feb 4, 2015 | Issued |
Array
(
[id] => 11037221
[patent_doc_number] => 20160234178
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'SECURE STREAM BUFFER ON NETWORK ATTACHED STORAGE'
[patent_app_type] => utility
[patent_app_number] => 14/615367
[patent_app_country] => US
[patent_app_date] => 2015-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5753
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14615367
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/615367 | Secure stream buffer on network attached storage | Feb 4, 2015 | Issued |
Array
(
[id] => 10603379
[patent_doc_number] => 09323947
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-04-26
[patent_title] => 'System, method and computer program product for controlling access to protected personal information'
[patent_app_type] => utility
[patent_app_number] => 14/611870
[patent_app_country] => US
[patent_app_date] => 2015-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 5970
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14611870
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/611870 | System, method and computer program product for controlling access to protected personal information | Feb 1, 2015 | Issued |
Array
(
[id] => 10480211
[patent_doc_number] => 20150365228
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-17
[patent_title] => 'DIFFERENTIAL POWER ANALYSIS COUNTERMEASURES'
[patent_app_type] => utility
[patent_app_number] => 14/607137
[patent_app_country] => US
[patent_app_date] => 2015-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7893
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14607137
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/607137 | Differential power analysis countermeasures | Jan 27, 2015 | Issued |
Array
(
[id] => 15111045
[patent_doc_number] => 10476863
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-11-12
[patent_title] => Ownership maintenance of multi-tenant environment
[patent_app_type] => utility
[patent_app_number] => 14/564978
[patent_app_country] => US
[patent_app_date] => 2014-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10245
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14564978
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/564978 | Ownership maintenance of multi-tenant environment | Dec 8, 2014 | Issued |
Array
(
[id] => 10308637
[patent_doc_number] => 20150193638
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-09
[patent_title] => 'SYSTEM AND METHOD OF FILTERING CONSUMER DATA'
[patent_app_type] => utility
[patent_app_number] => 14/565300
[patent_app_country] => US
[patent_app_date] => 2014-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9082
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14565300
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/565300 | System and method of filtering consumer data | Dec 8, 2014 | Issued |
Array
(
[id] => 11228232
[patent_doc_number] => 09455960
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-27
[patent_title] => 'Secure application delivery system with dynamic stitching of network connections in the cloud'
[patent_app_type] => utility
[patent_app_number] => 14/564981
[patent_app_country] => US
[patent_app_date] => 2014-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 29
[patent_no_of_words] => 19381
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 423
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14564981
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/564981 | Secure application delivery system with dynamic stitching of network connections in the cloud | Dec 8, 2014 | Issued |
Array
(
[id] => 10278246
[patent_doc_number] => 20150163243
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-11
[patent_title] => 'DATA STREAM SECURITY PROCESSING METHOD AND APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 14/564963
[patent_app_country] => US
[patent_app_date] => 2014-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8194
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14564963
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/564963 | Data stream security processing method and apparatus | Dec 8, 2014 | Issued |