
Sarah Su
Examiner (ID: 15685, Phone: (571)270-3835 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2431, 2131 |
| Total Applications | 797 |
| Issued Applications | 632 |
| Pending Applications | 37 |
| Abandoned Applications | 139 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11238864
[patent_doc_number] => 09465508
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-10-11
[patent_title] => 'High assurance classification disambiguation of user input on tactical display systems'
[patent_app_type] => utility
[patent_app_number] => 13/495594
[patent_app_country] => US
[patent_app_date] => 2012-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1848
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13495594
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/495594 | High assurance classification disambiguation of user input on tactical display systems | Jun 12, 2012 | Issued |
Array
(
[id] => 9200743
[patent_doc_number] => 20130340057
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-19
[patent_title] => 'Image Facilitated Password Generation User Authentication And Password Recovery'
[patent_app_type] => utility
[patent_app_number] => 13/495320
[patent_app_country] => US
[patent_app_date] => 2012-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 28598
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13495320
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/495320 | Image Facilitated Password Generation User Authentication And Password Recovery | Jun 12, 2012 | Abandoned |
Array
(
[id] => 10028067
[patent_doc_number] => 09069969
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-30
[patent_title] => 'Managing software patch installations'
[patent_app_type] => utility
[patent_app_number] => 13/495504
[patent_app_country] => US
[patent_app_date] => 2012-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5602
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13495504
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/495504 | Managing software patch installations | Jun 12, 2012 | Issued |
Array
(
[id] => 9200770
[patent_doc_number] => 20130340086
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-19
[patent_title] => 'METHOD AND APPARATUS FOR PROVIDING CONTEXTUAL DATA PRIVACY'
[patent_app_type] => utility
[patent_app_number] => 13/495156
[patent_app_country] => US
[patent_app_date] => 2012-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15960
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13495156
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/495156 | METHOD AND APPARATUS FOR PROVIDING CONTEXTUAL DATA PRIVACY | Jun 12, 2012 | Abandoned |
Array
(
[id] => 9193726
[patent_doc_number] => 20130333041
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-12
[patent_title] => 'Method and Apparatus for Automatic Identification of Affected Network Resources After a Computer Intrusion'
[patent_app_type] => utility
[patent_app_number] => 13/494108
[patent_app_country] => US
[patent_app_date] => 2012-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3974
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 13
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13494108
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/494108 | Method and Apparatus for Automatic Identification of Affected Network Resources After a Computer Intrusion | Jun 11, 2012 | Abandoned |
Array
(
[id] => 10011550
[patent_doc_number] => 09055090
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-09
[patent_title] => 'Network based device security and controls'
[patent_app_type] => utility
[patent_app_number] => 13/494735
[patent_app_country] => US
[patent_app_date] => 2012-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 9112
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 292
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13494735
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/494735 | Network based device security and controls | Jun 11, 2012 | Issued |
Array
(
[id] => 10834694
[patent_doc_number] => 08862887
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-10-14
[patent_title] => 'Providing user contributions for re-published content'
[patent_app_type] => utility
[patent_app_number] => 13/494937
[patent_app_country] => US
[patent_app_date] => 2012-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9441
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13494937
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/494937 | Providing user contributions for re-published content | Jun 11, 2012 | Issued |
Array
(
[id] => 9853403
[patent_doc_number] => 08955152
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-02-10
[patent_title] => 'Systems and methods to manage an application'
[patent_app_type] => utility
[patent_app_number] => 13/493876
[patent_app_country] => US
[patent_app_date] => 2012-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 7343
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13493876
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/493876 | Systems and methods to manage an application | Jun 10, 2012 | Issued |
Array
(
[id] => 10011381
[patent_doc_number] => 09054919
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-09
[patent_title] => 'Device pinning capability for enterprise cloud service and storage accounts'
[patent_app_type] => utility
[patent_app_number] => 13/493922
[patent_app_country] => US
[patent_app_date] => 2012-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 7585
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13493922
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/493922 | Device pinning capability for enterprise cloud service and storage accounts | Jun 10, 2012 | Issued |
Array
(
[id] => 10052731
[patent_doc_number] => 09092611
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-07-28
[patent_title] => 'Adaptive, multi-level security for flight deck applications hosted on mobile platforms'
[patent_app_type] => utility
[patent_app_number] => 13/493473
[patent_app_country] => US
[patent_app_date] => 2012-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2203
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13493473
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/493473 | Adaptive, multi-level security for flight deck applications hosted on mobile platforms | Jun 10, 2012 | Issued |
Array
(
[id] => 8518235
[patent_doc_number] => 20120317643
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-12-13
[patent_title] => 'APPARATUS AND METHOD PREVENTING OVERFLOW OF PENDING INTEREST TABLE IN NAME BASED NETWORK SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/491683
[patent_app_country] => US
[patent_app_date] => 2012-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3783
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13491683
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/491683 | Apparatus and method preventing overflow of pending interest table in name based network system | Jun 7, 2012 | Issued |
Array
(
[id] => 10901813
[patent_doc_number] => 08925059
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-30
[patent_title] => 'Dynamic trust connection'
[patent_app_type] => utility
[patent_app_number] => 13/492176
[patent_app_country] => US
[patent_app_date] => 2012-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 16
[patent_no_of_words] => 12793
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13492176
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/492176 | Dynamic trust connection | Jun 7, 2012 | Issued |
Array
(
[id] => 11812112
[patent_doc_number] => 09716691
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-25
[patent_title] => 'Enhanced 2CHK authentication security with query transactions'
[patent_app_type] => utility
[patent_app_number] => 13/490715
[patent_app_country] => US
[patent_app_date] => 2012-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 15934
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 327
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13490715
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/490715 | Enhanced 2CHK authentication security with query transactions | Jun 6, 2012 | Issued |
Array
(
[id] => 8894034
[patent_doc_number] => 20130167218
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-27
[patent_title] => 'SINGLE LOGON SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/488454
[patent_app_country] => US
[patent_app_date] => 2012-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1003
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13488454
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/488454 | SINGLE LOGON SYSTEM AND METHOD | Jun 4, 2012 | Abandoned |
Array
(
[id] => 10166414
[patent_doc_number] => 09197653
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-24
[patent_title] => 'Cross-user correlation for detecting server-side multi-target intrusion'
[patent_app_type] => utility
[patent_app_number] => 13/811384
[patent_app_country] => US
[patent_app_date] => 2012-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8041
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13811384
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/811384 | Cross-user correlation for detecting server-side multi-target intrusion | Jun 4, 2012 | Issued |
Array
(
[id] => 9752554
[patent_doc_number] => 08844043
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-23
[patent_title] => 'Detection of vulnerabilities in computer systems'
[patent_app_type] => utility
[patent_app_number] => 13/466527
[patent_app_country] => US
[patent_app_date] => 2012-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 20
[patent_no_of_words] => 12009
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 276
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13466527
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/466527 | Detection of vulnerabilities in computer systems | May 7, 2012 | Issued |
Array
(
[id] => 9124179
[patent_doc_number] => 20130291101
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-31
[patent_title] => 'DETECTING AND BLOCKING DOMAIN NAME SYSTEM CACHE POISONING ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 13/460110
[patent_app_country] => US
[patent_app_date] => 2012-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10667
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13460110
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/460110 | Detecting and blocking domain name system cache poisoning attacks | Apr 29, 2012 | Issued |
Array
(
[id] => 9057185
[patent_doc_number] => 20130254899
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-26
[patent_title] => 'DATA PROTECTING SYSTEM AND PROTECTING METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/459102
[patent_app_country] => US
[patent_app_date] => 2012-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1160
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13459102
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/459102 | DATA PROTECTING SYSTEM AND PROTECTING METHOD | Apr 27, 2012 | Abandoned |
Array
(
[id] => 11521023
[patent_doc_number] => 09604406
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-28
[patent_title] => 'Three-dimensional design and manufacturing systems'
[patent_app_type] => utility
[patent_app_number] => 14/114495
[patent_app_country] => US
[patent_app_date] => 2012-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12195
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14114495
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/114495 | Three-dimensional design and manufacturing systems | Apr 26, 2012 | Issued |
Array
(
[id] => 11877348
[patent_doc_number] => 09749136
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-29
[patent_title] => 'Method for watermarking content'
[patent_app_type] => utility
[patent_app_number] => 13/404440
[patent_app_country] => US
[patent_app_date] => 2012-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 8645
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13404440
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/404440 | Method for watermarking content | Feb 23, 2012 | Issued |