
Sarah Su
Examiner (ID: 15685, Phone: (571)270-3835 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2431, 2131 |
| Total Applications | 797 |
| Issued Applications | 632 |
| Pending Applications | 37 |
| Abandoned Applications | 139 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 8369764
[patent_doc_number] => 20120219148
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-08-30
[patent_title] => 'ENCRYPTION/DECRYPTION METHODS, AND DEVICES AND SYSTEMS USING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 13/403281
[patent_app_country] => US
[patent_app_date] => 2012-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9146
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403281
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/403281 | ENCRYPTION/DECRYPTION METHODS, AND DEVICES AND SYSTEMS USING THE SAME | Feb 22, 2012 | Abandoned |
Array
(
[id] => 9829571
[patent_doc_number] => 08938810
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-20
[patent_title] => 'User account creation involving a mobile device'
[patent_app_type] => utility
[patent_app_number] => 13/403927
[patent_app_country] => US
[patent_app_date] => 2012-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 10371
[patent_no_of_claims] => 43
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403927
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/403927 | User account creation involving a mobile device | Feb 22, 2012 | Issued |
Array
(
[id] => 9006159
[patent_doc_number] => 20130227284
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-29
[patent_title] => 'APPARATUS AND METHODS FOR CONTENT DISTRIBUTION TO PACKET-ENABLED DEVICES VIA A NETWORK BRIDGE'
[patent_app_type] => utility
[patent_app_number] => 13/403814
[patent_app_country] => US
[patent_app_date] => 2012-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 17174
[patent_no_of_claims] => 43
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403814
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/403814 | Apparatus and methods for content distribution to packet-enabled devices via a network bridge | Feb 22, 2012 | Issued |
Array
(
[id] => 9848034
[patent_doc_number] => 08949968
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-03
[patent_title] => 'Multi-service VPN network client for mobile device'
[patent_app_type] => utility
[patent_app_number] => 13/403436
[patent_app_country] => US
[patent_app_date] => 2012-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 20
[patent_no_of_words] => 11918
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403436
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/403436 | Multi-service VPN network client for mobile device | Feb 22, 2012 | Issued |
Array
(
[id] => 8959046
[patent_doc_number] => 08504840
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-08-06
[patent_title] => 'Content defacement protection system'
[patent_app_type] => utility
[patent_app_number] => 13/323469
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10458
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 303
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323469
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/323469 | Content defacement protection system | Dec 11, 2011 | Issued |
Array
(
[id] => 8912389
[patent_doc_number] => 08484465
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-07-09
[patent_title] => 'Heterogeneous virtual machines sharing a security model'
[patent_app_type] => utility
[patent_app_number] => 13/313569
[patent_app_country] => US
[patent_app_date] => 2011-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3918
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13313569
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/313569 | Heterogeneous virtual machines sharing a security model | Dec 6, 2011 | Issued |
Array
(
[id] => 9326204
[patent_doc_number] => 08661241
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-02-25
[patent_title] => 'Data link layer switch with protection against internet protocol spoofing attacks'
[patent_app_type] => utility
[patent_app_number] => 13/245501
[patent_app_country] => US
[patent_app_date] => 2011-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4433
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13245501
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/245501 | Data link layer switch with protection against internet protocol spoofing attacks | Sep 25, 2011 | Issued |
Array
(
[id] => 8366610
[patent_doc_number] => 08255687
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-08-28
[patent_title] => 'Enabling users to select between secure service providers using a key escrow service'
[patent_app_type] => utility
[patent_app_number] => 13/244876
[patent_app_country] => US
[patent_app_date] => 2011-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6175
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13244876
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/244876 | Enabling users to select between secure service providers using a key escrow service | Sep 25, 2011 | Issued |
Array
(
[id] => 10848091
[patent_doc_number] => 08875293
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-10-28
[patent_title] => 'System, method, and logic for classifying communications'
[patent_app_type] => utility
[patent_app_number] => 13/240567
[patent_app_country] => US
[patent_app_date] => 2011-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 13059
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 292
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13240567
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/240567 | System, method, and logic for classifying communications | Sep 21, 2011 | Issued |
Array
(
[id] => 8722653
[patent_doc_number] => 20130073870
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-21
[patent_title] => 'SECURE RELOCATION OF ENCRYPTED FILES'
[patent_app_type] => utility
[patent_app_number] => 13/233090
[patent_app_country] => US
[patent_app_date] => 2011-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5006
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13233090
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/233090 | Secure relocation of encrypted files | Sep 14, 2011 | Issued |
Array
(
[id] => 10189072
[patent_doc_number] => 09218492
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-22
[patent_title] => 'Programmable display'
[patent_app_type] => utility
[patent_app_number] => 14/237640
[patent_app_country] => US
[patent_app_date] => 2011-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 12711
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14237640
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/237640 | Programmable display | Sep 8, 2011 | Issued |
Array
(
[id] => 8395619
[patent_doc_number] => 20120233461
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-09-13
[patent_title] => 'DATA TRANSMITTING APPARATUS AND DATA AUTHENTICATING METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/227749
[patent_app_country] => US
[patent_app_date] => 2011-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 6891
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13227749
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/227749 | Data transmitting apparatus and data authenticating method | Sep 7, 2011 | Issued |
Array
(
[id] => 9752247
[patent_doc_number] => 08843737
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-23
[patent_title] => 'Enhanced approach for transmission control protocol authentication option (TCP-AO) with key management protocols (KMPS)'
[patent_app_type] => utility
[patent_app_number] => 13/219548
[patent_app_country] => US
[patent_app_date] => 2011-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 6934
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 315
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13219548
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/219548 | Enhanced approach for transmission control protocol authentication option (TCP-AO) with key management protocols (KMPS) | Aug 25, 2011 | Issued |
Array
(
[id] => 9036581
[patent_doc_number] => 20130239219
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-12
[patent_title] => 'MINING SOURCE CODE FOR VIOLATIONS OF PROGRAMMING RULES'
[patent_app_type] => utility
[patent_app_number] => 13/811271
[patent_app_country] => US
[patent_app_date] => 2011-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4824
[patent_no_of_claims] => 42
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13811271
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/811271 | Mining source code for violations of programming rules | Aug 21, 2011 | Issued |
Array
(
[id] => 10184161
[patent_doc_number] => 09213842
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-15
[patent_title] => 'Tracing data block operations'
[patent_app_type] => utility
[patent_app_number] => 14/237953
[patent_app_country] => US
[patent_app_date] => 2011-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 2921
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14237953
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/237953 | Tracing data block operations | Aug 16, 2011 | Issued |
Array
(
[id] => 8828037
[patent_doc_number] => 20130129082
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-23
[patent_title] => 'DETECTION OF WATERMARKS IN SIGNALS'
[patent_app_type] => utility
[patent_app_number] => 13/810891
[patent_app_country] => US
[patent_app_date] => 2011-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5866
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13810891
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/810891 | DETECTION OF WATERMARKS IN SIGNALS | Aug 1, 2011 | Abandoned |
Array
(
[id] => 8832015
[patent_doc_number] => 20130133060
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-23
[patent_title] => 'COMMUNICATION SYSTEM, CONTROL DEVICE AND CONTROL PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/811766
[patent_app_country] => US
[patent_app_date] => 2011-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5622
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13811766
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/811766 | COMMUNICATION SYSTEM, CONTROL DEVICE AND CONTROL PROGRAM | Jul 26, 2011 | Abandoned |
Array
(
[id] => 8855472
[patent_doc_number] => 20130145147
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-06
[patent_title] => 'Content Protection Method'
[patent_app_type] => utility
[patent_app_number] => 13/811254
[patent_app_country] => US
[patent_app_date] => 2011-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3413
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13811254
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/811254 | Content Protection Method | Jul 18, 2011 | Abandoned |
Array
(
[id] => 11782784
[patent_doc_number] => 09392011
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'Web vulnerability repair apparatus, web server, web vulnerability repair method, and program'
[patent_app_type] => utility
[patent_app_number] => 13/811060
[patent_app_country] => US
[patent_app_date] => 2011-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4760
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13811060
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/811060 | Web vulnerability repair apparatus, web server, web vulnerability repair method, and program | Jul 18, 2011 | Issued |
Array
(
[id] => 10185383
[patent_doc_number] => 09215070
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-15
[patent_title] => 'Method for the cryptographic protection of an application'
[patent_app_type] => utility
[patent_app_number] => 13/811417
[patent_app_country] => US
[patent_app_date] => 2011-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 2
[patent_no_of_words] => 5780
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 345
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13811417
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/811417 | Method for the cryptographic protection of an application | Jun 21, 2011 | Issued |