
Samuel W. Liu
Examiner (ID: 18576, Phone: (571)272-0949 , Office: P/1656 )
| Most Active Art Unit | 1656 |
| Art Unit(s) | 1653, 1656 |
| Total Applications | 1005 |
| Issued Applications | 505 |
| Pending Applications | 93 |
| Abandoned Applications | 406 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9934200
[patent_doc_number] => 20150082393
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-19
[patent_title] => 'SECURE ESTABLISHMENT METHOD, SYSTEM AND DEVICE OF WIRELESS LOCAL AREA NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/550629
[patent_app_country] => US
[patent_app_date] => 2014-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 21370
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14550629
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/550629 | Secure establishment method, system and device of wireless local area network | Nov 20, 2014 | Issued |
Array
(
[id] => 11207183
[patent_doc_number] => 09436810
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-06
[patent_title] => 'Determination of copied content, including attribution'
[patent_app_type] => utility
[patent_app_number] => 14/541422
[patent_app_country] => US
[patent_app_date] => 2014-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 17208
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14541422
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/541422 | Determination of copied content, including attribution | Nov 13, 2014 | Issued |
Array
(
[id] => 11181733
[patent_doc_number] => 09413743
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-09
[patent_title] => 'Trust based digital rights management systems'
[patent_app_type] => utility
[patent_app_number] => 14/476370
[patent_app_country] => US
[patent_app_date] => 2014-09-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10013
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14476370
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/476370 | Trust based digital rights management systems | Sep 2, 2014 | Issued |
Array
(
[id] => 10948565
[patent_doc_number] => 20140351586
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-27
[patent_title] => 'CRYPTOGRAPHIC METHOD AND SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/455300
[patent_app_country] => US
[patent_app_date] => 2014-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 60625
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14455300
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/455300 | CRYPTOGRAPHIC METHOD AND SYSTEM | Aug 7, 2014 | Abandoned |
Array
(
[id] => 10921981
[patent_doc_number] => 20140325000
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-30
[patent_title] => 'ICONIC COMMUNICATION'
[patent_app_type] => utility
[patent_app_number] => 14/324925
[patent_app_country] => US
[patent_app_date] => 2014-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 42132
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14324925
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/324925 | ICONIC COMMUNICATION | Jul 6, 2014 | Abandoned |
Array
(
[id] => 10818509
[patent_doc_number] => 20160164673
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-09
[patent_title] => 'METHOD FOR CHANGING AN AUTHENTICATION KEY'
[patent_app_type] => utility
[patent_app_number] => 14/900038
[patent_app_country] => US
[patent_app_date] => 2014-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8542
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14900038
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/900038 | Method for changing an authentication key | Jun 26, 2014 | Issued |
Array
(
[id] => 11392600
[patent_doc_number] => 09553856
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-24
[patent_title] => 'Secure session capability using public-key cryptography without access to the private key'
[patent_app_type] => utility
[patent_app_number] => 14/315241
[patent_app_country] => US
[patent_app_date] => 2014-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 12704
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14315241
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/315241 | Secure session capability using public-key cryptography without access to the private key | Jun 24, 2014 | Issued |
Array
(
[id] => 9787976
[patent_doc_number] => 20140304796
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-09
[patent_title] => 'PROVIDING GUEST USERS NETWORK ACCESS BASED ON INFORMATION READ FROM A CREDIT CARD OR OTHER OBJECT'
[patent_app_type] => utility
[patent_app_number] => 14/309134
[patent_app_country] => US
[patent_app_date] => 2014-06-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9101
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14309134
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/309134 | PROVIDING GUEST USERS NETWORK ACCESS BASED ON INFORMATION READ FROM A CREDIT CARD OR OTHER OBJECT | Jun 18, 2014 | Abandoned |
Array
(
[id] => 10473286
[patent_doc_number] => 20150358303
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-10
[patent_title] => 'COMBINING FEED ITEMS ASSOCIATED WITH A DATABASE RECORD FOR PRESENTATION IN A FEED'
[patent_app_type] => utility
[patent_app_number] => 14/297207
[patent_app_country] => US
[patent_app_date] => 2014-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 14619
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14297207
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/297207 | COMBINING FEED ITEMS ASSOCIATED WITH A DATABASE RECORD FOR PRESENTATION IN A FEED | Jun 4, 2014 | Abandoned |
Array
(
[id] => 10441536
[patent_doc_number] => 20150326548
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'MANAGEMENT OF DIGITAL ASSETS'
[patent_app_type] => utility
[patent_app_number] => 14/275819
[patent_app_country] => US
[patent_app_date] => 2014-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11495
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14275819
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/275819 | MANAGEMENT OF DIGITAL ASSETS | May 11, 2014 | Abandoned |
Array
(
[id] => 10034684
[patent_doc_number] => 09076004
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-07-07
[patent_title] => 'Systems and methods for secure hybrid third-party data storage'
[patent_app_type] => utility
[patent_app_number] => 14/271967
[patent_app_country] => US
[patent_app_date] => 2014-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12775
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14271967
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/271967 | Systems and methods for secure hybrid third-party data storage | May 6, 2014 | Issued |
Array
(
[id] => 9723396
[patent_doc_number] => 20140259097
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-11
[patent_title] => 'DETERMINATION OF ORIGINALITY OF CONTENT'
[patent_app_type] => utility
[patent_app_number] => 14/271297
[patent_app_country] => US
[patent_app_date] => 2014-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 17156
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14271297
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/271297 | Determination of originality of content | May 5, 2014 | Issued |
Array
(
[id] => 9645460
[patent_doc_number] => 20140223573
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-07
[patent_title] => 'DIGITAL CONTENT DELIVERY'
[patent_app_type] => utility
[patent_app_number] => 14/243685
[patent_app_country] => US
[patent_app_date] => 2014-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 40
[patent_figures_cnt] => 40
[patent_no_of_words] => 25296
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14243685
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/243685 | DIGITAL CONTENT DELIVERY | Apr 1, 2014 | Abandoned |
Array
(
[id] => 10396179
[patent_doc_number] => 20150281186
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-01
[patent_title] => 'CONTENT PROTECTION FOR DATA AS A SERVICE (DAAS)'
[patent_app_type] => utility
[patent_app_number] => 14/361759
[patent_app_country] => US
[patent_app_date] => 2013-12-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8320
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14361759
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/361759 | Content protection for data as a service (DaaS) | Dec 23, 2013 | Issued |
Array
(
[id] => 10295893
[patent_doc_number] => 20150180891
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-25
[patent_title] => 'USING NETWORK LOCATIONS OBTAINED FROM MULTIPLE THREAT LISTS TO EVALUATE NETWORK DATA OR MACHINE DATA'
[patent_app_type] => utility
[patent_app_number] => 14/135427
[patent_app_country] => US
[patent_app_date] => 2013-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 16736
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14135427
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/135427 | Using network locations obtained from multiple threat lists to evaluate network data or machine data | Dec 18, 2013 | Issued |
Array
(
[id] => 11639012
[patent_doc_number] => 09661004
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-05-23
[patent_title] => 'Systems and methods for using reputation information to evaluate the trustworthiness of files obtained via torrent transactions'
[patent_app_type] => utility
[patent_app_number] => 14/065394
[patent_app_country] => US
[patent_app_date] => 2013-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10703
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14065394
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/065394 | Systems and methods for using reputation information to evaluate the trustworthiness of files obtained via torrent transactions | Oct 27, 2013 | Issued |
Array
(
[id] => 9398484
[patent_doc_number] => 20140095890
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-03
[patent_title] => 'SYSTEMS AND METHODS FOR MANIPULATING SENSITIVE INFORMATION IN A SECURE MOBILE ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/043233
[patent_app_country] => US
[patent_app_date] => 2013-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8155
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14043233
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/043233 | Systems and methods for manipulating sensitive information in a secure mobile environment | Sep 30, 2013 | Issued |
Array
(
[id] => 9423998
[patent_doc_number] => 20140108649
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-17
[patent_title] => 'CONFIGURING AND PROVIDING PROFILES THAT MANAGE EXECUTION OF MOBILE APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 14/041946
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 25303
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14041946
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/041946 | Configuring and providing profiles that manage execution of mobile applications | Sep 29, 2013 | Issued |
Array
(
[id] => 10178144
[patent_doc_number] => 09208351
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-08
[patent_title] => 'Processing information'
[patent_app_type] => utility
[patent_app_number] => 14/028998
[patent_app_country] => US
[patent_app_date] => 2013-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10124
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 206
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14028998
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/028998 | Processing information | Sep 16, 2013 | Issued |
Array
(
[id] => 9199826
[patent_doc_number] => 20130339141
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-19
[patent_title] => 'Single System for Authenticating Entities Across Different Third Party Platforms'
[patent_app_type] => utility
[patent_app_number] => 13/971445
[patent_app_country] => US
[patent_app_date] => 2013-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12035
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13971445
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/971445 | Single system for authenticating entities across different third party platforms | Aug 19, 2013 | Issued |