Search

Qian Yang

Examiner (ID: 4325)

Most Active Art Unit
2668
Art Unit(s)
2625, 2662, 2674, 2668, 2677
Total Applications
1136
Issued Applications
826
Pending Applications
72
Abandoned Applications
255

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10603131 [patent_doc_number] => 09323696 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-04-26 [patent_title] => 'Data security system' [patent_app_type] => utility [patent_app_number] => 14/480283 [patent_app_country] => US [patent_app_date] => 2014-09-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 22 [patent_no_of_words] => 10246 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 158 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14480283 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/480283
Data security system Sep 7, 2014 Issued
Array ( [id] => 11960454 [patent_doc_number] => 20170264606 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-09-14 [patent_title] => 'User Equipment Identity Valid for Heterogeneous Networks' [patent_app_type] => utility [patent_app_number] => 15/504044 [patent_app_country] => US [patent_app_date] => 2014-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 11653 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 10 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15504044 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/504044
User equipment identity valid for heterogeneous networks Aug 27, 2014 Issued
Array ( [id] => 11854056 [patent_doc_number] => 20170228548 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-08-10 [patent_title] => 'ENCRYPTED CODE EXECUTION' [patent_app_type] => utility [patent_app_number] => 15/501704 [patent_app_country] => US [patent_app_date] => 2014-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3043 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15501704 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/501704
ENCRYPTED CODE EXECUTION Aug 19, 2014 Abandoned
Array ( [id] => 10948862 [patent_doc_number] => 20140351883 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-11-27 [patent_title] => 'E-MAIL FIREWALL WITH POLICY-BASED CRYPTOSECURITY' [patent_app_type] => utility [patent_app_number] => 14/453441 [patent_app_country] => US [patent_app_date] => 2014-08-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6440 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14453441 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/453441
E-mail firewall with policy-based cryptosecurity Aug 5, 2014 Issued
Array ( [id] => 10478564 [patent_doc_number] => 20150363581 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-17 [patent_title] => 'SYSTEMS AND METHODS FOR AUTHENTICATING A USER BASED ON A COMPUTING DEVICE' [patent_app_type] => utility [patent_app_number] => 14/306036 [patent_app_country] => US [patent_app_date] => 2014-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 13515 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14306036 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/306036
Systems and methods for authenticating a user based on a computing device Jun 15, 2014 Issued
Array ( [id] => 13213225 [patent_doc_number] => 10120986 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-11-06 [patent_title] => Controlling execution of a software application on an execution platform in a local network [patent_app_type] => utility [patent_app_number] => 14/305771 [patent_app_country] => US [patent_app_date] => 2014-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3437 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 262 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14305771 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/305771
Controlling execution of a software application on an execution platform in a local network Jun 15, 2014 Issued
Array ( [id] => 9814517 [patent_doc_number] => 20150026462 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-22 [patent_title] => 'METHOD AND SYSTEM FOR ACCESS-CONTROLLED DECRYPTION IN BIG DATA STORES' [patent_app_type] => utility [patent_app_number] => 14/304902 [patent_app_country] => US [patent_app_date] => 2014-06-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3485 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14304902 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/304902
METHOD AND SYSTEM FOR ACCESS-CONTROLLED DECRYPTION IN BIG DATA STORES Jun 13, 2014 Abandoned
Array ( [id] => 12296742 [patent_doc_number] => 09935939 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-04-03 [patent_title] => Keyboard login manager [patent_app_type] => utility [patent_app_number] => 14/304047 [patent_app_country] => US [patent_app_date] => 2014-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8620 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14304047 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/304047
Keyboard login manager Jun 12, 2014 Issued
Array ( [id] => 13008043 [patent_doc_number] => 10027702 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-07-17 [patent_title] => Identification of malicious shortened uniform resource locators [patent_app_type] => utility [patent_app_number] => 14/304001 [patent_app_country] => US [patent_app_date] => 2014-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 3922 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14304001 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/304001
Identification of malicious shortened uniform resource locators Jun 12, 2014 Issued
Array ( [id] => 9933848 [patent_doc_number] => 20150082040 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-19 [patent_title] => 'METHOD, INFORMATION SERVICE SYSTEM AND PROGRAM FOR INFORMATION ENCRYPTION/DECRYPTION' [patent_app_type] => utility [patent_app_number] => 14/304255 [patent_app_country] => US [patent_app_date] => 2014-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6950 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14304255 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/304255
Method, information service system and program for information encryption/decryption Jun 12, 2014 Issued
Array ( [id] => 13120793 [patent_doc_number] => 10078750 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-09-18 [patent_title] => Methods and systems for finding compromised social networking accounts [patent_app_type] => utility [patent_app_number] => 14/303986 [patent_app_country] => US [patent_app_date] => 2014-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 4561 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 67 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14303986 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/303986
Methods and systems for finding compromised social networking accounts Jun 12, 2014 Issued
Array ( [id] => 9934194 [patent_doc_number] => 20150082386 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-19 [patent_title] => 'METHOD AND SYSTEM FOR SHARING CONTENT FILES USING A COMPUTER SYSTEM AND DATA NETWORK' [patent_app_type] => utility [patent_app_number] => 14/303927 [patent_app_country] => US [patent_app_date] => 2014-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 53 [patent_figures_cnt] => 53 [patent_no_of_words] => 5427 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14303927 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/303927
Method and system for sharing content files using a computer system and data network Jun 12, 2014 Issued
Array ( [id] => 13032189 [patent_doc_number] => 10038726 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-07-31 [patent_title] => Data sensitivity based authentication and authorization [patent_app_type] => utility [patent_app_number] => 14/303461 [patent_app_country] => US [patent_app_date] => 2014-06-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 9258 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 252 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14303461 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/303461
Data sensitivity based authentication and authorization Jun 11, 2014 Issued
Array ( [id] => 13100925 [patent_doc_number] => 10069815 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-09-04 [patent_title] => Server apparatus, communication system, and data issuing method [patent_app_type] => utility [patent_app_number] => 14/301793 [patent_app_country] => US [patent_app_date] => 2014-06-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8802 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 338 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14301793 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/301793
Server apparatus, communication system, and data issuing method Jun 10, 2014 Issued
Array ( [id] => 11552661 [patent_doc_number] => 09621529 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-04-11 [patent_title] => 'Information processing system, apparatus, and method' [patent_app_type] => utility [patent_app_number] => 14/301428 [patent_app_country] => US [patent_app_date] => 2014-06-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 16 [patent_no_of_words] => 13441 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 279 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14301428 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/301428
Information processing system, apparatus, and method Jun 10, 2014 Issued
Array ( [id] => 11550780 [patent_doc_number] => 09619631 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-04-11 [patent_title] => 'Role-based permissions for accessing computing resources' [patent_app_type] => utility [patent_app_number] => 14/301849 [patent_app_country] => US [patent_app_date] => 2014-06-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 22 [patent_figures_cnt] => 22 [patent_no_of_words] => 9655 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 226 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14301849 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/301849
Role-based permissions for accessing computing resources Jun 10, 2014 Issued
Array ( [id] => 10478578 [patent_doc_number] => 20150363595 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-17 [patent_title] => 'COMPUTER SECURITY MONITORING WITH TRIGGERED REPORTING' [patent_app_type] => utility [patent_app_number] => 14/301612 [patent_app_country] => US [patent_app_date] => 2014-06-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2740 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14301612 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/301612
COMPUTER SECURITY MONITORING WITH TRIGGERED REPORTING Jun 10, 2014 Abandoned
Array ( [id] => 11803354 [patent_doc_number] => 09544286 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-01-10 [patent_title] => 'Methods and systems for increasing the security of electronic messages' [patent_app_type] => utility [patent_app_number] => 14/222743 [patent_app_country] => US [patent_app_date] => 2014-03-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 14 [patent_no_of_words] => 11900 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14222743 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/222743
Methods and systems for increasing the security of electronic messages Mar 23, 2014 Issued
Array ( [id] => 9564279 [patent_doc_number] => 20140181991 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-06-26 [patent_title] => 'ADVANCED MULTI-CHANNEL WATERMARKING SYSTEM AND METHOD' [patent_app_type] => utility [patent_app_number] => 14/192769 [patent_app_country] => US [patent_app_date] => 2014-02-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 15597 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14192769 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/192769
ADVANCED MULTI-CHANNEL WATERMARKING SYSTEM AND METHOD Feb 26, 2014 Abandoned
Array ( [id] => 9548641 [patent_doc_number] => 20140173289 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-06-19 [patent_title] => 'MOBILE IDENTITY PROVIDER WITH TWO FACTOR AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 14/187575 [patent_app_country] => US [patent_app_date] => 2014-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 10962 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14187575 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/187575
MOBILE IDENTITY PROVIDER WITH TWO FACTOR AUTHENTICATION Feb 23, 2014 Abandoned
Menu