
Hosuk Song
Examiner (ID: 15666)
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2131, 2435, 2766, 2135 |
| Total Applications | 2111 |
| Issued Applications | 1805 |
| Pending Applications | 211 |
| Abandoned Applications | 125 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15871285
[patent_doc_number] => 20200143046
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => SECURITY ACTIONS BASED ON MONITORED COMPUTER AND USER PHYSICAL ACTIVITIES
[patent_app_type] => utility
[patent_app_number] => 16/183018
[patent_app_country] => US
[patent_app_date] => 2018-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10721
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16183018
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/183018 | Security actions based on monitored computer and user physical activities | Nov 6, 2018 | Issued |
Array
(
[id] => 15735639
[patent_doc_number] => 10616264
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-04-07
[patent_title] => Incident response management based on asset configurations in a computing environment
[patent_app_type] => utility
[patent_app_number] => 16/182914
[patent_app_country] => US
[patent_app_date] => 2018-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4793
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16182914
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/182914 | Incident response management based on asset configurations in a computing environment | Nov 6, 2018 | Issued |
Array
(
[id] => 15837873
[patent_doc_number] => 20200134219
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-30
[patent_title] => Securely Sharing Files with User Devices Based on Location
[patent_app_type] => utility
[patent_app_number] => 16/174499
[patent_app_country] => US
[patent_app_date] => 2018-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11131
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16174499
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/174499 | Securely sharing files with user devices based on location | Oct 29, 2018 | Issued |
Array
(
[id] => 15843041
[patent_doc_number] => 20200136803
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-30
[patent_title] => Request Approval Using Blockchain Technology
[patent_app_type] => utility
[patent_app_number] => 16/174638
[patent_app_country] => US
[patent_app_date] => 2018-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5526
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16174638
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/174638 | Request approval using blockchain technology | Oct 29, 2018 | Issued |
Array
(
[id] => 13998959
[patent_doc_number] => 20190068637
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => RELIABLE TIMESTAMP CREDENTIAL
[patent_app_type] => utility
[patent_app_number] => 16/173652
[patent_app_country] => US
[patent_app_date] => 2018-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14499
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16173652
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/173652 | Reliable timestamp credential | Oct 28, 2018 | Issued |
Array
(
[id] => 17093650
[patent_doc_number] => 11121853
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-14
[patent_title] => Techniques for preventing memory timing attacks
[patent_app_type] => utility
[patent_app_number] => 16/173041
[patent_app_country] => US
[patent_app_date] => 2018-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12258
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 42
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16173041
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/173041 | Techniques for preventing memory timing attacks | Oct 28, 2018 | Issued |
Array
(
[id] => 14235911
[patent_doc_number] => 20190130128
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-02
[patent_title] => ENCRYPTION SCHEME FOR MAKING SECURE PATIENT DATA AVAILABLE TO AUTHORIZED PARTIES
[patent_app_type] => utility
[patent_app_number] => 16/172714
[patent_app_country] => US
[patent_app_date] => 2018-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11231
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16172714
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/172714 | Encryption scheme for making secure patient data available to authorized parties | Oct 25, 2018 | Issued |
Array
(
[id] => 15809787
[patent_doc_number] => 20200128036
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-23
[patent_title] => Security System Using Pseudonyms to Anonymously Identify Entities and Corresponding Security Risk Related Behaviors
[patent_app_type] => utility
[patent_app_number] => 16/168302
[patent_app_country] => US
[patent_app_date] => 2018-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 24034
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 90
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16168302
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/168302 | Security system using pseudonyms to anonymously identify entities and corresponding security risk related behaviors | Oct 22, 2018 | Issued |
Array
(
[id] => 15805171
[patent_doc_number] => 20200125728
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-23
[patent_title] => DATA-DRIVEN IDENTIFICATION OF MALICIOUS FILES USING MACHINE LEARNING AND AN ENSEMBLE OF MALWARE DETECTION PROCEDURES
[patent_app_type] => utility
[patent_app_number] => 16/165051
[patent_app_country] => US
[patent_app_date] => 2018-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5446
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16165051
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/165051 | Data-driven identification of malicious files using machine learning and an ensemble of malware detection procedures | Oct 18, 2018 | Issued |
Array
(
[id] => 16700991
[patent_doc_number] => 10951615
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-03-16
[patent_title] => Wireless network access for data appliances
[patent_app_type] => utility
[patent_app_number] => 16/162273
[patent_app_country] => US
[patent_app_date] => 2018-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8202
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16162273
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/162273 | Wireless network access for data appliances | Oct 15, 2018 | Issued |
Array
(
[id] => 15773561
[patent_doc_number] => 20200117798
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-16
[patent_title] => Event Monitoring
[patent_app_type] => utility
[patent_app_number] => 16/156554
[patent_app_country] => US
[patent_app_date] => 2018-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9322
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 65
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16156554
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/156554 | Event monitoring | Oct 9, 2018 | Issued |
Array
(
[id] => 13938309
[patent_doc_number] => 20190052670
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-14
[patent_title] => EVENT DRIVEN ROUTE CONTROL
[patent_app_type] => utility
[patent_app_number] => 16/155587
[patent_app_country] => US
[patent_app_date] => 2018-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5438
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16155587
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/155587 | Event driven route control | Oct 8, 2018 | Issued |
Array
(
[id] => 15137615
[patent_doc_number] => 10482281
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-11-19
[patent_title] => Protecting client personal data from customer service agents
[patent_app_type] => utility
[patent_app_number] => 16/154663
[patent_app_country] => US
[patent_app_date] => 2018-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9820
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16154663
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/154663 | Protecting client personal data from customer service agents | Oct 7, 2018 | Issued |
Array
(
[id] => 14705261
[patent_doc_number] => 10380380
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-08-13
[patent_title] => Protecting client personal data from customer service agents
[patent_app_type] => utility
[patent_app_number] => 16/154581
[patent_app_country] => US
[patent_app_date] => 2018-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9781
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16154581
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/154581 | Protecting client personal data from customer service agents | Oct 7, 2018 | Issued |
Array
(
[id] => 18671076
[patent_doc_number] => 11777998
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-10-03
[patent_title] => Secure lawful interception in network elements
[patent_app_type] => utility
[patent_app_number] => 17/281791
[patent_app_country] => US
[patent_app_date] => 2018-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 15
[patent_no_of_words] => 4264
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17281791
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/281791 | Secure lawful interception in network elements | Oct 3, 2018 | Issued |
Array
(
[id] => 16255918
[patent_doc_number] => 20200265293
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-20
[patent_title] => SECURE BROKER-MEDIATED DATA ANALYSIS AND PREDICTION
[patent_app_type] => utility
[patent_app_number] => 16/652985
[patent_app_country] => US
[patent_app_date] => 2018-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 49179
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -23
[patent_words_short_claim] => 303
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16652985
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/652985 | Secure broker-mediated data analysis and prediction | Sep 30, 2018 | Issued |
Array
(
[id] => 17182285
[patent_doc_number] => 11159541
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-26
[patent_title] => Program, information processing device, and information processing method
[patent_app_type] => utility
[patent_app_number] => 16/144606
[patent_app_country] => US
[patent_app_date] => 2018-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 79
[patent_figures_cnt] => 82
[patent_no_of_words] => 32661
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16144606
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/144606 | Program, information processing device, and information processing method | Sep 26, 2018 | Issued |
Array
(
[id] => 14112727
[patent_doc_number] => 20190098039
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-28
[patent_title] => DETERMINATION OF CYBERSECURITY RECOMMENDATIONS
[patent_app_type] => utility
[patent_app_number] => 16/143093
[patent_app_country] => US
[patent_app_date] => 2018-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 26878
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -40
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16143093
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/143093 | Determination of cybersecurity recommendations | Sep 25, 2018 | Issued |
Array
(
[id] => 13849947
[patent_doc_number] => 20190028458
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-24
[patent_title] => Sharing Access to a Media Service
[patent_app_type] => utility
[patent_app_number] => 16/142895
[patent_app_country] => US
[patent_app_date] => 2018-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14991
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16142895
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/142895 | Sharing access to a media service | Sep 25, 2018 | Issued |
Array
(
[id] => 13849931
[patent_doc_number] => 20190028450
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-24
[patent_title] => TECHNIQUES FOR DOMAIN CAPTURE
[patent_app_type] => utility
[patent_app_number] => 16/138362
[patent_app_country] => US
[patent_app_date] => 2018-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14901
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16138362
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/138362 | Techniques for domain capture | Sep 20, 2018 | Issued |