
Oscar A. Louie
Supervisory Patent Examiner (ID: 7277, Phone: (571)270-1684 , Office: P/2445 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2495, 2136, 2445, 2436 |
| Total Applications | 266 |
| Issued Applications | 161 |
| Pending Applications | 12 |
| Abandoned Applications | 93 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 118248
[patent_doc_number] => 07716496
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-05-11
[patent_title] => 'Encryption/decryption management method in computer system having storage hierarchy'
[patent_app_type] => utility
[patent_app_number] => 10/988538
[patent_app_country] => US
[patent_app_date] => 2004-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 25
[patent_no_of_words] => 9616
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 249
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/716/07716496.pdf
[firstpage_image] =>[orig_patent_app_number] => 10988538
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/988538 | Encryption/decryption management method in computer system having storage hierarchy | Nov 15, 2004 | Issued |
Array
(
[id] => 7193274
[patent_doc_number] => 20050193211
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-09-01
[patent_title] => 'Management of user authentication information together with authentication level'
[patent_app_type] => utility
[patent_app_number] => 10/983030
[patent_app_country] => US
[patent_app_date] => 2004-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 34
[patent_no_of_words] => 19644
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0193/20050193211.pdf
[firstpage_image] =>[orig_patent_app_number] => 10983030
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/983030 | Management of user authentication information together with authentication level | Nov 7, 2004 | Abandoned |
Array
(
[id] => 117052
[patent_doc_number] => 07721335
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-05-18
[patent_title] => 'Ambient calculus-based modal logics for mobile ambients'
[patent_app_type] => utility
[patent_app_number] => 10/929742
[patent_app_country] => US
[patent_app_date] => 2004-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9564
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/721/07721335.pdf
[firstpage_image] =>[orig_patent_app_number] => 10929742
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/929742 | Ambient calculus-based modal logics for mobile ambients | Aug 29, 2004 | Issued |
Array
(
[id] => 6984584
[patent_doc_number] => 20050154576
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-07-14
[patent_title] => 'Policy simulator for analyzing autonomic system management policy of a computer system'
[patent_app_type] => utility
[patent_app_number] => 10/927618
[patent_app_country] => US
[patent_app_date] => 2004-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5941
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0154/20050154576.pdf
[firstpage_image] =>[orig_patent_app_number] => 10927618
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/927618 | Policy simulator for analyzing autonomic system management policy of a computer system | Aug 26, 2004 | Abandoned |
Array
(
[id] => 5904035
[patent_doc_number] => 20060046744
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-03-02
[patent_title] => 'System and method for enforcing location privacy using rights management'
[patent_app_type] => utility
[patent_app_number] => 10/928023
[patent_app_country] => US
[patent_app_date] => 2004-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7319
[patent_no_of_claims] => 54
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0046/20060046744.pdf
[firstpage_image] =>[orig_patent_app_number] => 10928023
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/928023 | System and method for enforcing location privacy using rights management | Aug 26, 2004 | Issued |
Array
(
[id] => 9012750
[patent_doc_number] => 08528071
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-09-03
[patent_title] => 'System and method for flexible authentication in a data communications network'
[patent_app_type] => utility
[patent_app_number] => 10/925155
[patent_app_country] => US
[patent_app_date] => 2004-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5954
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 10925155
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/925155 | System and method for flexible authentication in a data communications network | Aug 23, 2004 | Issued |
Array
(
[id] => 188451
[patent_doc_number] => 07650504
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-01-19
[patent_title] => 'System and method of verifying the authenticity of dynamically connectable executable images'
[patent_app_type] => utility
[patent_app_number] => 10/924420
[patent_app_country] => US
[patent_app_date] => 2004-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5102
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/650/07650504.pdf
[firstpage_image] =>[orig_patent_app_number] => 10924420
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/924420 | System and method of verifying the authenticity of dynamically connectable executable images | Aug 22, 2004 | Issued |
Array
(
[id] => 7245708
[patent_doc_number] => 20050081032
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-04-14
[patent_title] => 'Method and apparatus for synchronizing an adaptable security level in an electronic communication'
[patent_app_type] => utility
[patent_app_number] => 10/921161
[patent_app_country] => US
[patent_app_date] => 2004-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2905
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0081/20050081032.pdf
[firstpage_image] =>[orig_patent_app_number] => 10921161
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/921161 | Method and apparatus for synchronizing an adaptable security level in an electronic communication | Aug 18, 2004 | Issued |
Array
(
[id] => 6941131
[patent_doc_number] => 20050114694
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-05-26
[patent_title] => 'System and method for authentication of applications in a non-trusted network environment'
[patent_app_type] => utility
[patent_app_number] => 10/917087
[patent_app_country] => US
[patent_app_date] => 2004-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4214
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0114/20050114694.pdf
[firstpage_image] =>[orig_patent_app_number] => 10917087
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/917087 | System and method for authentication of applications in a non-trusted network environment | Aug 11, 2004 | Abandoned |
Array
(
[id] => 5114914
[patent_doc_number] => 20070198830
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-08-23
[patent_title] => 'Communication apparatus, communication system, certificate transmission method, anomaly detection method and a program therefor'
[patent_app_type] => utility
[patent_app_number] => 10/896900
[patent_app_country] => US
[patent_app_date] => 2004-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 23654
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 13
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0198/20070198830.pdf
[firstpage_image] =>[orig_patent_app_number] => 10896900
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/896900 | Communication apparatus, communication system, certificate transmission method, anomaly detection method and a program therefor | Jul 22, 2004 | Issued |
Array
(
[id] => 5795249
[patent_doc_number] => 20060015930
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-01-19
[patent_title] => 'Process for removing stale users, accounts and entitlements from a networked computer environment'
[patent_app_type] => utility
[patent_app_number] => 10/890902
[patent_app_country] => US
[patent_app_date] => 2004-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3557
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0015/20060015930.pdf
[firstpage_image] =>[orig_patent_app_number] => 10890902
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/890902 | Process for removing stale users, accounts and entitlements from a networked computer environment | Jul 14, 2004 | Abandoned |
Array
(
[id] => 5179430
[patent_doc_number] => 20070180490
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-08-02
[patent_title] => 'System and method for policy management'
[patent_app_type] => utility
[patent_app_number] => 10/882153
[patent_app_country] => US
[patent_app_date] => 2004-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 56
[patent_figures_cnt] => 56
[patent_no_of_words] => 37994
[patent_no_of_claims] => 111
[patent_no_of_ind_claims] => 28
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0180/20070180490.pdf
[firstpage_image] =>[orig_patent_app_number] => 10882153
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/882153 | System and method for policy management | Jun 30, 2004 | Abandoned |
Array
(
[id] => 7052504
[patent_doc_number] => 20050188223
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-08-25
[patent_title] => 'Computer system, central unit, and program execution method'
[patent_app_type] => utility
[patent_app_number] => 10/876595
[patent_app_country] => US
[patent_app_date] => 2004-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9578
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0188/20050188223.pdf
[firstpage_image] =>[orig_patent_app_number] => 10876595
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/876595 | Computer system, central unit, and program execution method | Jun 27, 2004 | Issued |
Array
(
[id] => 309551
[patent_doc_number] => 07533268
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2009-05-12
[patent_title] => 'Digital signature with an embedded view'
[patent_app_type] => utility
[patent_app_number] => 10/876418
[patent_app_country] => US
[patent_app_date] => 2004-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4989
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/533/07533268.pdf
[firstpage_image] =>[orig_patent_app_number] => 10876418
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/876418 | Digital signature with an embedded view | Jun 24, 2004 | Issued |
Array
(
[id] => 163712
[patent_doc_number] => 07676843
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2010-03-09
[patent_title] => 'Executing applications at appropriate trust levels'
[patent_app_type] => utility
[patent_app_number] => 10/876433
[patent_app_country] => US
[patent_app_date] => 2004-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6581
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/676/07676843.pdf
[firstpage_image] =>[orig_patent_app_number] => 10876433
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/876433 | Executing applications at appropriate trust levels | Jun 23, 2004 | Issued |
Array
(
[id] => 6932406
[patent_doc_number] => 20050283441
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-12-22
[patent_title] => 'Efficient policy change management in virtual private networks'
[patent_app_type] => utility
[patent_app_number] => 10/873754
[patent_app_country] => US
[patent_app_date] => 2004-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4143
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0283/20050283441.pdf
[firstpage_image] =>[orig_patent_app_number] => 10873754
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/873754 | Efficient policy change management in virtual private networks | Jun 20, 2004 | Abandoned |
Array
(
[id] => 7222855
[patent_doc_number] => 20050055556
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-03-10
[patent_title] => 'Policy enforcement'
[patent_app_type] => utility
[patent_app_number] => 10/871662
[patent_app_country] => US
[patent_app_date] => 2004-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 5566
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0055/20050055556.pdf
[firstpage_image] =>[orig_patent_app_number] => 10871662
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/871662 | Policy enforcement | Jun 17, 2004 | Abandoned |
Array
(
[id] => 6932902
[patent_doc_number] => 20050283821
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-12-22
[patent_title] => 'Method and system for providing fault tolerant physical security'
[patent_app_type] => utility
[patent_app_number] => 10/870624
[patent_app_country] => US
[patent_app_date] => 2004-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 6776
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0283/20050283821.pdf
[firstpage_image] =>[orig_patent_app_number] => 10870624
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/870624 | Method and system for providing fault tolerant physical security | Jun 16, 2004 | Abandoned |
Array
(
[id] => 6932911
[patent_doc_number] => 20050283825
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-12-22
[patent_title] => 'Method and system for providing networked physical security'
[patent_app_type] => utility
[patent_app_number] => 10/870628
[patent_app_country] => US
[patent_app_date] => 2004-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 6797
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0283/20050283825.pdf
[firstpage_image] =>[orig_patent_app_number] => 10870628
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/870628 | Method and system for providing networked physical security | Jun 16, 2004 | Abandoned |
Array
(
[id] => 158216
[patent_doc_number] => 07685637
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-03-23
[patent_title] => 'System security approaches using sub-expression automata'
[patent_app_type] => utility
[patent_app_number] => 10/868665
[patent_app_country] => US
[patent_app_date] => 2004-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 17
[patent_no_of_words] => 5696
[patent_no_of_claims] => 46
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/685/07685637.pdf
[firstpage_image] =>[orig_patent_app_number] => 10868665
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/868665 | System security approaches using sub-expression automata | Jun 13, 2004 | Issued |