Search

Samuel W. Liu

Examiner (ID: 18576, Phone: (571)272-0949 , Office: P/1656 )

Most Active Art Unit
1656
Art Unit(s)
1653, 1656
Total Applications
1005
Issued Applications
505
Pending Applications
93
Abandoned Applications
406

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 6411238 [patent_doc_number] => 20100180326 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-15 [patent_title] => 'SECURE REMOTE AUTHENTICATION THROUGH AN UNTRUSTED NETWORK' [patent_app_type] => utility [patent_app_number] => 12/354242 [patent_app_country] => US [patent_app_date] => 2009-01-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 9961 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0180/20100180326.pdf [firstpage_image] =>[orig_patent_app_number] => 12354242 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/354242
Secure remote authentication through an untrusted network Jan 14, 2009 Issued
Array ( [id] => 5317664 [patent_doc_number] => 20090282262 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-11-12 [patent_title] => 'Information Processing Apparatus, Information Processing System, and Encryption Information Management Method' [patent_app_type] => utility [patent_app_number] => 12/337412 [patent_app_country] => US [patent_app_date] => 2008-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 4525 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0282/20090282262.pdf [firstpage_image] =>[orig_patent_app_number] => 12337412 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/337412
Information Processing Apparatus, Information Processing System, and Encryption Information Management Method Dec 16, 2008 Abandoned
Array ( [id] => 7682550 [patent_doc_number] => 20100241861 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-09-23 [patent_title] => 'DHCP CLIENT SERVER SYSTEM, DHCP CLIENT DEVICE AND DHCP SERVER DEVICE' [patent_app_type] => utility [patent_app_number] => 12/734909 [patent_app_country] => US [patent_app_date] => 2008-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 8038 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0241/20100241861.pdf [firstpage_image] =>[orig_patent_app_number] => 12734909 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/734909
DHCP CLIENT SERVER SYSTEM, DHCP CLIENT DEVICE AND DHCP SERVER DEVICE Dec 1, 2008 Abandoned
Array ( [id] => 58188 [patent_doc_number] => 07774618 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-08-10 [patent_title] => 'Method and apparatus for cryptographic conversion in a data storage system' [patent_app_type] => utility [patent_app_number] => 12/270015 [patent_app_country] => US [patent_app_date] => 2008-11-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 5033 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 143 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/774/07774618.pdf [firstpage_image] =>[orig_patent_app_number] => 12270015 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/270015
Method and apparatus for cryptographic conversion in a data storage system Nov 12, 2008 Issued
Array ( [id] => 6536291 [patent_doc_number] => 20100263021 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-10-14 [patent_title] => 'SYSTEM AND METHOD FOR SELECTION OF SECURITY ALGORITHMS' [patent_app_type] => utility [patent_app_number] => 12/734393 [patent_app_country] => US [patent_app_date] => 2008-10-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5286 [patent_no_of_claims] => 55 [patent_no_of_ind_claims] => 12 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0263/20100263021.pdf [firstpage_image] =>[orig_patent_app_number] => 12734393 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/734393
System and method for selection of security algorithms Oct 26, 2008 Issued
Array ( [id] => 5560049 [patent_doc_number] => 20090271626 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-10-29 [patent_title] => 'METHODS AND DEVICES FOR ESTABLISHING SECURITY ASSOCIATIONS IN COMMUNICATIONS SYSTEMS' [patent_app_type] => utility [patent_app_number] => 12/203652 [patent_app_country] => US [patent_app_date] => 2008-09-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6763 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0271/20090271626.pdf [firstpage_image] =>[orig_patent_app_number] => 12203652 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/203652
METHODS AND DEVICES FOR ESTABLISHING SECURITY ASSOCIATIONS IN COMMUNICATIONS SYSTEMS Sep 2, 2008 Abandoned
Array ( [id] => 6228393 [patent_doc_number] => 20100058469 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-03-04 [patent_title] => 'ANOMALY INFORMATION DISTRIBUTION WITH THRESHOLD' [patent_app_type] => utility [patent_app_number] => 12/203658 [patent_app_country] => US [patent_app_date] => 2008-09-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 3596 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0058/20100058469.pdf [firstpage_image] =>[orig_patent_app_number] => 12203658 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/203658
Anomaly information distribution with threshold Sep 2, 2008 Issued
Array ( [id] => 9252014 [patent_doc_number] => 08615805 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-12-24 [patent_title] => 'Systems and methods for determining if a process is a malicious process' [patent_app_type] => utility [patent_app_number] => 12/203788 [patent_app_country] => US [patent_app_date] => 2008-09-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 7431 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12203788 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/203788
Systems and methods for determining if a process is a malicious process Sep 2, 2008 Issued
Array ( [id] => 6219366 [patent_doc_number] => 20100054461 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-03-04 [patent_title] => 'SYSTEMS AND METHODS FOR IMPLEMENTING BLOCK CIPHER ALGORITHMS ON ATTACKER-CONTROLLED SYSTEMS' [patent_app_type] => utility [patent_app_number] => 12/203120 [patent_app_country] => US [patent_app_date] => 2008-09-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 7450 [patent_no_of_claims] => 48 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0054/20100054461.pdf [firstpage_image] =>[orig_patent_app_number] => 12203120 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/203120
Systems and methods for implementing block cipher algorithms on attacker-controlled systems Sep 1, 2008 Issued
Array ( [id] => 6532240 [patent_doc_number] => 20100287381 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-11-11 [patent_title] => 'AUTOMATED PASSWORD AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 12/201108 [patent_app_country] => US [patent_app_date] => 2008-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 2216 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0287/20100287381.pdf [firstpage_image] =>[orig_patent_app_number] => 12201108 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/201108
Automated password authentication Aug 28, 2008 Issued
Array ( [id] => 9853374 [patent_doc_number] => 08955123 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-02-10 [patent_title] => 'Method and system for preventing malicious communication' [patent_app_type] => utility [patent_app_number] => 12/198933 [patent_app_country] => US [patent_app_date] => 2008-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3197 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 113 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12198933 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/198933
Method and system for preventing malicious communication Aug 26, 2008 Issued
Array ( [id] => 5319412 [patent_doc_number] => 20090057402 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-03-05 [patent_title] => 'Information processing apparatus and information processing system' [patent_app_type] => utility [patent_app_number] => 12/230228 [patent_app_country] => US [patent_app_date] => 2008-08-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 14130 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0057/20090057402.pdf [firstpage_image] =>[orig_patent_app_number] => 12230228 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/230228
Information processing apparatus and information processing system Aug 25, 2008 Issued
Array ( [id] => 6608772 [patent_doc_number] => 20100049373 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-02-25 [patent_title] => 'METHOD FOR MODULAR SOFTWARE REMOVAL' [patent_app_type] => utility [patent_app_number] => 12/197550 [patent_app_country] => US [patent_app_date] => 2008-08-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3066 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0049/20100049373.pdf [firstpage_image] =>[orig_patent_app_number] => 12197550 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/197550
METHOD FOR MODULAR SOFTWARE REMOVAL Aug 24, 2008 Abandoned
Array ( [id] => 10061047 [patent_doc_number] => 09100418 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-08-04 [patent_title] => 'Adaptive data verification for resource-constrained systems' [patent_app_type] => utility [patent_app_number] => 12/195737 [patent_app_country] => US [patent_app_date] => 2008-08-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 3 [patent_no_of_words] => 4325 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 190 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12195737 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/195737
Adaptive data verification for resource-constrained systems Aug 20, 2008 Issued
Array ( [id] => 5283984 [patent_doc_number] => 20090097659 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-04-16 [patent_title] => 'Method for Detection of a Hacked Decoder' [patent_app_type] => utility [patent_app_number] => 12/195660 [patent_app_country] => US [patent_app_date] => 2008-08-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9012 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0097/20090097659.pdf [firstpage_image] =>[orig_patent_app_number] => 12195660 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/195660
Method for detection of a hacked decoder Aug 20, 2008 Issued
Array ( [id] => 9695377 [patent_doc_number] => 08826005 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-09-02 [patent_title] => 'Security for software in a computing system' [patent_app_type] => utility [patent_app_number] => 12/195800 [patent_app_country] => US [patent_app_date] => 2008-08-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6772 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12195800 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/195800
Security for software in a computing system Aug 20, 2008 Issued
Array ( [id] => 5339439 [patent_doc_number] => 20090055903 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-02-26 [patent_title] => 'INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD' [patent_app_type] => utility [patent_app_number] => 12/195761 [patent_app_country] => US [patent_app_date] => 2008-08-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8078 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0055/20090055903.pdf [firstpage_image] =>[orig_patent_app_number] => 12195761 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/195761
Information processing system, information processing apparatus, and information processing method Aug 20, 2008 Issued
Array ( [id] => 8461164 [patent_doc_number] => 08296850 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-10-23 [patent_title] => 'Detecting global anomalies' [patent_app_type] => utility [patent_app_number] => 12/195786 [patent_app_country] => US [patent_app_date] => 2008-08-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 11 [patent_no_of_words] => 7914 [patent_no_of_claims] => 57 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 25 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12195786 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/195786
Detecting global anomalies Aug 20, 2008 Issued
Array ( [id] => 7686159 [patent_doc_number] => 20090178132 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-07-09 [patent_title] => 'Enterprise Security Assessment Sharing For Consumers Using Globally Distributed Infrastructure' [patent_app_type] => utility [patent_app_number] => 12/192107 [patent_app_country] => US [patent_app_date] => 2008-08-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 9967 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0178/20090178132.pdf [firstpage_image] =>[orig_patent_app_number] => 12192107 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/192107
Enterprise security assessment sharing for consumers using globally distributed infrastructure Aug 13, 2008 Issued
Array ( [id] => 10854510 [patent_doc_number] => 08881223 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-11-04 [patent_title] => 'Enterprise security assessment sharing for off-premise users using globally distributed infrastructure' [patent_app_type] => utility [patent_app_number] => 12/192111 [patent_app_country] => US [patent_app_date] => 2008-08-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 9967 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 264 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12192111 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/192111
Enterprise security assessment sharing for off-premise users using globally distributed infrastructure Aug 13, 2008 Issued
Menu