
Sarah Su
Examiner (ID: 9118, Phone: (571)270-3835 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2131, 2431 |
| Total Applications | 813 |
| Issued Applications | 638 |
| Pending Applications | 48 |
| Abandoned Applications | 139 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9752554
[patent_doc_number] => 08844043
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-23
[patent_title] => 'Detection of vulnerabilities in computer systems'
[patent_app_type] => utility
[patent_app_number] => 13/466527
[patent_app_country] => US
[patent_app_date] => 2012-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 20
[patent_no_of_words] => 12009
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 276
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13466527
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/466527 | Detection of vulnerabilities in computer systems | May 7, 2012 | Issued |
Array
(
[id] => 9124179
[patent_doc_number] => 20130291101
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-31
[patent_title] => 'DETECTING AND BLOCKING DOMAIN NAME SYSTEM CACHE POISONING ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 13/460110
[patent_app_country] => US
[patent_app_date] => 2012-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10667
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13460110
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/460110 | Detecting and blocking domain name system cache poisoning attacks | Apr 29, 2012 | Issued |
Array
(
[id] => 9057185
[patent_doc_number] => 20130254899
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-26
[patent_title] => 'DATA PROTECTING SYSTEM AND PROTECTING METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/459102
[patent_app_country] => US
[patent_app_date] => 2012-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1160
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13459102
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/459102 | DATA PROTECTING SYSTEM AND PROTECTING METHOD | Apr 27, 2012 | Abandoned |
Array
(
[id] => 11521023
[patent_doc_number] => 09604406
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-28
[patent_title] => 'Three-dimensional design and manufacturing systems'
[patent_app_type] => utility
[patent_app_number] => 14/114495
[patent_app_country] => US
[patent_app_date] => 2012-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12195
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14114495
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/114495 | Three-dimensional design and manufacturing systems | Apr 26, 2012 | Issued |
Array
(
[id] => 11877348
[patent_doc_number] => 09749136
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-29
[patent_title] => 'Method for watermarking content'
[patent_app_type] => utility
[patent_app_number] => 13/404440
[patent_app_country] => US
[patent_app_date] => 2012-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 8645
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13404440
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/404440 | Method for watermarking content | Feb 23, 2012 | Issued |
Array
(
[id] => 9848034
[patent_doc_number] => 08949968
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-03
[patent_title] => 'Multi-service VPN network client for mobile device'
[patent_app_type] => utility
[patent_app_number] => 13/403436
[patent_app_country] => US
[patent_app_date] => 2012-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 20
[patent_no_of_words] => 11918
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403436
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/403436 | Multi-service VPN network client for mobile device | Feb 22, 2012 | Issued |
Array
(
[id] => 8369764
[patent_doc_number] => 20120219148
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-08-30
[patent_title] => 'ENCRYPTION/DECRYPTION METHODS, AND DEVICES AND SYSTEMS USING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 13/403281
[patent_app_country] => US
[patent_app_date] => 2012-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9146
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403281
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/403281 | ENCRYPTION/DECRYPTION METHODS, AND DEVICES AND SYSTEMS USING THE SAME | Feb 22, 2012 | Abandoned |
Array
(
[id] => 9006159
[patent_doc_number] => 20130227284
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-29
[patent_title] => 'APPARATUS AND METHODS FOR CONTENT DISTRIBUTION TO PACKET-ENABLED DEVICES VIA A NETWORK BRIDGE'
[patent_app_type] => utility
[patent_app_number] => 13/403814
[patent_app_country] => US
[patent_app_date] => 2012-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 17174
[patent_no_of_claims] => 43
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403814
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/403814 | Apparatus and methods for content distribution to packet-enabled devices via a network bridge | Feb 22, 2012 | Issued |
Array
(
[id] => 9829571
[patent_doc_number] => 08938810
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-20
[patent_title] => 'User account creation involving a mobile device'
[patent_app_type] => utility
[patent_app_number] => 13/403927
[patent_app_country] => US
[patent_app_date] => 2012-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 10371
[patent_no_of_claims] => 43
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13403927
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/403927 | User account creation involving a mobile device | Feb 22, 2012 | Issued |
Array
(
[id] => 8959046
[patent_doc_number] => 08504840
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-08-06
[patent_title] => 'Content defacement protection system'
[patent_app_type] => utility
[patent_app_number] => 13/323469
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10458
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 303
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13323469
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/323469 | Content defacement protection system | Dec 11, 2011 | Issued |
Array
(
[id] => 8912389
[patent_doc_number] => 08484465
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-07-09
[patent_title] => 'Heterogeneous virtual machines sharing a security model'
[patent_app_type] => utility
[patent_app_number] => 13/313569
[patent_app_country] => US
[patent_app_date] => 2011-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3918
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13313569
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/313569 | Heterogeneous virtual machines sharing a security model | Dec 6, 2011 | Issued |
Array
(
[id] => 8366610
[patent_doc_number] => 08255687
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-08-28
[patent_title] => 'Enabling users to select between secure service providers using a key escrow service'
[patent_app_type] => utility
[patent_app_number] => 13/244876
[patent_app_country] => US
[patent_app_date] => 2011-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6175
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13244876
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/244876 | Enabling users to select between secure service providers using a key escrow service | Sep 25, 2011 | Issued |
Array
(
[id] => 9326204
[patent_doc_number] => 08661241
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-02-25
[patent_title] => 'Data link layer switch with protection against internet protocol spoofing attacks'
[patent_app_type] => utility
[patent_app_number] => 13/245501
[patent_app_country] => US
[patent_app_date] => 2011-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4433
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13245501
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/245501 | Data link layer switch with protection against internet protocol spoofing attacks | Sep 25, 2011 | Issued |
Array
(
[id] => 10848091
[patent_doc_number] => 08875293
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-10-28
[patent_title] => 'System, method, and logic for classifying communications'
[patent_app_type] => utility
[patent_app_number] => 13/240567
[patent_app_country] => US
[patent_app_date] => 2011-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 13059
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 292
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13240567
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/240567 | System, method, and logic for classifying communications | Sep 21, 2011 | Issued |
Array
(
[id] => 8722653
[patent_doc_number] => 20130073870
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-21
[patent_title] => 'SECURE RELOCATION OF ENCRYPTED FILES'
[patent_app_type] => utility
[patent_app_number] => 13/233090
[patent_app_country] => US
[patent_app_date] => 2011-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5006
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13233090
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/233090 | Secure relocation of encrypted files | Sep 14, 2011 | Issued |
Array
(
[id] => 10189072
[patent_doc_number] => 09218492
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-22
[patent_title] => 'Programmable display'
[patent_app_type] => utility
[patent_app_number] => 14/237640
[patent_app_country] => US
[patent_app_date] => 2011-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 12711
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14237640
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/237640 | Programmable display | Sep 8, 2011 | Issued |
Array
(
[id] => 8395619
[patent_doc_number] => 20120233461
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-09-13
[patent_title] => 'DATA TRANSMITTING APPARATUS AND DATA AUTHENTICATING METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/227749
[patent_app_country] => US
[patent_app_date] => 2011-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 6891
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13227749
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/227749 | Data transmitting apparatus and data authenticating method | Sep 7, 2011 | Issued |
Array
(
[id] => 9752247
[patent_doc_number] => 08843737
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-23
[patent_title] => 'Enhanced approach for transmission control protocol authentication option (TCP-AO) with key management protocols (KMPS)'
[patent_app_type] => utility
[patent_app_number] => 13/219548
[patent_app_country] => US
[patent_app_date] => 2011-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 6934
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 315
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13219548
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/219548 | Enhanced approach for transmission control protocol authentication option (TCP-AO) with key management protocols (KMPS) | Aug 25, 2011 | Issued |
Array
(
[id] => 9036581
[patent_doc_number] => 20130239219
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-12
[patent_title] => 'MINING SOURCE CODE FOR VIOLATIONS OF PROGRAMMING RULES'
[patent_app_type] => utility
[patent_app_number] => 13/811271
[patent_app_country] => US
[patent_app_date] => 2011-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4824
[patent_no_of_claims] => 42
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13811271
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/811271 | Mining source code for violations of programming rules | Aug 21, 2011 | Issued |
Array
(
[id] => 10184161
[patent_doc_number] => 09213842
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-15
[patent_title] => 'Tracing data block operations'
[patent_app_type] => utility
[patent_app_number] => 14/237953
[patent_app_country] => US
[patent_app_date] => 2011-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 2921
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14237953
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/237953 | Tracing data block operations | Aug 16, 2011 | Issued |