
Sarah Su
Examiner (ID: 15685, Phone: (571)270-3835 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2431, 2131 |
| Total Applications | 797 |
| Issued Applications | 632 |
| Pending Applications | 37 |
| Abandoned Applications | 139 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15349825
[patent_doc_number] => 20200012804
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-09
[patent_title] => Data Bookmark Distribution
[patent_app_type] => utility
[patent_app_number] => 16/578082
[patent_app_country] => US
[patent_app_date] => 2019-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9950
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16578082
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/578082 | Data Bookmark Distribution | Sep 19, 2019 | Abandoned |
Array
(
[id] => 16387631
[patent_doc_number] => 10812487
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-20
[patent_title] => Certificate system for verifying authorized and unauthorized secure sessions
[patent_app_type] => utility
[patent_app_number] => 16/571918
[patent_app_country] => US
[patent_app_date] => 2019-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 19368
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16571918
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/571918 | Certificate system for verifying authorized and unauthorized secure sessions | Sep 15, 2019 | Issued |
Array
(
[id] => 16465124
[patent_doc_number] => 10848492
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-24
[patent_title] => Certificate system for verifying authorized and unauthorized secure sessions
[patent_app_type] => utility
[patent_app_number] => 16/571897
[patent_app_country] => US
[patent_app_date] => 2019-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 19372
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16571897
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/571897 | Certificate system for verifying authorized and unauthorized secure sessions | Sep 15, 2019 | Issued |
Array
(
[id] => 15353605
[patent_doc_number] => 20200014694
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-09
[patent_title] => CERTIFICATE SYSTEM FOR VERIFYING AUTHORIZED AND UNAUTHORIZED SECURE SESSIONS
[patent_app_type] => utility
[patent_app_number] => 16/571908
[patent_app_country] => US
[patent_app_date] => 2019-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19368
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16571908
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/571908 | Certificate system for verifying authorized and unauthorized secure sessions | Sep 15, 2019 | Issued |
Array
(
[id] => 16003497
[patent_doc_number] => 20200177619
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-04
[patent_title] => GENERATING ATTACK GRAPHS IN AGILE SECURITY PLATFORMS
[patent_app_type] => utility
[patent_app_number] => 16/554856
[patent_app_country] => US
[patent_app_date] => 2019-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12533
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16554856
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/554856 | Generating attack graphs in agile security platforms | Aug 28, 2019 | Issued |
Array
(
[id] => 18046944
[patent_doc_number] => 11520900
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-12-06
[patent_title] => Systems and methods for a text mining approach for predicting exploitation of vulnerabilities
[patent_app_type] => utility
[patent_app_number] => 16/548329
[patent_app_country] => US
[patent_app_date] => 2019-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5672
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16548329
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/548329 | Systems and methods for a text mining approach for predicting exploitation of vulnerabilities | Aug 21, 2019 | Issued |
Array
(
[id] => 18875726
[patent_doc_number] => 11863558
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-01-02
[patent_title] => Method and apparatus for credential handling
[patent_app_type] => utility
[patent_app_number] => 16/548564
[patent_app_country] => US
[patent_app_date] => 2019-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7694
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16548564
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/548564 | Method and apparatus for credential handling | Aug 21, 2019 | Issued |
Array
(
[id] => 16003491
[patent_doc_number] => 20200177616
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-04
[patent_title] => GENERATING ATTACK GRAPHS IN AGILE SECURITY PLATFORMS
[patent_app_type] => utility
[patent_app_number] => 16/545078
[patent_app_country] => US
[patent_app_date] => 2019-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10061
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16545078
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/545078 | Generating attack graphs in agile security platforms | Aug 19, 2019 | Issued |
Array
(
[id] => 15464633
[patent_doc_number] => 20200045141
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-06
[patent_title] => APPARATUS AND METHODS FOR CONTENT DISTRIBUTION TO PACKET-ENABLED DEVICES VIA A NETWORK BRIDGE
[patent_app_type] => utility
[patent_app_number] => 16/544558
[patent_app_country] => US
[patent_app_date] => 2019-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16556
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16544558
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/544558 | Apparatus and methods for content distribution to packet-enabled devices via a network bridge | Aug 18, 2019 | Issued |
Array
(
[id] => 17869487
[patent_doc_number] => 20220292224
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-09-15
[patent_title] => VERIFICATION INFORMATION GENERATING SYSTEM, VERIFICATION INFORMATION GENERATING METHOD, AND VERIFICATION INFORMATION GENERATING PROGRAM
[patent_app_type] => utility
[patent_app_number] => 17/626504
[patent_app_country] => US
[patent_app_date] => 2019-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7674
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17626504
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/626504 | Verification information generating system, verification information generating method, and verification information generating program | Jul 22, 2019 | Issued |
Array
(
[id] => 17327471
[patent_doc_number] => 11218503
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-01-04
[patent_title] => System and method for implementing a vulnerability management module
[patent_app_type] => utility
[patent_app_number] => 16/517064
[patent_app_country] => US
[patent_app_date] => 2019-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10577
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 394
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16517064
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/517064 | System and method for implementing a vulnerability management module | Jul 18, 2019 | Issued |
Array
(
[id] => 17717590
[patent_doc_number] => 11381597
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-05
[patent_title] => Expedition of web phishing detection for suspicious sites
[patent_app_type] => utility
[patent_app_number] => 16/517403
[patent_app_country] => US
[patent_app_date] => 2019-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 14834
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16517403
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/517403 | Expedition of web phishing detection for suspicious sites | Jul 18, 2019 | Issued |
Array
(
[id] => 17669339
[patent_doc_number] => 11363052
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-06-14
[patent_title] => Attack path and graph creation based on user and system profiling
[patent_app_type] => utility
[patent_app_number] => 16/516734
[patent_app_country] => US
[patent_app_date] => 2019-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 11385
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16516734
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/516734 | Attack path and graph creation based on user and system profiling | Jul 18, 2019 | Issued |
Array
(
[id] => 15445105
[patent_doc_number] => 20200036736
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-30
[patent_title] => TARGETED ATTACKS DETECTION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/515883
[patent_app_country] => US
[patent_app_date] => 2019-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2138
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16515883
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/515883 | Targeted attack detection system | Jul 17, 2019 | Issued |
Array
(
[id] => 15505871
[patent_doc_number] => 20200053124
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-13
[patent_title] => PACKET INSPECTION AND FORENSICS IN AN ENCRYPTED NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/512683
[patent_app_country] => US
[patent_app_date] => 2019-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9201
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16512683
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/512683 | Packet inspection and forensics in an encrypted network | Jul 15, 2019 | Issued |
Array
(
[id] => 16587225
[patent_doc_number] => 20210021627
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-21
[patent_title] => SYSTEMS METHODS AND COMPUTER STORAGE MEDIA FOR DETECTION OF POTENTIAL CYBER SECURITY VULNERABILITIES IN COMPUTER NETWORKS BY PREMEDIATED EXTERIOR INTRUSION THROUGH LOG-BASED PRE-MAPPED ENTRANCE POINTS
[patent_app_type] => utility
[patent_app_number] => 16/511907
[patent_app_country] => US
[patent_app_date] => 2019-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5092
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 271
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16511907
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/511907 | Systems methods and computer storage media for detection of potential cyber security vulnerabilities in computer networks by premediated exterior intrusion through log-based pre-mapped entrance points | Jul 14, 2019 | Issued |
Array
(
[id] => 16579859
[patent_doc_number] => 20210014261
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-14
[patent_title] => ONLINE STATIC SECURITY ASSESSMENT UNDER THE QSS MODEL
[patent_app_type] => utility
[patent_app_number] => 16/508683
[patent_app_country] => US
[patent_app_date] => 2019-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5275
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16508683
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/508683 | Online static security assessment under the QSS model | Jul 10, 2019 | Issued |
Array
(
[id] => 15549661
[patent_doc_number] => 10574628
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-25
[patent_title] => Computer security system and method based on user-intended final destination
[patent_app_type] => utility
[patent_app_number] => 16/508252
[patent_app_country] => US
[patent_app_date] => 2019-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8787
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16508252
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/508252 | Computer security system and method based on user-intended final destination | Jul 9, 2019 | Issued |
Array
(
[id] => 16546313
[patent_doc_number] => 20200412728
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-31
[patent_title] => AUTOMATIC DEVICE SELECTION FOR PRIVATE NETWORK SECURITY
[patent_app_type] => utility
[patent_app_number] => 16/455480
[patent_app_country] => US
[patent_app_date] => 2019-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5982
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16455480
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/455480 | Automatic device selection for private network security | Jun 26, 2019 | Issued |
Array
(
[id] => 14998239
[patent_doc_number] => 20190318077
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-17
[patent_title] => VISUAL DATA PROCESSING OF RESPONSE IMAGES FOR AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 16/455738
[patent_app_country] => US
[patent_app_date] => 2019-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15211
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16455738
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/455738 | Visual data processing of response images for authentication | Jun 26, 2019 | Issued |