
Hosuk Song
Examiner (ID: 15666)
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2131, 2435, 2766, 2135 |
| Total Applications | 2111 |
| Issued Applications | 1805 |
| Pending Applications | 211 |
| Abandoned Applications | 125 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16897297
[patent_doc_number] => 11038862
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-06-15
[patent_title] => Systems and methods for enhanced security based on user vulnerability
[patent_app_type] => utility
[patent_app_number] => 16/729788
[patent_app_country] => US
[patent_app_date] => 2019-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 14053
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16729788
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/729788 | Systems and methods for enhanced security based on user vulnerability | Dec 29, 2019 | Issued |
Array
(
[id] => 17122951
[patent_doc_number] => 11134100
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-28
[patent_title] => Network device and network system
[patent_app_type] => utility
[patent_app_number] => 16/728795
[patent_app_country] => US
[patent_app_date] => 2019-12-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 12583
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16728795
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/728795 | Network device and network system | Dec 26, 2019 | Issued |
Array
(
[id] => 19734578
[patent_doc_number] => 12212590
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-01-28
[patent_title] => Information processing apparatus, threat information evaluation system, information processing method, and non-transitory computer readable medium
[patent_app_type] => utility
[patent_app_number] => 17/783081
[patent_app_country] => US
[patent_app_date] => 2019-12-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7918
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17783081
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/783081 | Information processing apparatus, threat information evaluation system, information processing method, and non-transitory computer readable medium | Dec 23, 2019 | Issued |
Array
(
[id] => 17223750
[patent_doc_number] => 11176251
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-11-16
[patent_title] => Determining malware via symbolic function hash analysis
[patent_app_type] => utility
[patent_app_number] => 16/724031
[patent_app_country] => US
[patent_app_date] => 2019-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8127
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16724031
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/724031 | Determining malware via symbolic function hash analysis | Dec 19, 2019 | Issued |
Array
(
[id] => 16804094
[patent_doc_number] => 10999057
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-04
[patent_title] => Providing access to a hardware resource based on a canary value
[patent_app_type] => utility
[patent_app_number] => 16/722407
[patent_app_country] => US
[patent_app_date] => 2019-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5660
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16722407
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/722407 | Providing access to a hardware resource based on a canary value | Dec 19, 2019 | Issued |
Array
(
[id] => 16083345
[patent_doc_number] => 20200195659
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-18
[patent_title] => Distributed Content Uploading and Validation
[patent_app_type] => utility
[patent_app_number] => 16/706143
[patent_app_country] => US
[patent_app_date] => 2019-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7168
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 68
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16706143
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/706143 | Distributed content uploading and validation | Dec 5, 2019 | Issued |
Array
(
[id] => 16685284
[patent_doc_number] => 10944784
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-09
[patent_title] => Identifying a potential DDOS attack using statistical analysis
[patent_app_type] => utility
[patent_app_number] => 16/704626
[patent_app_country] => US
[patent_app_date] => 2019-12-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6242
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16704626
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/704626 | Identifying a potential DDOS attack using statistical analysis | Dec 4, 2019 | Issued |
Array
(
[id] => 15659587
[patent_doc_number] => 20200092324
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-19
[patent_title] => RELIABLE TIMESTAMP CREDENTIAL
[patent_app_type] => utility
[patent_app_number] => 16/691265
[patent_app_country] => US
[patent_app_date] => 2019-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14515
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16691265
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/691265 | Reliable timestamp credential | Nov 20, 2019 | Issued |
Array
(
[id] => 17499700
[patent_doc_number] => 11288406
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-03-29
[patent_title] => Fast XOR interface with processor and memory
[patent_app_type] => utility
[patent_app_number] => 16/685678
[patent_app_country] => US
[patent_app_date] => 2019-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 9775
[patent_no_of_claims] => 46
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16685678
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/685678 | Fast XOR interface with processor and memory | Nov 14, 2019 | Issued |
Array
(
[id] => 15778211
[patent_doc_number] => 20200120123
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-16
[patent_title] => SAFE SHARING OF SENSITIVE DATA
[patent_app_type] => utility
[patent_app_number] => 16/681235
[patent_app_country] => US
[patent_app_date] => 2019-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10685
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16681235
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/681235 | Safe sharing of sensitive data | Nov 11, 2019 | Issued |
Array
(
[id] => 17331651
[patent_doc_number] => 11222115
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-01-11
[patent_title] => Data scan system
[patent_app_type] => utility
[patent_app_number] => 16/679403
[patent_app_country] => US
[patent_app_date] => 2019-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3565
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 375
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16679403
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/679403 | Data scan system | Nov 10, 2019 | Issued |
Array
(
[id] => 16810809
[patent_doc_number] => 20210133364
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-06
[patent_title] => TAMPER PROOF MECHANISM FOR AN INFORMATION HANDLING SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/672760
[patent_app_country] => US
[patent_app_date] => 2019-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4708
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16672760
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/672760 | Tamper proof mechanism for an information handling system | Nov 3, 2019 | Issued |
Array
(
[id] => 16638868
[patent_doc_number] => 10917394
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-09
[patent_title] => Data operations using a proxy encryption key
[patent_app_type] => utility
[patent_app_number] => 16/670946
[patent_app_country] => US
[patent_app_date] => 2019-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 8
[patent_no_of_words] => 7164
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16670946
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/670946 | Data operations using a proxy encryption key | Oct 30, 2019 | Issued |
Array
(
[id] => 17861902
[patent_doc_number] => 11443060
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-13
[patent_title] => Note taking at a device based on whether the user is a known user, unknown user, or owner
[patent_app_type] => utility
[patent_app_number] => 16/667434
[patent_app_country] => US
[patent_app_date] => 2019-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 12
[patent_no_of_words] => 10019
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16667434
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/667434 | Note taking at a device based on whether the user is a known user, unknown user, or owner | Oct 28, 2019 | Issued |
Array
(
[id] => 16248513
[patent_doc_number] => 10747876
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-18
[patent_title] => Systems and methods for assisted model generation
[patent_app_type] => utility
[patent_app_number] => 16/664679
[patent_app_country] => US
[patent_app_date] => 2019-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 33
[patent_figures_cnt] => 33
[patent_no_of_words] => 25945
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16664679
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/664679 | Systems and methods for assisted model generation | Oct 24, 2019 | Issued |
Array
(
[id] => 18218732
[patent_doc_number] => 11593674
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-02-28
[patent_title] => Leveraging genetics and feature engineering to boost placement predictability for seed product selection and recommendation by field
[patent_app_type] => utility
[patent_app_number] => 16/662369
[patent_app_country] => US
[patent_app_date] => 2019-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 24905
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16662369
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/662369 | Leveraging genetics and feature engineering to boost placement predictability for seed product selection and recommendation by field | Oct 23, 2019 | Issued |
Array
(
[id] => 15534359
[patent_doc_number] => 20200059486
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-20
[patent_title] => INFORMATION PROCESSING APPARATUS, RECORDING MEDIUM RECORDING NETWORK MONITORING PROGRAM, AND NETWORK MONITORING METHOD
[patent_app_type] => utility
[patent_app_number] => 16/662337
[patent_app_country] => US
[patent_app_date] => 2019-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9982
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16662337
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/662337 | Information processing apparatus, recording medium recording network monitoring program, and network monitoring method | Oct 23, 2019 | Issued |
Array
(
[id] => 16083415
[patent_doc_number] => 20200195694
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-18
[patent_title] => METHOD AND COMPUTING DEVICE FOR IDENTIFYING SUSPICIOUS USERS IN MESSAGE EXCHANGE SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 16/659697
[patent_app_country] => US
[patent_app_date] => 2019-10-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21832
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16659697
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/659697 | Method and computing device for identifying suspicious users in message exchange systems | Oct 21, 2019 | Issued |
Array
(
[id] => 17573158
[patent_doc_number] => 11321431
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-03
[patent_title] => Data processing, watermark embedding and watermark extraction
[patent_app_type] => utility
[patent_app_number] => 16/660525
[patent_app_country] => US
[patent_app_date] => 2019-10-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12998
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16660525
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/660525 | Data processing, watermark embedding and watermark extraction | Oct 21, 2019 | Issued |
Array
(
[id] => 16610194
[patent_doc_number] => 10911221
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-02
[patent_title] => Memory optimization for nested hash operations
[patent_app_type] => utility
[patent_app_number] => 16/656286
[patent_app_country] => US
[patent_app_date] => 2019-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5354
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16656286
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/656286 | Memory optimization for nested hash operations | Oct 16, 2019 | Issued |