
Hosuk Song
Examiner (ID: 15666)
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2131, 2435, 2766, 2135 |
| Total Applications | 2111 |
| Issued Applications | 1805 |
| Pending Applications | 211 |
| Abandoned Applications | 125 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17825794
[patent_doc_number] => 11430748
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-30
[patent_title] => Inspection and identification to enable secure chip processing
[patent_app_type] => utility
[patent_app_number] => 16/240181
[patent_app_country] => US
[patent_app_date] => 2019-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 5827
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16240181
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/240181 | Inspection and identification to enable secure chip processing | Jan 3, 2019 | Issued |
Array
(
[id] => 16161193
[patent_doc_number] => 20200218829
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-09
[patent_title] => PUSH DOWN POLICY ENFORCEMENT
[patent_app_type] => utility
[patent_app_number] => 16/238913
[patent_app_country] => US
[patent_app_date] => 2019-01-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7780
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16238913
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/238913 | Push down policy enforcement | Jan 2, 2019 | Issued |
Array
(
[id] => 14538749
[patent_doc_number] => 20190204996
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-07-04
[patent_title] => SYSTEMS AND METHODS FOR PROACTIVE ANALYSIS OF ARTIFACTS ASSOCIATED WITH INFORMATION RESOURCES
[patent_app_type] => utility
[patent_app_number] => 16/239508
[patent_app_country] => US
[patent_app_date] => 2019-01-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8482
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16239508
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/239508 | Systems and methods for proactive analysis of artifacts associated with information resources | Jan 2, 2019 | Issued |
Array
(
[id] => 16161183
[patent_doc_number] => 20200218824
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-09
[patent_title] => POLICY BASED NOTIFICATION PROTECTION SERVICE IN WORKSPACE
[patent_app_type] => utility
[patent_app_number] => 16/238972
[patent_app_country] => US
[patent_app_date] => 2019-01-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15344
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16238972
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/238972 | Policy based notification protection service in workspace | Jan 2, 2019 | Issued |
Array
(
[id] => 16101191
[patent_doc_number] => 20200204582
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-25
[patent_title] => Method For Detecting Denial Of Service Attacks
[patent_app_type] => utility
[patent_app_number] => 16/227908
[patent_app_country] => US
[patent_app_date] => 2018-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2803
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16227908
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/227908 | Method for detecting denial of service attacks | Dec 19, 2018 | Issued |
Array
(
[id] => 16130493
[patent_doc_number] => 10699008
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-30
[patent_title] => Threat model chaining and attack simulation systems and related methods
[patent_app_type] => utility
[patent_app_number] => 16/228738
[patent_app_country] => US
[patent_app_date] => 2018-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 20272
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 206
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16228738
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/228738 | Threat model chaining and attack simulation systems and related methods | Dec 19, 2018 | Issued |
Array
(
[id] => 15675143
[patent_doc_number] => 10601819
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-24
[patent_title] => Public authentication systems and methods
[patent_app_type] => utility
[patent_app_number] => 16/228421
[patent_app_country] => US
[patent_app_date] => 2018-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 10
[patent_no_of_words] => 7507
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16228421
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/228421 | Public authentication systems and methods | Dec 19, 2018 | Issued |
Array
(
[id] => 16281237
[patent_doc_number] => 10764286
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-01
[patent_title] => System and method for proxying federated authentication protocols
[patent_app_type] => utility
[patent_app_number] => 16/228578
[patent_app_country] => US
[patent_app_date] => 2018-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 6984
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 65
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16228578
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/228578 | System and method for proxying federated authentication protocols | Dec 19, 2018 | Issued |
Array
(
[id] => 17327434
[patent_doc_number] => 11218466
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-01-04
[patent_title] => Endpoint security
[patent_app_type] => utility
[patent_app_number] => 16/225718
[patent_app_country] => US
[patent_app_date] => 2018-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 11305
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16225718
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/225718 | Endpoint security | Dec 18, 2018 | Issued |
Array
(
[id] => 14953487
[patent_doc_number] => 10438010
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-10-08
[patent_title] => Obfuscation of input data provided to a transaction device
[patent_app_type] => utility
[patent_app_number] => 16/225762
[patent_app_country] => US
[patent_app_date] => 2018-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10321
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16225762
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/225762 | Obfuscation of input data provided to a transaction device | Dec 18, 2018 | Issued |
Array
(
[id] => 16821008
[patent_doc_number] => 11005861
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-11
[patent_title] => Combining static and dynamic models for classifying transactions
[patent_app_type] => utility
[patent_app_number] => 16/223289
[patent_app_country] => US
[patent_app_date] => 2018-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8710
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16223289
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/223289 | Combining static and dynamic models for classifying transactions | Dec 17, 2018 | Issued |
Array
(
[id] => 14192941
[patent_doc_number] => 20190116176
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-18
[patent_title] => SYSTEMS AND METHODS FOR PRODUCT AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 16/215038
[patent_app_country] => US
[patent_app_date] => 2018-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5111
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16215038
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/215038 | Systems and methods for product authentication | Dec 9, 2018 | Issued |
Array
(
[id] => 16700965
[patent_doc_number] => 10951589
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-16
[patent_title] => Proxy auto-configuration for directing client traffic to a cloud proxy
[patent_app_type] => utility
[patent_app_number] => 16/211372
[patent_app_country] => US
[patent_app_date] => 2018-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9658
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16211372
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/211372 | Proxy auto-configuration for directing client traffic to a cloud proxy | Dec 5, 2018 | Issued |
Array
(
[id] => 16708675
[patent_doc_number] => 10958624
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-23
[patent_title] => Proxy auto-configuration for directing client traffic to a cloud proxy with cloud-based unique identifier assignment
[patent_app_type] => utility
[patent_app_number] => 16/211383
[patent_app_country] => US
[patent_app_date] => 2018-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9662
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16211383
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/211383 | Proxy auto-configuration for directing client traffic to a cloud proxy with cloud-based unique identifier assignment | Dec 5, 2018 | Issued |
Array
(
[id] => 15967495
[patent_doc_number] => 20200167499
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-28
[patent_title] => INTERRUPTING RECEIPT OF SENSITIVE INFORMATION
[patent_app_type] => utility
[patent_app_number] => 16/199930
[patent_app_country] => US
[patent_app_date] => 2018-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10618
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16199930
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/199930 | Interrupting receipt of sensitive information | Nov 25, 2018 | Issued |
Array
(
[id] => 16537689
[patent_doc_number] => 10880312
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-29
[patent_title] => Authentication and authorization with remotely managed user directories
[patent_app_type] => utility
[patent_app_number] => 16/198475
[patent_app_country] => US
[patent_app_date] => 2018-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 13703
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16198475
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/198475 | Authentication and authorization with remotely managed user directories | Nov 20, 2018 | Issued |
Array
(
[id] => 14081755
[patent_doc_number] => 20190089765
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-21
[patent_title] => COMPUTER SYSTEM FOR NETWORK NODE REVIEW FOR ACTIONABLE ITEM
[patent_app_type] => utility
[patent_app_number] => 16/196835
[patent_app_country] => US
[patent_app_date] => 2018-11-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8830
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16196835
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/196835 | COMPUTER SYSTEM FOR NETWORK NODE REVIEW FOR ACTIONABLE ITEM | Nov 19, 2018 | Abandoned |
Array
(
[id] => 16618735
[patent_doc_number] => 20210037388
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-04
[patent_title] => IMPROVED SECURITY FOR POSITIONING WITHOUT CIPHERING
[patent_app_type] => utility
[patent_app_number] => 16/766937
[patent_app_country] => US
[patent_app_date] => 2018-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 22036
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16766937
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/766937 | Security for positioning without ciphering | Nov 16, 2018 | Issued |
Array
(
[id] => 14081693
[patent_doc_number] => 20190089734
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-21
[patent_title] => IDENTIFYING A POTENTIAL DDOS ATTACK USING STATISTICAL ANALYSIS
[patent_app_type] => utility
[patent_app_number] => 16/193167
[patent_app_country] => US
[patent_app_date] => 2018-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6444
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16193167
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/193167 | Identifying a potential DDOS attack using statistical analysis | Nov 15, 2018 | Issued |
Array
(
[id] => 16494665
[patent_doc_number] => 10860708
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-12-08
[patent_title] => Apparatus and method for measuring security strength of lock pattern applied to multi-core based terminal device
[patent_app_type] => utility
[patent_app_number] => 16/190928
[patent_app_country] => US
[patent_app_date] => 2018-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4546
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16190928
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/190928 | Apparatus and method for measuring security strength of lock pattern applied to multi-core based terminal device | Nov 13, 2018 | Issued |