Search

Sarah Su

Examiner (ID: 15685, Phone: (571)270-3835 , Office: P/2431 )

Most Active Art Unit
2431
Art Unit(s)
2431, 2131
Total Applications
797
Issued Applications
632
Pending Applications
37
Abandoned Applications
139

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 8369764 [patent_doc_number] => 20120219148 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-08-30 [patent_title] => 'ENCRYPTION/DECRYPTION METHODS, AND DEVICES AND SYSTEMS USING THE SAME' [patent_app_type] => utility [patent_app_number] => 13/403281 [patent_app_country] => US [patent_app_date] => 2012-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9146 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403281 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/403281
ENCRYPTION/DECRYPTION METHODS, AND DEVICES AND SYSTEMS USING THE SAME Feb 22, 2012 Abandoned
Array ( [id] => 9829571 [patent_doc_number] => 08938810 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-01-20 [patent_title] => 'User account creation involving a mobile device' [patent_app_type] => utility [patent_app_number] => 13/403927 [patent_app_country] => US [patent_app_date] => 2012-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 10371 [patent_no_of_claims] => 43 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 137 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403927 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/403927
User account creation involving a mobile device Feb 22, 2012 Issued
Array ( [id] => 9006159 [patent_doc_number] => 20130227284 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-08-29 [patent_title] => 'APPARATUS AND METHODS FOR CONTENT DISTRIBUTION TO PACKET-ENABLED DEVICES VIA A NETWORK BRIDGE' [patent_app_type] => utility [patent_app_number] => 13/403814 [patent_app_country] => US [patent_app_date] => 2012-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 17174 [patent_no_of_claims] => 43 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403814 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/403814
Apparatus and methods for content distribution to packet-enabled devices via a network bridge Feb 22, 2012 Issued
Array ( [id] => 9848034 [patent_doc_number] => 08949968 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-02-03 [patent_title] => 'Multi-service VPN network client for mobile device' [patent_app_type] => utility [patent_app_number] => 13/403436 [patent_app_country] => US [patent_app_date] => 2012-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 20 [patent_no_of_words] => 11918 [patent_no_of_claims] => 37 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 154 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403436 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/403436
Multi-service VPN network client for mobile device Feb 22, 2012 Issued
Array ( [id] => 8959046 [patent_doc_number] => 08504840 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-08-06 [patent_title] => 'Content defacement protection system' [patent_app_type] => utility [patent_app_number] => 13/323469 [patent_app_country] => US [patent_app_date] => 2011-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10458 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 303 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323469 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/323469
Content defacement protection system Dec 11, 2011 Issued
Array ( [id] => 8912389 [patent_doc_number] => 08484465 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-07-09 [patent_title] => 'Heterogeneous virtual machines sharing a security model' [patent_app_type] => utility [patent_app_number] => 13/313569 [patent_app_country] => US [patent_app_date] => 2011-12-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3918 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 98 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13313569 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/313569
Heterogeneous virtual machines sharing a security model Dec 6, 2011 Issued
Array ( [id] => 9326204 [patent_doc_number] => 08661241 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-02-25 [patent_title] => 'Data link layer switch with protection against internet protocol spoofing attacks' [patent_app_type] => utility [patent_app_number] => 13/245501 [patent_app_country] => US [patent_app_date] => 2011-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4433 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 216 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13245501 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/245501
Data link layer switch with protection against internet protocol spoofing attacks Sep 25, 2011 Issued
Array ( [id] => 8366610 [patent_doc_number] => 08255687 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-08-28 [patent_title] => 'Enabling users to select between secure service providers using a key escrow service' [patent_app_type] => utility [patent_app_number] => 13/244876 [patent_app_country] => US [patent_app_date] => 2011-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6175 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13244876 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/244876
Enabling users to select between secure service providers using a key escrow service Sep 25, 2011 Issued
Array ( [id] => 10848091 [patent_doc_number] => 08875293 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-10-28 [patent_title] => 'System, method, and logic for classifying communications' [patent_app_type] => utility [patent_app_number] => 13/240567 [patent_app_country] => US [patent_app_date] => 2011-09-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 13059 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 292 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13240567 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/240567
System, method, and logic for classifying communications Sep 21, 2011 Issued
Array ( [id] => 8722653 [patent_doc_number] => 20130073870 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-03-21 [patent_title] => 'SECURE RELOCATION OF ENCRYPTED FILES' [patent_app_type] => utility [patent_app_number] => 13/233090 [patent_app_country] => US [patent_app_date] => 2011-09-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5006 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13233090 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/233090
Secure relocation of encrypted files Sep 14, 2011 Issued
Array ( [id] => 10189072 [patent_doc_number] => 09218492 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-22 [patent_title] => 'Programmable display' [patent_app_type] => utility [patent_app_number] => 14/237640 [patent_app_country] => US [patent_app_date] => 2011-09-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 13 [patent_no_of_words] => 12711 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 241 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14237640 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/237640
Programmable display Sep 8, 2011 Issued
Array ( [id] => 8395619 [patent_doc_number] => 20120233461 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-09-13 [patent_title] => 'DATA TRANSMITTING APPARATUS AND DATA AUTHENTICATING METHOD' [patent_app_type] => utility [patent_app_number] => 13/227749 [patent_app_country] => US [patent_app_date] => 2011-09-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 6891 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13227749 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/227749
Data transmitting apparatus and data authenticating method Sep 7, 2011 Issued
Array ( [id] => 9752247 [patent_doc_number] => 08843737 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-09-23 [patent_title] => 'Enhanced approach for transmission control protocol authentication option (TCP-AO) with key management protocols (KMPS)' [patent_app_type] => utility [patent_app_number] => 13/219548 [patent_app_country] => US [patent_app_date] => 2011-08-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 6934 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 315 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13219548 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/219548
Enhanced approach for transmission control protocol authentication option (TCP-AO) with key management protocols (KMPS) Aug 25, 2011 Issued
Array ( [id] => 9036581 [patent_doc_number] => 20130239219 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-09-12 [patent_title] => 'MINING SOURCE CODE FOR VIOLATIONS OF PROGRAMMING RULES' [patent_app_type] => utility [patent_app_number] => 13/811271 [patent_app_country] => US [patent_app_date] => 2011-08-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4824 [patent_no_of_claims] => 42 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13811271 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/811271
Mining source code for violations of programming rules Aug 21, 2011 Issued
Array ( [id] => 10184161 [patent_doc_number] => 09213842 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-15 [patent_title] => 'Tracing data block operations' [patent_app_type] => utility [patent_app_number] => 14/237953 [patent_app_country] => US [patent_app_date] => 2011-08-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 2921 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 127 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14237953 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/237953
Tracing data block operations Aug 16, 2011 Issued
Array ( [id] => 8828037 [patent_doc_number] => 20130129082 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-05-23 [patent_title] => 'DETECTION OF WATERMARKS IN SIGNALS' [patent_app_type] => utility [patent_app_number] => 13/810891 [patent_app_country] => US [patent_app_date] => 2011-08-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5866 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13810891 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/810891
DETECTION OF WATERMARKS IN SIGNALS Aug 1, 2011 Abandoned
Array ( [id] => 8832015 [patent_doc_number] => 20130133060 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-05-23 [patent_title] => 'COMMUNICATION SYSTEM, CONTROL DEVICE AND CONTROL PROGRAM' [patent_app_type] => utility [patent_app_number] => 13/811766 [patent_app_country] => US [patent_app_date] => 2011-07-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5622 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13811766 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/811766
COMMUNICATION SYSTEM, CONTROL DEVICE AND CONTROL PROGRAM Jul 26, 2011 Abandoned
Array ( [id] => 8855472 [patent_doc_number] => 20130145147 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-06-06 [patent_title] => 'Content Protection Method' [patent_app_type] => utility [patent_app_number] => 13/811254 [patent_app_country] => US [patent_app_date] => 2011-07-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3413 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13811254 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/811254
Content Protection Method Jul 18, 2011 Abandoned
Array ( [id] => 11782784 [patent_doc_number] => 09392011 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-07-12 [patent_title] => 'Web vulnerability repair apparatus, web server, web vulnerability repair method, and program' [patent_app_type] => utility [patent_app_number] => 13/811060 [patent_app_country] => US [patent_app_date] => 2011-07-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 4760 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 152 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13811060 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/811060
Web vulnerability repair apparatus, web server, web vulnerability repair method, and program Jul 18, 2011 Issued
Array ( [id] => 10185383 [patent_doc_number] => 09215070 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-15 [patent_title] => 'Method for the cryptographic protection of an application' [patent_app_type] => utility [patent_app_number] => 13/811417 [patent_app_country] => US [patent_app_date] => 2011-06-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 2 [patent_no_of_words] => 5780 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 345 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13811417 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/811417
Method for the cryptographic protection of an application Jun 21, 2011 Issued
Menu