Caitlyn Mingyun Sun
Examiner (ID: 7751)
Most Active Art Unit | 1795 |
Art Unit(s) | 1795 |
Total Applications | 307 |
Issued Applications | 144 |
Pending Applications | 67 |
Abandoned Applications | 96 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 7588840
[patent_doc_number] => 20110283351
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-17
[patent_title] => 'How to stop external and most internal network \"Hacking\"attacks by utilizing a dual appliance/server arrangement that allows for the use of peering servers and/or client software running on said peering servers or on proxy servers, web servers, or other legacy equipment'
[patent_app_type] => utility
[patent_app_number] => 13/066532
[patent_app_country] => US
[patent_app_date] => 2011-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 8671
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0283/20110283351.pdf
[firstpage_image] =>[orig_patent_app_number] => 13066532
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/066532 | System security for network resource access using cross firewall coded requests | Apr 17, 2011 | Issued |
Array
(
[id] => 9853383
[patent_doc_number] => 08955132
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-10
[patent_title] => 'Emulation for malware detection'
[patent_app_type] => utility
[patent_app_number] => 13/066399
[patent_app_country] => US
[patent_app_date] => 2011-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4590
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13066399
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/066399 | Emulation for malware detection | Apr 13, 2011 | Issued |
Array
(
[id] => 10021641
[patent_doc_number] => 09064129
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-23
[patent_title] => 'Managing data'
[patent_app_type] => utility
[patent_app_number] => 13/882692
[patent_app_country] => US
[patent_app_date] => 2011-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6817
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13882692
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/882692 | Managing data | Apr 6, 2011 | Issued |
Array
(
[id] => 8419231
[patent_doc_number] => 20120246731
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-09-27
[patent_title] => 'SECURE EXECUTION OF UNSECURED APPS ON A DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/052973
[patent_app_country] => US
[patent_app_date] => 2011-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9291
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13052973
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/052973 | Secure execution of unsecured apps on a device | Mar 20, 2011 | Issued |
Array
(
[id] => 8392653
[patent_doc_number] => 20120230493
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-09-13
[patent_title] => 'Systems, Methods, and Apparatus for a Quantum Key Distribution Telescope'
[patent_app_type] => utility
[patent_app_number] => 13/046024
[patent_app_country] => US
[patent_app_date] => 2011-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4199
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13046024
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/046024 | Systems, methods, and apparatus for a quantum key distribution telescope | Mar 10, 2011 | Issued |
Array
(
[id] => 7736137
[patent_doc_number] => 20120017261
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-01-19
[patent_title] => 'Enforcing Universal Access Control in an Information Management System'
[patent_app_type] => utility
[patent_app_number] => 13/004687
[patent_app_country] => US
[patent_app_date] => 2011-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 33
[patent_figures_cnt] => 33
[patent_no_of_words] => 35353
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0017/20120017261.pdf
[firstpage_image] =>[orig_patent_app_number] => 13004687
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/004687 | Enforcing universal access control in an information management system | Jan 10, 2011 | Issued |
Array
(
[id] => 6057884
[patent_doc_number] => 20110113482
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-12
[patent_title] => 'Method And Apparatus For Automatic Filter Generation And Maintenance'
[patent_app_type] => utility
[patent_app_number] => 12/987717
[patent_app_country] => US
[patent_app_date] => 2011-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6671
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0113/20110113482.pdf
[firstpage_image] =>[orig_patent_app_number] => 12987717
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/987717 | Method and apparatus for automatic filter generation and maintenance | Jan 9, 2011 | Issued |
Array
(
[id] => 8291588
[patent_doc_number] => 20120179919
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-07-12
[patent_title] => 'SECURING IMPLEMENTATION OF A CRYPTOGRAPHIC PROCESS HAVING FIXED OR DYNAMIC KEYS'
[patent_app_type] => utility
[patent_app_number] => 12/987931
[patent_app_country] => US
[patent_app_date] => 2011-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5240
[patent_no_of_claims] => 47
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12987931
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/987931 | Securing implementation of a cryptographic process having fixed or dynamic keys | Jan 9, 2011 | Issued |
Array
(
[id] => 9168644
[patent_doc_number] => 08594329
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-11-26
[patent_title] => 'Non-interactive verifiable, delegated computation'
[patent_app_type] => utility
[patent_app_number] => 12/970981
[patent_app_country] => US
[patent_app_date] => 2010-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5740
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12970981
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/970981 | Non-interactive verifiable, delegated computation | Dec 16, 2010 | Issued |
Array
(
[id] => 9853340
[patent_doc_number] => 08955089
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-10
[patent_title] => '“Push” keep-alive mechanism for SIP user agents located behind NATS/firewalls'
[patent_app_type] => utility
[patent_app_number] => 12/963278
[patent_app_country] => US
[patent_app_date] => 2010-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4726
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12963278
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/963278 | “Push†keep-alive mechanism for SIP user agents located behind NATS/firewalls | Dec 7, 2010 | Issued |
Array
(
[id] => 5951629
[patent_doc_number] => 20110033044
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-02-10
[patent_title] => 'Secure Open-Air Communication System Utilizing Multi-Channel Decoyed Transmission'
[patent_app_type] => utility
[patent_app_number] => 12/907417
[patent_app_country] => US
[patent_app_date] => 2010-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4402
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0033/20110033044.pdf
[firstpage_image] =>[orig_patent_app_number] => 12907417
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/907417 | Secure open-air communication system utilizing multi-channel decoyed transmission | Oct 18, 2010 | Issued |
Array
(
[id] => 8899455
[patent_doc_number] => 08478989
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-02
[patent_title] => 'Method and apparatus to authenticate and authorize user access to a system'
[patent_app_type] => utility
[patent_app_number] => 12/848840
[patent_app_country] => US
[patent_app_date] => 2010-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 11989
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12848840
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/848840 | Method and apparatus to authenticate and authorize user access to a system | Aug 1, 2010 | Issued |
Array
(
[id] => 8803954
[patent_doc_number] => 08442234
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-05-14
[patent_title] => 'System and method for obtaining certificate status of subkeys'
[patent_app_type] => utility
[patent_app_number] => 12/842133
[patent_app_country] => US
[patent_app_date] => 2010-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6616
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12842133
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/842133 | System and method for obtaining certificate status of subkeys | Jul 22, 2010 | Issued |
Array
(
[id] => 7569484
[patent_doc_number] => 20110289547
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-24
[patent_title] => 'TAKING CONFIGURATION MANAGEMENT DATA AND CHANGE BUSINESS PROCESS DATA INTO ACCOUNT WITH REGARD TO AUTHORIZATION AND AUTHENTICATION RULES'
[patent_app_type] => utility
[patent_app_number] => 12/784201
[patent_app_country] => US
[patent_app_date] => 2010-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5395
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0289/20110289547.pdf
[firstpage_image] =>[orig_patent_app_number] => 12784201
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/784201 | Taking configuration management data and change business process data into account with regard to authorization and authentication rules | May 19, 2010 | Issued |
Array
(
[id] => 6078968
[patent_doc_number] => 20110142227
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-16
[patent_title] => 'METHOD AND APPARATUS FOR ENCODING DATA AND METHOD AND APPARATUS FOR DECODING DATA'
[patent_app_type] => utility
[patent_app_number] => 12/784062
[patent_app_country] => US
[patent_app_date] => 2010-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4907
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0142/20110142227.pdf
[firstpage_image] =>[orig_patent_app_number] => 12784062
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/784062 | METHOD AND APPARATUS FOR ENCODING DATA AND METHOD AND APPARATUS FOR DECODING DATA | May 19, 2010 | Abandoned |
Array
(
[id] => 7569253
[patent_doc_number] => 20110289316
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-24
[patent_title] => 'USER AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 12/783424
[patent_app_country] => US
[patent_app_date] => 2010-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6527
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0289/20110289316.pdf
[firstpage_image] =>[orig_patent_app_number] => 12783424
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/783424 | USER AUTHENTICATION | May 18, 2010 | Abandoned |
Array
(
[id] => 8848118
[patent_doc_number] => 08457311
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-06-04
[patent_title] => 'Protecting video as it is decoded by a codec'
[patent_app_type] => utility
[patent_app_number] => 12/768652
[patent_app_country] => US
[patent_app_date] => 2010-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9084
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12768652
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/768652 | Protecting video as it is decoded by a codec | Apr 26, 2010 | Issued |
Array
(
[id] => 8740071
[patent_doc_number] => 08411852
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-04-02
[patent_title] => 'Diffusion oriented method and apparatus for stream cryptography'
[patent_app_type] => utility
[patent_app_number] => 12/765881
[patent_app_country] => US
[patent_app_date] => 2010-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 7405
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12765881
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/765881 | Diffusion oriented method and apparatus for stream cryptography | Apr 22, 2010 | Issued |
Array
(
[id] => 6117097
[patent_doc_number] => 20110191595
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-08-04
[patent_title] => 'ENCRYPTION KEY ROTATION MESSAGES WRITTEN AND OBSERVED BY STORAGE CONTROLLERS VIA STORAGE MEDIA'
[patent_app_type] => utility
[patent_app_number] => 12/757855
[patent_app_country] => US
[patent_app_date] => 2010-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6736
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0191/20110191595.pdf
[firstpage_image] =>[orig_patent_app_number] => 12757855
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/757855 | Encryption key rotation messages written and observed by storage controllers via storage media | Apr 8, 2010 | Issued |
Array
(
[id] => 6536666
[patent_doc_number] => 20100263046
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-10-14
[patent_title] => 'SECURITY WRAPPER METHODS AND SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 12/757282
[patent_app_country] => US
[patent_app_date] => 2010-04-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3128
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0263/20100263046.pdf
[firstpage_image] =>[orig_patent_app_number] => 12757282
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/757282 | SECURITY WRAPPER METHODS AND SYSTEMS | Apr 8, 2010 | Abandoned |