
Samuel W. Liu
Examiner (ID: 18576, Phone: (571)272-0949 , Office: P/1656 )
| Most Active Art Unit | 1656 |
| Art Unit(s) | 1653, 1656 |
| Total Applications | 1005 |
| Issued Applications | 505 |
| Pending Applications | 93 |
| Abandoned Applications | 406 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16632413
[patent_doc_number] => 20210051067
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-18
[patent_title] => SYSTEMS AND METHODS FOR AUTOMATED GOVERNANCE, RISK, AND COMPLIANCE
[patent_app_type] => utility
[patent_app_number] => 17/087196
[patent_app_country] => US
[patent_app_date] => 2020-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10470
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17087196
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/087196 | Systems and methods for automated governance, risk, and compliance | Nov 1, 2020 | Issued |
Array
(
[id] => 16632373
[patent_doc_number] => 20210051027
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-18
[patent_title] => USER IDENTITY INFORMATION AUTHENTICATION AND VERIFICATION METHODS AND DEVICES
[patent_app_type] => utility
[patent_app_number] => 17/086123
[patent_app_country] => US
[patent_app_date] => 2020-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11460
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17086123
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/086123 | USER IDENTITY INFORMATION AUTHENTICATION AND VERIFICATION METHODS AND DEVICES | Oct 29, 2020 | Abandoned |
Array
(
[id] => 18790337
[patent_doc_number] => 20230379151
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-11-23
[patent_title] => SECURE SHIFT SYSTEM, SECURE SHIFT APPARATUS, SECURE SHIFT METHOD, AND PROGRAM
[patent_app_type] => utility
[patent_app_number] => 18/029919
[patent_app_country] => US
[patent_app_date] => 2020-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9736
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -2
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18029919
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/029919 | SECURE SHIFT SYSTEM, SECURE SHIFT APPARATUS, SECURE SHIFT METHOD, AND PROGRAM | Oct 15, 2020 | Pending |
Array
(
[id] => 16579802
[patent_doc_number] => 20210014204
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-14
[patent_title] => SECURE SESSION CAPABILITY USING PUBLIC-KEY CRYPTOGRAPHY WITHOUT ACCESS TO THE PRIVATE KEY
[patent_app_type] => utility
[patent_app_number] => 17/036988
[patent_app_country] => US
[patent_app_date] => 2020-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12424
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17036988
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/036988 | Secure session capability using public-key cryptography without access to the private key | Sep 28, 2020 | Issued |
Array
(
[id] => 17465313
[patent_doc_number] => 20220078619
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-10
[patent_title] => CONTROLLING WI-FI TRAFFIC FROM NETWORK APPLICATIONS WITH CENTRALIZED FIREWALL RULES IMPLEMENTED AT THE EDGE OF A DATA COMMUNICATION NETWORK
[patent_app_type] => utility
[patent_app_number] => 17/013802
[patent_app_country] => US
[patent_app_date] => 2020-09-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3541
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17013802
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/013802 | Controlling wi-fi traffic from network applications with centralized firewall rules implemented at the edge of a data communication network | Sep 6, 2020 | Issued |
Array
(
[id] => 17388087
[patent_doc_number] => 20220035939
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-02-03
[patent_title] => METHOD AND SYSTEM FOR DYNAMIC DATA MASKING
[patent_app_type] => utility
[patent_app_number] => 16/983321
[patent_app_country] => US
[patent_app_date] => 2020-08-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6880
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16983321
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/983321 | METHOD AND SYSTEM FOR DYNAMIC DATA MASKING | Aug 2, 2020 | Abandoned |
Array
(
[id] => 19429291
[patent_doc_number] => 12088737
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-09-10
[patent_title] => Method to establish an application level SSL certificate hierarchy between master node and capacity nodes based on hardware level certificate hierarchy
[patent_app_type] => utility
[patent_app_number] => 16/919526
[patent_app_country] => US
[patent_app_date] => 2020-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4189
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 327
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16919526
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/919526 | Method to establish an application level SSL certificate hierarchy between master node and capacity nodes based on hardware level certificate hierarchy | Jul 1, 2020 | Issued |
Array
(
[id] => 16395374
[patent_doc_number] => 20200336315
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-22
[patent_title] => VALIDATION CRYPTOGRAM FOR TRANSACTION
[patent_app_type] => utility
[patent_app_number] => 16/920251
[patent_app_country] => US
[patent_app_date] => 2020-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13338
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16920251
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/920251 | VALIDATION CRYPTOGRAM FOR TRANSACTION | Jul 1, 2020 | Abandoned |
Array
(
[id] => 19047511
[patent_doc_number] => 11936638
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-03-19
[patent_title] => Link protocol agents for inter-application communications
[patent_app_type] => utility
[patent_app_number] => 16/914435
[patent_app_country] => US
[patent_app_date] => 2020-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10714
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16914435
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/914435 | Link protocol agents for inter-application communications | Jun 27, 2020 | Issued |
Array
(
[id] => 17261252
[patent_doc_number] => 20210374237
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-02
[patent_title] => LAYERED ANALYSIS FOR NETWORK SECURITY RISK DETECTION
[patent_app_type] => utility
[patent_app_number] => 16/888002
[patent_app_country] => US
[patent_app_date] => 2020-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10933
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16888002
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/888002 | Layered analysis for network security risk detection | May 28, 2020 | Issued |
Array
(
[id] => 18562060
[patent_doc_number] => 11727306
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-08-15
[patent_title] => Distributed artificial intelligence model with deception nodes
[patent_app_type] => utility
[patent_app_number] => 16/879326
[patent_app_country] => US
[patent_app_date] => 2020-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6352
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 244
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16879326
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/879326 | Distributed artificial intelligence model with deception nodes | May 19, 2020 | Issued |
Array
(
[id] => 18508422
[patent_doc_number] => 11706254
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-18
[patent_title] => Method and apparatus for identifying encrypted data stream
[patent_app_type] => utility
[patent_app_number] => 16/874237
[patent_app_country] => US
[patent_app_date] => 2020-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 23279
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 279
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16874237
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/874237 | Method and apparatus for identifying encrypted data stream | May 13, 2020 | Issued |
Array
(
[id] => 18914151
[patent_doc_number] => 11877153
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-01-16
[patent_title] => Method of authentication of wireless communication based on physical layer security
[patent_app_type] => utility
[patent_app_number] => 17/438803
[patent_app_country] => US
[patent_app_date] => 2020-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 8
[patent_no_of_words] => 3373
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17438803
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/438803 | Method of authentication of wireless communication based on physical layer security | Mar 10, 2020 | Issued |
Array
(
[id] => 16240547
[patent_doc_number] => 20200257781
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-13
[patent_title] => METHOD FOR GENERATING A HUMAN LIKENESS SCORE
[patent_app_type] => utility
[patent_app_number] => 16/783590
[patent_app_country] => US
[patent_app_date] => 2020-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12116
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16783590
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/783590 | Method for generating a human likeness score | Feb 5, 2020 | Issued |
Array
(
[id] => 18104474
[patent_doc_number] => 11544363
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-03
[patent_title] => Facial recognition for user authentication
[patent_app_type] => utility
[patent_app_number] => 16/781846
[patent_app_country] => US
[patent_app_date] => 2020-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 7141
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16781846
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/781846 | Facial recognition for user authentication | Feb 3, 2020 | Issued |
Array
(
[id] => 16179267
[patent_doc_number] => 20200226235
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-16
[patent_title] => AUTHENTICATION METHOD AND SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/776195
[patent_app_country] => US
[patent_app_date] => 2020-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12714
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16776195
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/776195 | Authentication method and system | Jan 28, 2020 | Issued |
Array
(
[id] => 17409284
[patent_doc_number] => 11250171
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-02-15
[patent_title] => Three-dimensional (3D) printing of a tamper sensor assembly
[patent_app_type] => utility
[patent_app_number] => 16/748163
[patent_app_country] => US
[patent_app_date] => 2020-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 26
[patent_no_of_words] => 10064
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16748163
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/748163 | Three-dimensional (3D) printing of a tamper sensor assembly | Jan 20, 2020 | Issued |
Array
(
[id] => 16927298
[patent_doc_number] => 11048784
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-29
[patent_title] => Authentication method and system
[patent_app_type] => utility
[patent_app_number] => 16/730017
[patent_app_country] => US
[patent_app_date] => 2019-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 34
[patent_no_of_words] => 12916
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16730017
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/730017 | Authentication method and system | Dec 29, 2019 | Issued |
Array
(
[id] => 16095947
[patent_doc_number] => 20200201960
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-25
[patent_title] => AUTHENTICATION METHOD AND SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/718158
[patent_app_country] => US
[patent_app_date] => 2019-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12917
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -32
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16718158
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/718158 | Authentication method and system | Dec 16, 2019 | Issued |
Array
(
[id] => 16181563
[patent_doc_number] => 20200228532
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-16
[patent_title] => LEVERAGING FLEXIBLE DISTRIBUTED TOKENS IN AN ACCESS CONTROL SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/709375
[patent_app_country] => US
[patent_app_date] => 2019-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10147
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16709375
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/709375 | Leveraging flexible distributed tokens in an access control system | Dec 9, 2019 | Issued |