
Sarah Su
Examiner (ID: 9118, Phone: (571)270-3835 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2131, 2431 |
| Total Applications | 813 |
| Issued Applications | 638 |
| Pending Applications | 48 |
| Abandoned Applications | 139 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 5381416
[patent_doc_number] => 20090193255
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-07-30
[patent_title] => 'Method and apparatus for determining and using the sampling frequency for decoding watermark information embedded in a received signal sampled with an original sampling frequency at encoder side'
[patent_app_type] => utility
[patent_app_number] => 12/319302
[patent_app_country] => US
[patent_app_date] => 2009-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2721
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0193/20090193255.pdf
[firstpage_image] =>[orig_patent_app_number] => 12319302
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/319302 | Method and apparatus for determining and using the sampling frequency for decoding watermark information embedded in a received signal sampled with an original sampling frequency at encoder side | Jan 5, 2009 | Issued |
Array
(
[id] => 6445916
[patent_doc_number] => 20100169644
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-01
[patent_title] => 'Message authentication code with elliptic polynomial hopping'
[patent_app_type] => utility
[patent_app_number] => 12/318584
[patent_app_country] => US
[patent_app_date] => 2008-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16342
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0169/20100169644.pdf
[firstpage_image] =>[orig_patent_app_number] => 12318584
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/318584 | Message authentication code with elliptic polynomial hopping | Dec 30, 2008 | Issued |
Array
(
[id] => 8148294
[patent_doc_number] => 08165287
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-04-24
[patent_title] => 'Cryptographic hash functions using elliptic polynomial cryptography'
[patent_app_type] => utility
[patent_app_number] => 12/318495
[patent_app_country] => US
[patent_app_date] => 2008-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16900
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 960
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/165/08165287.pdf
[firstpage_image] =>[orig_patent_app_number] => 12318495
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/318495 | Cryptographic hash functions using elliptic polynomial cryptography | Dec 29, 2008 | Issued |
Array
(
[id] => 6407067
[patent_doc_number] => 20100166176
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-01
[patent_title] => 'Elliptical polynomial-based message authentication code'
[patent_app_type] => utility
[patent_app_number] => 12/318405
[patent_app_country] => US
[patent_app_date] => 2008-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19344
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0166/20100166176.pdf
[firstpage_image] =>[orig_patent_app_number] => 12318405
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/318405 | Elliptical polynomial-based message authentication code | Dec 28, 2008 | Issued |
Array
(
[id] => 6407023
[patent_doc_number] => 20100166174
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-01
[patent_title] => 'Hash functions using elliptic curve cryptography'
[patent_app_type] => utility
[patent_app_number] => 12/318406
[patent_app_country] => US
[patent_app_date] => 2008-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11193
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0166/20100166174.pdf
[firstpage_image] =>[orig_patent_app_number] => 12318406
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/318406 | Hash functions using elliptic curve cryptography | Dec 28, 2008 | Issued |
Array
(
[id] => 6370713
[patent_doc_number] => 20100080389
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-01
[patent_title] => 'System and method for improving in-game communications during a game'
[patent_app_type] => utility
[patent_app_number] => 12/317640
[patent_app_country] => US
[patent_app_date] => 2008-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4961
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0080/20100080389.pdf
[firstpage_image] =>[orig_patent_app_number] => 12317640
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/317640 | System and method for improving in-game communications during a game | Dec 22, 2008 | Issued |
Array
(
[id] => 6448783
[patent_doc_number] => 20100153702
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-17
[patent_title] => 'TLS KEY AND CGI SESSION ID PAIRING'
[patent_app_type] => utility
[patent_app_number] => 12/335329
[patent_app_country] => US
[patent_app_date] => 2008-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6076
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0153/20100153702.pdf
[firstpage_image] =>[orig_patent_app_number] => 12335329
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/335329 | TLS key and CGI session ID pairing | Dec 14, 2008 | Issued |
Array
(
[id] => 6464171
[patent_doc_number] => 20100146287
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-10
[patent_title] => 'CERTIFICATION OF AUTHENTICITY OF MEDIA SIGNALS'
[patent_app_type] => utility
[patent_app_number] => 12/332209
[patent_app_country] => US
[patent_app_date] => 2008-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6117
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0146/20100146287.pdf
[firstpage_image] =>[orig_patent_app_number] => 12332209
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/332209 | Certification of authenticity of media signals | Dec 9, 2008 | Issued |
Array
(
[id] => 8985410
[patent_doc_number] => 08516539
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-20
[patent_title] => 'System and method for inferring access policies from access event records'
[patent_app_type] => utility
[patent_app_number] => 12/267804
[patent_app_country] => US
[patent_app_date] => 2008-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5172
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12267804
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/267804 | System and method for inferring access policies from access event records | Nov 9, 2008 | Issued |
Array
(
[id] => 5467532
[patent_doc_number] => 20090327732
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-31
[patent_title] => 'Long-term secure digital signatures'
[patent_app_type] => utility
[patent_app_number] => 12/128019
[patent_app_country] => US
[patent_app_date] => 2008-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3518
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0327/20090327732.pdf
[firstpage_image] =>[orig_patent_app_number] => 12128019
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/128019 | Long-term secure digital signatures | May 27, 2008 | Issued |
Array
(
[id] => 5551404
[patent_doc_number] => 20090285390
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-11-19
[patent_title] => 'INTEGRATED CIRCUIT WITH SECURED SOFTWARE IMAGE AND METHOD THEREFOR'
[patent_app_type] => utility
[patent_app_number] => 12/122444
[patent_app_country] => US
[patent_app_date] => 2008-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4130
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0285/20090285390.pdf
[firstpage_image] =>[orig_patent_app_number] => 12122444
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/122444 | INTEGRATED CIRCUIT WITH SECURED SOFTWARE IMAGE AND METHOD THEREFOR | May 15, 2008 | Abandoned |
Array
(
[id] => 8540715
[patent_doc_number] => 08316443
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-11-20
[patent_title] => 'Method and system for protecting a message from an XML attack when being exchanged in a distributed and decentralized network system'
[patent_app_type] => utility
[patent_app_number] => 12/122283
[patent_app_country] => US
[patent_app_date] => 2008-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 33
[patent_figures_cnt] => 37
[patent_no_of_words] => 28920
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12122283
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/122283 | Method and system for protecting a message from an XML attack when being exchanged in a distributed and decentralized network system | May 15, 2008 | Issued |
Array
(
[id] => 12419613
[patent_doc_number] => 09973491
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-15
[patent_title] => Determining an identity of a third-party user in an SAML implementation of a web-service
[patent_app_type] => utility
[patent_app_number] => 12/122422
[patent_app_country] => US
[patent_app_date] => 2008-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3123
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12122422
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/122422 | Determining an identity of a third-party user in an SAML implementation of a web-service | May 15, 2008 | Issued |
Array
(
[id] => 4780772
[patent_doc_number] => 20080288771
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-11-20
[patent_title] => 'SYSTEM AND METHOD FOR DEFINING PROGRAMMABLE PROCESSING STEPS APPLIED WHEN PROTECTING THE DATA'
[patent_app_type] => utility
[patent_app_number] => 12/122303
[patent_app_country] => US
[patent_app_date] => 2008-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 16747
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0288/20080288771.pdf
[firstpage_image] =>[orig_patent_app_number] => 12122303
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/122303 | System and method for defining programmable processing steps applied when protecting the data | May 15, 2008 | Issued |
Array
(
[id] => 5553947
[patent_doc_number] => 20090287933
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-11-19
[patent_title] => 'SYSTEM AND METHOD THAT USES CRYPTOGRAPHIC CERTIFICATES TO DEFINE GROUPS OF ENTITIES'
[patent_app_type] => utility
[patent_app_number] => 12/122352
[patent_app_country] => US
[patent_app_date] => 2008-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9479
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0287/20090287933.pdf
[firstpage_image] =>[orig_patent_app_number] => 12122352
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/122352 | System and method that uses cryptographic certificates to define groups of entities | May 15, 2008 | Issued |
Array
(
[id] => 4815255
[patent_doc_number] => 20080195886
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-08-14
[patent_title] => 'DISK CONTROLLER AND METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 12/021733
[patent_app_country] => US
[patent_app_date] => 2008-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3019
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0195/20080195886.pdf
[firstpage_image] =>[orig_patent_app_number] => 12021733
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/021733 | DISK CONTROLLER AND METHOD THEREOF | Jan 28, 2008 | Abandoned |
Array
(
[id] => 8530865
[patent_doc_number] => 08307449
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-11-06
[patent_title] => 'Image processing apparatus, document connecting method, and storage medium storing control program for executing the method'
[patent_app_type] => utility
[patent_app_number] => 12/021479
[patent_app_country] => US
[patent_app_date] => 2008-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 7515
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 335
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12021479
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/021479 | Image processing apparatus, document connecting method, and storage medium storing control program for executing the method | Jan 28, 2008 | Issued |
Array
(
[id] => 5381408
[patent_doc_number] => 20090193247
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-07-30
[patent_title] => 'PROPRIETARY PROTOCOL TUNNELING OVER EAP'
[patent_app_type] => utility
[patent_app_number] => 12/021381
[patent_app_country] => US
[patent_app_date] => 2008-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3911
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0193/20090193247.pdf
[firstpage_image] =>[orig_patent_app_number] => 12021381
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/021381 | PROPRIETARY PROTOCOL TUNNELING OVER EAP | Jan 28, 2008 | Abandoned |
Array
(
[id] => 4950589
[patent_doc_number] => 20080306715
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-12-11
[patent_title] => 'Detecting Method Over Network Intrusion'
[patent_app_type] => utility
[patent_app_number] => 12/021342
[patent_app_country] => US
[patent_app_date] => 2008-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3936
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0306/20080306715.pdf
[firstpage_image] =>[orig_patent_app_number] => 12021342
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/021342 | Detecting method for network intrusion | Jan 28, 2008 | Issued |
Array
(
[id] => 5378917
[patent_doc_number] => 20090190756
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-07-30
[patent_title] => 'Systems and Methods for Securing a Digital Communications Link'
[patent_app_type] => utility
[patent_app_number] => 12/021668
[patent_app_country] => US
[patent_app_date] => 2008-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4135
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0190/20090190756.pdf
[firstpage_image] =>[orig_patent_app_number] => 12021668
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/021668 | Systems and methods for securing a digital communications link | Jan 28, 2008 | Issued |