
Hosuk Song
Examiner (ID: 15666)
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2131, 2435, 2766, 2135 |
| Total Applications | 2111 |
| Issued Applications | 1805 |
| Pending Applications | 211 |
| Abandoned Applications | 125 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15111247
[patent_doc_number] => 10476965
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-11-12
[patent_title] => Apparatus, system and method for sharing tangible objects
[patent_app_type] => utility
[patent_app_number] => 15/614737
[patent_app_country] => US
[patent_app_date] => 2017-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 10359
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 310
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15614737
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/614737 | Apparatus, system and method for sharing tangible objects | Jun 5, 2017 | Issued |
Array
(
[id] => 15317837
[patent_doc_number] => 10523643
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-12-31
[patent_title] => Systems and methods for enhanced security based on user vulnerability
[patent_app_type] => utility
[patent_app_number] => 15/602891
[patent_app_country] => US
[patent_app_date] => 2017-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 14028
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15602891
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/602891 | Systems and methods for enhanced security based on user vulnerability | May 22, 2017 | Issued |
Array
(
[id] => 14432197
[patent_doc_number] => 10320920
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-11
[patent_title] => Automatic migration of communication sessions using a private cloud-cloud technology
[patent_app_type] => utility
[patent_app_number] => 15/602236
[patent_app_country] => US
[patent_app_date] => 2017-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 9072
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15602236
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/602236 | Automatic migration of communication sessions using a private cloud-cloud technology | May 22, 2017 | Issued |
Array
(
[id] => 15141723
[patent_doc_number] => 10484363
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-19
[patent_title] => Method and apparatus for authenticating a device using Bluetooth technology
[patent_app_type] => utility
[patent_app_number] => 15/602830
[patent_app_country] => US
[patent_app_date] => 2017-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 11781
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15602830
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/602830 | Method and apparatus for authenticating a device using Bluetooth technology | May 22, 2017 | Issued |
Array
(
[id] => 12082148
[patent_doc_number] => 20170344735
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-30
[patent_title] => 'ELECTRONIC DEVICE AND UNLOCKING METHOD THEREFOR'
[patent_app_type] => utility
[patent_app_number] => 15/603431
[patent_app_country] => US
[patent_app_date] => 2017-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2200
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15603431
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/603431 | Electronic device and unlocking method therefor | May 22, 2017 | Issued |
Array
(
[id] => 13696427
[patent_doc_number] => 20170359168
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => MEMORY OPTIMIZATION FOR NESTED HASH OPERATIONS
[patent_app_type] => utility
[patent_app_number] => 15/603342
[patent_app_country] => US
[patent_app_date] => 2017-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5335
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15603342
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/603342 | Memory optimization for nested hash operations | May 22, 2017 | Issued |
Array
(
[id] => 12096225
[patent_doc_number] => 20170353318
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-07
[patent_title] => 'PROVIDING ACCESS TO A HARDWARE RESOURCE BASED ON A CANARY VALUE'
[patent_app_type] => utility
[patent_app_number] => 15/603335
[patent_app_country] => US
[patent_app_date] => 2017-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5739
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15603335
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/603335 | Providing access to a hardware resource based on a canary value | May 22, 2017 | Issued |
Array
(
[id] => 12062610
[patent_doc_number] => 20170338954
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-23
[patent_title] => 'ELECTRONIC SUBSCRIBER IDENTITY MODULE (eSIM) PROVISIONING ERROR RECOVERY'
[patent_app_type] => utility
[patent_app_number] => 15/602027
[patent_app_country] => US
[patent_app_date] => 2017-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11384
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15602027
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/602027 | Electronic subscriber identity module (eSIM) provisioning error recovery | May 21, 2017 | Issued |
Array
(
[id] => 11953271
[patent_doc_number] => 20170257422
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-07
[patent_title] => 'MANAGING TRANSMISSION AND STORAGE OF SENSITIVE DATA'
[patent_app_type] => utility
[patent_app_number] => 15/600713
[patent_app_country] => US
[patent_app_date] => 2017-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8879
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15600713
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/600713 | Managing transmission and storage of sensitive data | May 19, 2017 | Issued |
Array
(
[id] => 11938857
[patent_doc_number] => 20170243007
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-24
[patent_title] => 'MULTIPLE SYSTEM IMAGES FOR OVER-THE-AIR UPDATES'
[patent_app_type] => utility
[patent_app_number] => 15/589595
[patent_app_country] => US
[patent_app_date] => 2017-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12225
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15589595
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/589595 | Multiple system images for over-the-air updates | May 7, 2017 | Issued |
Array
(
[id] => 13230861
[patent_doc_number] => 10129222
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-13
[patent_title] => Trusted storage systems and methods
[patent_app_type] => utility
[patent_app_number] => 15/495320
[patent_app_country] => US
[patent_app_date] => 2017-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 11804
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15495320
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/495320 | Trusted storage systems and methods | Apr 23, 2017 | Issued |
Array
(
[id] => 14736551
[patent_doc_number] => 10387677
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-20
[patent_title] => Deniable obfuscation of user locations
[patent_app_type] => utility
[patent_app_number] => 15/489887
[patent_app_country] => US
[patent_app_date] => 2017-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4942
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15489887
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/489887 | Deniable obfuscation of user locations | Apr 17, 2017 | Issued |
Array
(
[id] => 14235903
[patent_doc_number] => 20190130124
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-02
[patent_title] => MULTI-USER PERMISSION STRATEGY TO ACCESS SENSITIVE INFORMATION
[patent_app_type] => utility
[patent_app_number] => 15/932439
[patent_app_country] => US
[patent_app_date] => 2017-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2293
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -2
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15932439
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/932439 | Multi-user permission strategy to access sensitive information | Apr 9, 2017 | Issued |
Array
(
[id] => 12875743
[patent_doc_number] => 20180183756
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-28
[patent_title] => DEEP PACKET INSPECTION WITH ENHANCED DATA PACKET ANALYZERS
[patent_app_type] => utility
[patent_app_number] => 15/479306
[patent_app_country] => US
[patent_app_date] => 2017-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7553
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15479306
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/479306 | Deep packet inspection with enhanced data packet analyzers | Apr 4, 2017 | Issued |
Array
(
[id] => 13008031
[patent_doc_number] => 10027696
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-07-17
[patent_title] => System and method for determining a threat based on correlation of indicators of compromise from other sources
[patent_app_type] => utility
[patent_app_number] => 15/470816
[patent_app_country] => US
[patent_app_date] => 2017-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7107
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15470816
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/470816 | System and method for determining a threat based on correlation of indicators of compromise from other sources | Mar 26, 2017 | Issued |
Array
(
[id] => 14826007
[patent_doc_number] => 10410014
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-10
[patent_title] => Configurable annotations for privacy-sensitive user content
[patent_app_type] => utility
[patent_app_number] => 15/466988
[patent_app_country] => US
[patent_app_date] => 2017-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13913
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15466988
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/466988 | Configurable annotations for privacy-sensitive user content | Mar 22, 2017 | Issued |
Array
(
[id] => 11733871
[patent_doc_number] => 20170195314
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-07-06
[patent_title] => 'PROVISIONING ACCOUNT CREDENTIALS VIA A TRUSTED CHANNEL'
[patent_app_type] => utility
[patent_app_number] => 15/467476
[patent_app_country] => US
[patent_app_date] => 2017-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8972
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15467476
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/467476 | Provisioning account credentials via a trusted channel | Mar 22, 2017 | Issued |
Array
(
[id] => 15445123
[patent_doc_number] => 20200036745
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-30
[patent_title] => ABNORMALITY DETECTION DEVICE, ABNORMALITY DETECTION METHOD AND ABNORMALITY DETECTION PROGRAM
[patent_app_type] => utility
[patent_app_number] => 16/491892
[patent_app_country] => US
[patent_app_date] => 2017-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12386
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16491892
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/491892 | Abnormality detection device, abnormality detection method and abnormality detection program | Mar 8, 2017 | Issued |
Array
(
[id] => 14431995
[patent_doc_number] => 10320819
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-11
[patent_title] => Intelligent security management
[patent_app_type] => utility
[patent_app_number] => 15/443801
[patent_app_country] => US
[patent_app_date] => 2017-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11024
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15443801
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/443801 | Intelligent security management | Feb 26, 2017 | Issued |
Array
(
[id] => 12155533
[patent_doc_number] => 20180026798
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-25
[patent_title] => 'METHOD FOR THE GENERATION OF A DIGITAL SIGNATURE OF A MESSAGE, CORRESPONDING GENERATION UNIT, ELECTRONIC APPARATUS AND COMPUTER PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 15/441001
[patent_app_country] => US
[patent_app_date] => 2017-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5685
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15441001
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/441001 | Method for the generation of a digital signature of a message, corresponding generation unit, electronic apparatus and computer program product | Feb 22, 2017 | Issued |