Search

Sarah Su

Examiner (ID: 9118, Phone: (571)270-3835 , Office: P/2431 )

Most Active Art Unit
2431
Art Unit(s)
2131, 2431
Total Applications
813
Issued Applications
638
Pending Applications
48
Abandoned Applications
139

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9752554 [patent_doc_number] => 08844043 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-09-23 [patent_title] => 'Detection of vulnerabilities in computer systems' [patent_app_type] => utility [patent_app_number] => 13/466527 [patent_app_country] => US [patent_app_date] => 2012-05-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 20 [patent_no_of_words] => 12009 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 276 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13466527 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/466527
Detection of vulnerabilities in computer systems May 7, 2012 Issued
Array ( [id] => 9124179 [patent_doc_number] => 20130291101 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-10-31 [patent_title] => 'DETECTING AND BLOCKING DOMAIN NAME SYSTEM CACHE POISONING ATTACKS' [patent_app_type] => utility [patent_app_number] => 13/460110 [patent_app_country] => US [patent_app_date] => 2012-04-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 10667 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13460110 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/460110
Detecting and blocking domain name system cache poisoning attacks Apr 29, 2012 Issued
Array ( [id] => 9057185 [patent_doc_number] => 20130254899 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-09-26 [patent_title] => 'DATA PROTECTING SYSTEM AND PROTECTING METHOD' [patent_app_type] => utility [patent_app_number] => 13/459102 [patent_app_country] => US [patent_app_date] => 2012-04-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 1160 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13459102 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/459102
DATA PROTECTING SYSTEM AND PROTECTING METHOD Apr 27, 2012 Abandoned
Array ( [id] => 11521023 [patent_doc_number] => 09604406 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-03-28 [patent_title] => 'Three-dimensional design and manufacturing systems' [patent_app_type] => utility [patent_app_number] => 14/114495 [patent_app_country] => US [patent_app_date] => 2012-04-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 12195 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 216 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14114495 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/114495
Three-dimensional design and manufacturing systems Apr 26, 2012 Issued
Array ( [id] => 11877348 [patent_doc_number] => 09749136 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-08-29 [patent_title] => 'Method for watermarking content' [patent_app_type] => utility [patent_app_number] => 13/404440 [patent_app_country] => US [patent_app_date] => 2012-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 13 [patent_no_of_words] => 8645 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 146 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13404440 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/404440
Method for watermarking content Feb 23, 2012 Issued
Array ( [id] => 9848034 [patent_doc_number] => 08949968 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-02-03 [patent_title] => 'Multi-service VPN network client for mobile device' [patent_app_type] => utility [patent_app_number] => 13/403436 [patent_app_country] => US [patent_app_date] => 2012-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 20 [patent_no_of_words] => 11918 [patent_no_of_claims] => 37 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 154 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403436 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/403436
Multi-service VPN network client for mobile device Feb 22, 2012 Issued
Array ( [id] => 8369764 [patent_doc_number] => 20120219148 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-08-30 [patent_title] => 'ENCRYPTION/DECRYPTION METHODS, AND DEVICES AND SYSTEMS USING THE SAME' [patent_app_type] => utility [patent_app_number] => 13/403281 [patent_app_country] => US [patent_app_date] => 2012-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9146 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403281 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/403281
ENCRYPTION/DECRYPTION METHODS, AND DEVICES AND SYSTEMS USING THE SAME Feb 22, 2012 Abandoned
Array ( [id] => 9006159 [patent_doc_number] => 20130227284 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-08-29 [patent_title] => 'APPARATUS AND METHODS FOR CONTENT DISTRIBUTION TO PACKET-ENABLED DEVICES VIA A NETWORK BRIDGE' [patent_app_type] => utility [patent_app_number] => 13/403814 [patent_app_country] => US [patent_app_date] => 2012-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 17174 [patent_no_of_claims] => 43 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403814 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/403814
Apparatus and methods for content distribution to packet-enabled devices via a network bridge Feb 22, 2012 Issued
Array ( [id] => 9829571 [patent_doc_number] => 08938810 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-01-20 [patent_title] => 'User account creation involving a mobile device' [patent_app_type] => utility [patent_app_number] => 13/403927 [patent_app_country] => US [patent_app_date] => 2012-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 10371 [patent_no_of_claims] => 43 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 137 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403927 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/403927
User account creation involving a mobile device Feb 22, 2012 Issued
Array ( [id] => 8959046 [patent_doc_number] => 08504840 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-08-06 [patent_title] => 'Content defacement protection system' [patent_app_type] => utility [patent_app_number] => 13/323469 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10458 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 303 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323469 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/323469
Content defacement protection system Dec 11, 2011 Issued
Array ( [id] => 8912389 [patent_doc_number] => 08484465 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-07-09 [patent_title] => 'Heterogeneous virtual machines sharing a security model' [patent_app_type] => utility [patent_app_number] => 13/313569 [patent_app_country] => US [patent_app_date] => 2011-12-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3918 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 98 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13313569 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/313569
Heterogeneous virtual machines sharing a security model Dec 6, 2011 Issued
Array ( [id] => 8366610 [patent_doc_number] => 08255687 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-08-28 [patent_title] => 'Enabling users to select between secure service providers using a key escrow service' [patent_app_type] => utility [patent_app_number] => 13/244876 [patent_app_country] => US [patent_app_date] => 2011-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6175 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13244876 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/244876
Enabling users to select between secure service providers using a key escrow service Sep 25, 2011 Issued
Array ( [id] => 9326204 [patent_doc_number] => 08661241 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-02-25 [patent_title] => 'Data link layer switch with protection against internet protocol spoofing attacks' [patent_app_type] => utility [patent_app_number] => 13/245501 [patent_app_country] => US [patent_app_date] => 2011-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4433 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 216 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13245501 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/245501
Data link layer switch with protection against internet protocol spoofing attacks Sep 25, 2011 Issued
Array ( [id] => 10848091 [patent_doc_number] => 08875293 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-10-28 [patent_title] => 'System, method, and logic for classifying communications' [patent_app_type] => utility [patent_app_number] => 13/240567 [patent_app_country] => US [patent_app_date] => 2011-09-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 13059 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 292 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13240567 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/240567
System, method, and logic for classifying communications Sep 21, 2011 Issued
Array ( [id] => 8722653 [patent_doc_number] => 20130073870 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-03-21 [patent_title] => 'SECURE RELOCATION OF ENCRYPTED FILES' [patent_app_type] => utility [patent_app_number] => 13/233090 [patent_app_country] => US [patent_app_date] => 2011-09-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5006 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13233090 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/233090
Secure relocation of encrypted files Sep 14, 2011 Issued
Array ( [id] => 10189072 [patent_doc_number] => 09218492 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-22 [patent_title] => 'Programmable display' [patent_app_type] => utility [patent_app_number] => 14/237640 [patent_app_country] => US [patent_app_date] => 2011-09-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 13 [patent_no_of_words] => 12711 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 241 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14237640 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/237640
Programmable display Sep 8, 2011 Issued
Array ( [id] => 8395619 [patent_doc_number] => 20120233461 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-09-13 [patent_title] => 'DATA TRANSMITTING APPARATUS AND DATA AUTHENTICATING METHOD' [patent_app_type] => utility [patent_app_number] => 13/227749 [patent_app_country] => US [patent_app_date] => 2011-09-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 6891 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13227749 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/227749
Data transmitting apparatus and data authenticating method Sep 7, 2011 Issued
Array ( [id] => 9752247 [patent_doc_number] => 08843737 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-09-23 [patent_title] => 'Enhanced approach for transmission control protocol authentication option (TCP-AO) with key management protocols (KMPS)' [patent_app_type] => utility [patent_app_number] => 13/219548 [patent_app_country] => US [patent_app_date] => 2011-08-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 6934 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 315 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13219548 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/219548
Enhanced approach for transmission control protocol authentication option (TCP-AO) with key management protocols (KMPS) Aug 25, 2011 Issued
Array ( [id] => 9036581 [patent_doc_number] => 20130239219 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-09-12 [patent_title] => 'MINING SOURCE CODE FOR VIOLATIONS OF PROGRAMMING RULES' [patent_app_type] => utility [patent_app_number] => 13/811271 [patent_app_country] => US [patent_app_date] => 2011-08-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4824 [patent_no_of_claims] => 42 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13811271 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/811271
Mining source code for violations of programming rules Aug 21, 2011 Issued
Array ( [id] => 10184161 [patent_doc_number] => 09213842 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-15 [patent_title] => 'Tracing data block operations' [patent_app_type] => utility [patent_app_number] => 14/237953 [patent_app_country] => US [patent_app_date] => 2011-08-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 2921 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 127 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14237953 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/237953
Tracing data block operations Aug 16, 2011 Issued
Menu