
Sarah Su
Examiner (ID: 15685, Phone: (571)270-3835 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2431, 2131 |
| Total Applications | 797 |
| Issued Applications | 632 |
| Pending Applications | 37 |
| Abandoned Applications | 139 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12353040
[patent_doc_number] => 09953189
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-24
[patent_title] => Managing configurations of computing terminals
[patent_app_type] => utility
[patent_app_number] => 14/446983
[patent_app_country] => US
[patent_app_date] => 2014-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6791
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14446983
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/446983 | Managing configurations of computing terminals | Jul 29, 2014 | Issued |
Array
(
[id] => 10691192
[patent_doc_number] => 20160037338
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'PRIVATE WIRELESS COMMUNICATION NETWORK FOR GUEST USERS'
[patent_app_type] => utility
[patent_app_number] => 14/446381
[patent_app_country] => US
[patent_app_date] => 2014-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4228
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14446381
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/446381 | PRIVATE WIRELESS COMMUNICATION NETWORK FOR GUEST USERS | Jul 29, 2014 | Abandoned |
Array
(
[id] => 9859865
[patent_doc_number] => 20150039882
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-05
[patent_title] => 'IDENTIFYING CONTENT FROM AN ENCRYPTED COMMUNICATION'
[patent_app_type] => utility
[patent_app_number] => 14/446710
[patent_app_country] => US
[patent_app_date] => 2014-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 11296
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14446710
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/446710 | Identifying content from an encrypted communication | Jul 29, 2014 | Issued |
Array
(
[id] => 11454343
[patent_doc_number] => 09578003
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-21
[patent_title] => 'Determining whether to use a local authentication server'
[patent_app_type] => utility
[patent_app_number] => 14/446551
[patent_app_country] => US
[patent_app_date] => 2014-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 6241
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 290
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14446551
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/446551 | Determining whether to use a local authentication server | Jul 29, 2014 | Issued |
Array
(
[id] => 10427247
[patent_doc_number] => 20150312258
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-29
[patent_title] => 'ACCESS RIGHT SETTING METHOD AND ACCESS RIGHT SETTING SYSTEM FOR USE IN AREA NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/445836
[patent_app_country] => US
[patent_app_date] => 2014-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 14105
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14445836
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/445836 | ACCESS RIGHT SETTING METHOD AND ACCESS RIGHT SETTING SYSTEM FOR USE IN AREA NETWORK | Jul 28, 2014 | Abandoned |
Array
(
[id] => 12230575
[patent_doc_number] => 09917831
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-13
[patent_title] => 'Image forming apparatus and method of authenticating user thereof'
[patent_app_type] => utility
[patent_app_number] => 14/445246
[patent_app_country] => US
[patent_app_date] => 2014-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4915
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 257
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14445246
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/445246 | Image forming apparatus and method of authenticating user thereof | Jul 28, 2014 | Issued |
Array
(
[id] => 10295875
[patent_doc_number] => 20150180874
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-25
[patent_title] => 'ELECTRONIC DEVICE, METHOD, AND COMPUTER PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 14/445613
[patent_app_country] => US
[patent_app_date] => 2014-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 5465
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14445613
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/445613 | ELECTRONIC DEVICE, METHOD, AND COMPUTER PROGRAM PRODUCT | Jul 28, 2014 | Abandoned |
Array
(
[id] => 10690661
[patent_doc_number] => 20160036807
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'SYSTEMS AND METHODS FOR COMBINED OTP AND KBA IDENTITY AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/446007
[patent_app_country] => US
[patent_app_date] => 2014-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10116
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14446007
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/446007 | Systems and methods for combined OTP and KBA identity authentication | Jul 28, 2014 | Issued |
Array
(
[id] => 11361198
[patent_doc_number] => 09537868
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-03
[patent_title] => 'Communication management and policy-based data routing'
[patent_app_type] => utility
[patent_app_number] => 14/445605
[patent_app_country] => US
[patent_app_date] => 2014-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10186
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14445605
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/445605 | Communication management and policy-based data routing | Jul 28, 2014 | Issued |
Array
(
[id] => 10690688
[patent_doc_number] => 20160036833
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'Client Reputation Driven Role-Based Access Control'
[patent_app_type] => utility
[patent_app_number] => 14/445711
[patent_app_country] => US
[patent_app_date] => 2014-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11740
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14445711
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/445711 | Client reputation driven role-based access control | Jul 28, 2014 | Issued |
Array
(
[id] => 10401804
[patent_doc_number] => 20150286813
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'METHOD AND APPARATUS THAT FACILITATES A WEARABLE IDENTITY MANAGER'
[patent_app_type] => utility
[patent_app_number] => 14/444620
[patent_app_country] => US
[patent_app_date] => 2014-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 19456
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14444620
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/444620 | Method and apparatus that facilitates a wearable identity manager | Jul 27, 2014 | Issued |
Array
(
[id] => 11782791
[patent_doc_number] => 09392019
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'Managing cyber attacks through change of network address'
[patent_app_type] => utility
[patent_app_number] => 14/444345
[patent_app_country] => US
[patent_app_date] => 2014-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5954
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14444345
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/444345 | Managing cyber attacks through change of network address | Jul 27, 2014 | Issued |
Array
(
[id] => 13072839
[patent_doc_number] => 10057218
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-21
[patent_title] => Network address-based encryption
[patent_app_type] => utility
[patent_app_number] => 14/444040
[patent_app_country] => US
[patent_app_date] => 2014-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 8419
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14444040
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/444040 | Network address-based encryption | Jul 27, 2014 | Issued |
Array
(
[id] => 10934971
[patent_doc_number] => 20140337991
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-13
[patent_title] => 'METHODS AND APPARATUS FOR BLOCKING USAGE TRACKING'
[patent_app_type] => utility
[patent_app_number] => 14/339998
[patent_app_country] => US
[patent_app_date] => 2014-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11422
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14339998
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/339998 | METHODS AND APPARATUS FOR BLOCKING USAGE TRACKING | Jul 23, 2014 | Abandoned |
Array
(
[id] => 10618953
[patent_doc_number] => 09338412
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-10
[patent_title] => 'Systems and methods for securing a digital communications link'
[patent_app_type] => utility
[patent_app_number] => 14/321647
[patent_app_country] => US
[patent_app_date] => 2014-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 10
[patent_no_of_words] => 4162
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 90
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14321647
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/321647 | Systems and methods for securing a digital communications link | Jun 30, 2014 | Issued |
Array
(
[id] => 10969294
[patent_doc_number] => 20140372327
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-18
[patent_title] => 'MECHANISM FOR VERIFYING THE AUTHENTICITY OF A PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 14/305070
[patent_app_country] => US
[patent_app_date] => 2014-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3124
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14305070
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/305070 | Mechanism for verifying the authenticity of a product | Jun 15, 2014 | Issued |
Array
(
[id] => 11741279
[patent_doc_number] => 09705882
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-11
[patent_title] => 'Methods and systems for managing a node'
[patent_app_type] => utility
[patent_app_number] => 14/410097
[patent_app_country] => US
[patent_app_date] => 2014-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 7967
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 235
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14410097
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/410097 | Methods and systems for managing a node | Jun 12, 2014 | Issued |
Array
(
[id] => 10938354
[patent_doc_number] => 20140341375
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-20
[patent_title] => 'RANDOM NUMBER GENERATING DEVICE, CIPHER PROCESSING DEVICE, STORAGE DEVICE, AND INFORMATION PROCESSING SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/265588
[patent_app_country] => US
[patent_app_date] => 2014-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6236
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14265588
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/265588 | Random number generating device, cipher processing device, storage device, and information processing system | Apr 29, 2014 | Issued |
Array
(
[id] => 10948922
[patent_doc_number] => 20140351944
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-27
[patent_title] => 'SOFTWARE PROTECTING SYSTEM AND ELECTRONIC DEVICE USING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 14/264070
[patent_app_country] => US
[patent_app_date] => 2014-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1348
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14264070
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/264070 | SOFTWARE PROTECTING SYSTEM AND ELECTRONIC DEVICE USING THE SAME | Apr 28, 2014 | Abandoned |
Array
(
[id] => 10425202
[patent_doc_number] => 20150310213
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-29
[patent_title] => 'ADJUSTMENT OF PROTECTION BASED ON PREDICTION AND WARNING OF MALWARE-PRONE ACTIVITY'
[patent_app_type] => utility
[patent_app_number] => 14/265308
[patent_app_country] => US
[patent_app_date] => 2014-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6971
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14265308
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/265308 | ADJUSTMENT OF PROTECTION BASED ON PREDICTION AND WARNING OF MALWARE-PRONE ACTIVITY | Apr 28, 2014 | Abandoned |