
Samuel W. Liu
Examiner (ID: 18576, Phone: (571)272-0949 , Office: P/1656 )
| Most Active Art Unit | 1656 |
| Art Unit(s) | 1653, 1656 |
| Total Applications | 1005 |
| Issued Applications | 505 |
| Pending Applications | 93 |
| Abandoned Applications | 406 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 6411238
[patent_doc_number] => 20100180326
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-15
[patent_title] => 'SECURE REMOTE AUTHENTICATION THROUGH AN UNTRUSTED NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/354242
[patent_app_country] => US
[patent_app_date] => 2009-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9961
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0180/20100180326.pdf
[firstpage_image] =>[orig_patent_app_number] => 12354242
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/354242 | Secure remote authentication through an untrusted network | Jan 14, 2009 | Issued |
Array
(
[id] => 5317664
[patent_doc_number] => 20090282262
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-11-12
[patent_title] => 'Information Processing Apparatus, Information Processing System, and Encryption Information Management Method'
[patent_app_type] => utility
[patent_app_number] => 12/337412
[patent_app_country] => US
[patent_app_date] => 2008-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4525
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0282/20090282262.pdf
[firstpage_image] =>[orig_patent_app_number] => 12337412
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/337412 | Information Processing Apparatus, Information Processing System, and Encryption Information Management Method | Dec 16, 2008 | Abandoned |
Array
(
[id] => 7682550
[patent_doc_number] => 20100241861
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-23
[patent_title] => 'DHCP CLIENT SERVER SYSTEM, DHCP CLIENT DEVICE AND DHCP SERVER DEVICE'
[patent_app_type] => utility
[patent_app_number] => 12/734909
[patent_app_country] => US
[patent_app_date] => 2008-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8038
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0241/20100241861.pdf
[firstpage_image] =>[orig_patent_app_number] => 12734909
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/734909 | DHCP CLIENT SERVER SYSTEM, DHCP CLIENT DEVICE AND DHCP SERVER DEVICE | Dec 1, 2008 | Abandoned |
Array
(
[id] => 58188
[patent_doc_number] => 07774618
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-08-10
[patent_title] => 'Method and apparatus for cryptographic conversion in a data storage system'
[patent_app_type] => utility
[patent_app_number] => 12/270015
[patent_app_country] => US
[patent_app_date] => 2008-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 5033
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/774/07774618.pdf
[firstpage_image] =>[orig_patent_app_number] => 12270015
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/270015 | Method and apparatus for cryptographic conversion in a data storage system | Nov 12, 2008 | Issued |
Array
(
[id] => 6536291
[patent_doc_number] => 20100263021
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-10-14
[patent_title] => 'SYSTEM AND METHOD FOR SELECTION OF SECURITY ALGORITHMS'
[patent_app_type] => utility
[patent_app_number] => 12/734393
[patent_app_country] => US
[patent_app_date] => 2008-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5286
[patent_no_of_claims] => 55
[patent_no_of_ind_claims] => 12
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0263/20100263021.pdf
[firstpage_image] =>[orig_patent_app_number] => 12734393
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/734393 | System and method for selection of security algorithms | Oct 26, 2008 | Issued |
Array
(
[id] => 5560049
[patent_doc_number] => 20090271626
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-10-29
[patent_title] => 'METHODS AND DEVICES FOR ESTABLISHING SECURITY ASSOCIATIONS IN COMMUNICATIONS SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 12/203652
[patent_app_country] => US
[patent_app_date] => 2008-09-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6763
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0271/20090271626.pdf
[firstpage_image] =>[orig_patent_app_number] => 12203652
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/203652 | METHODS AND DEVICES FOR ESTABLISHING SECURITY ASSOCIATIONS IN COMMUNICATIONS SYSTEMS | Sep 2, 2008 | Abandoned |
Array
(
[id] => 6228393
[patent_doc_number] => 20100058469
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-03-04
[patent_title] => 'ANOMALY INFORMATION DISTRIBUTION WITH THRESHOLD'
[patent_app_type] => utility
[patent_app_number] => 12/203658
[patent_app_country] => US
[patent_app_date] => 2008-09-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 3596
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0058/20100058469.pdf
[firstpage_image] =>[orig_patent_app_number] => 12203658
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/203658 | Anomaly information distribution with threshold | Sep 2, 2008 | Issued |
Array
(
[id] => 9252014
[patent_doc_number] => 08615805
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-12-24
[patent_title] => 'Systems and methods for determining if a process is a malicious process'
[patent_app_type] => utility
[patent_app_number] => 12/203788
[patent_app_country] => US
[patent_app_date] => 2008-09-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7431
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12203788
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/203788 | Systems and methods for determining if a process is a malicious process | Sep 2, 2008 | Issued |
Array
(
[id] => 6219366
[patent_doc_number] => 20100054461
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-03-04
[patent_title] => 'SYSTEMS AND METHODS FOR IMPLEMENTING BLOCK CIPHER ALGORITHMS ON ATTACKER-CONTROLLED SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 12/203120
[patent_app_country] => US
[patent_app_date] => 2008-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7450
[patent_no_of_claims] => 48
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0054/20100054461.pdf
[firstpage_image] =>[orig_patent_app_number] => 12203120
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/203120 | Systems and methods for implementing block cipher algorithms on attacker-controlled systems | Sep 1, 2008 | Issued |
Array
(
[id] => 6532240
[patent_doc_number] => 20100287381
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-11-11
[patent_title] => 'AUTOMATED PASSWORD AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 12/201108
[patent_app_country] => US
[patent_app_date] => 2008-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2216
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0287/20100287381.pdf
[firstpage_image] =>[orig_patent_app_number] => 12201108
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/201108 | Automated password authentication | Aug 28, 2008 | Issued |
Array
(
[id] => 9853374
[patent_doc_number] => 08955123
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-10
[patent_title] => 'Method and system for preventing malicious communication'
[patent_app_type] => utility
[patent_app_number] => 12/198933
[patent_app_country] => US
[patent_app_date] => 2008-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3197
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12198933
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/198933 | Method and system for preventing malicious communication | Aug 26, 2008 | Issued |
Array
(
[id] => 5319412
[patent_doc_number] => 20090057402
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-03-05
[patent_title] => 'Information processing apparatus and information processing system'
[patent_app_type] => utility
[patent_app_number] => 12/230228
[patent_app_country] => US
[patent_app_date] => 2008-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 14130
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0057/20090057402.pdf
[firstpage_image] =>[orig_patent_app_number] => 12230228
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/230228 | Information processing apparatus and information processing system | Aug 25, 2008 | Issued |
Array
(
[id] => 6608772
[patent_doc_number] => 20100049373
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-02-25
[patent_title] => 'METHOD FOR MODULAR SOFTWARE REMOVAL'
[patent_app_type] => utility
[patent_app_number] => 12/197550
[patent_app_country] => US
[patent_app_date] => 2008-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3066
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0049/20100049373.pdf
[firstpage_image] =>[orig_patent_app_number] => 12197550
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/197550 | METHOD FOR MODULAR SOFTWARE REMOVAL | Aug 24, 2008 | Abandoned |
Array
(
[id] => 10061047
[patent_doc_number] => 09100418
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-04
[patent_title] => 'Adaptive data verification for resource-constrained systems'
[patent_app_type] => utility
[patent_app_number] => 12/195737
[patent_app_country] => US
[patent_app_date] => 2008-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 4325
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12195737
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/195737 | Adaptive data verification for resource-constrained systems | Aug 20, 2008 | Issued |
Array
(
[id] => 5283984
[patent_doc_number] => 20090097659
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-04-16
[patent_title] => 'Method for Detection of a Hacked Decoder'
[patent_app_type] => utility
[patent_app_number] => 12/195660
[patent_app_country] => US
[patent_app_date] => 2008-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9012
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0097/20090097659.pdf
[firstpage_image] =>[orig_patent_app_number] => 12195660
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/195660 | Method for detection of a hacked decoder | Aug 20, 2008 | Issued |
Array
(
[id] => 9695377
[patent_doc_number] => 08826005
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-09-02
[patent_title] => 'Security for software in a computing system'
[patent_app_type] => utility
[patent_app_number] => 12/195800
[patent_app_country] => US
[patent_app_date] => 2008-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6772
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12195800
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/195800 | Security for software in a computing system | Aug 20, 2008 | Issued |
Array
(
[id] => 5339439
[patent_doc_number] => 20090055903
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-02-26
[patent_title] => 'INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD'
[patent_app_type] => utility
[patent_app_number] => 12/195761
[patent_app_country] => US
[patent_app_date] => 2008-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8078
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0055/20090055903.pdf
[firstpage_image] =>[orig_patent_app_number] => 12195761
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/195761 | Information processing system, information processing apparatus, and information processing method | Aug 20, 2008 | Issued |
Array
(
[id] => 8461164
[patent_doc_number] => 08296850
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-10-23
[patent_title] => 'Detecting global anomalies'
[patent_app_type] => utility
[patent_app_number] => 12/195786
[patent_app_country] => US
[patent_app_date] => 2008-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 7914
[patent_no_of_claims] => 57
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 25
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12195786
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/195786 | Detecting global anomalies | Aug 20, 2008 | Issued |
Array
(
[id] => 7686159
[patent_doc_number] => 20090178132
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-07-09
[patent_title] => 'Enterprise Security Assessment Sharing For Consumers Using Globally Distributed Infrastructure'
[patent_app_type] => utility
[patent_app_number] => 12/192107
[patent_app_country] => US
[patent_app_date] => 2008-08-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 9967
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0178/20090178132.pdf
[firstpage_image] =>[orig_patent_app_number] => 12192107
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/192107 | Enterprise security assessment sharing for consumers using globally distributed infrastructure | Aug 13, 2008 | Issued |
Array
(
[id] => 10854510
[patent_doc_number] => 08881223
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-11-04
[patent_title] => 'Enterprise security assessment sharing for off-premise users using globally distributed infrastructure'
[patent_app_type] => utility
[patent_app_number] => 12/192111
[patent_app_country] => US
[patent_app_date] => 2008-08-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 9967
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12192111
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/192111 | Enterprise security assessment sharing for off-premise users using globally distributed infrastructure | Aug 13, 2008 | Issued |