Sun U Kim
Examiner (ID: 2713)
Most Active Art Unit | 1777 |
Art Unit(s) | 1744, 1777, 1723, 1306, 1797 |
Total Applications | 2555 |
Issued Applications | 1815 |
Pending Applications | 277 |
Abandoned Applications | 429 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 11202127
[patent_doc_number] => 09432355
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-30
[patent_title] => 'Single sign-on method in multi-application framework'
[patent_app_type] => utility
[patent_app_number] => 14/622304
[patent_app_country] => US
[patent_app_date] => 2015-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1952
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 314
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14622304
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/622304 | Single sign-on method in multi-application framework | Feb 12, 2015 | Issued |
Array
(
[id] => 10330328
[patent_doc_number] => 20150215332
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-30
[patent_title] => 'CLOUD SERVICE USAGE RISK ASSESSMENT USING DARKNET INTELLIGENCE'
[patent_app_type] => utility
[patent_app_number] => 14/618322
[patent_app_country] => US
[patent_app_date] => 2015-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9143
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14618322
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/618322 | Cloud service usage risk assessment using darknet intelligence | Feb 9, 2015 | Issued |
Array
(
[id] => 12115793
[patent_doc_number] => 09871796
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-01-16
[patent_title] => 'Multi level decomposition for multi user CAx databases'
[patent_app_type] => utility
[patent_app_number] => 14/617994
[patent_app_country] => US
[patent_app_date] => 2015-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 7484
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14617994
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/617994 | Multi level decomposition for multi user CAx databases | Feb 9, 2015 | Issued |
Array
(
[id] => 14521877
[patent_doc_number] => 10338191
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-02
[patent_title] => Sensor mesh and signal transmission architectures for electromagnetic signature analysis
[patent_app_type] => utility
[patent_app_number] => 14/617798
[patent_app_country] => US
[patent_app_date] => 2015-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 19021
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14617798
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/617798 | Sensor mesh and signal transmission architectures for electromagnetic signature analysis | Feb 8, 2015 | Issued |
Array
(
[id] => 11035402
[patent_doc_number] => 20160232358
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'Information Technology Vulnerability Assessment'
[patent_app_type] => utility
[patent_app_number] => 14/617184
[patent_app_country] => US
[patent_app_date] => 2015-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4692
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14617184
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/617184 | Information technology vulnerability assessment | Feb 8, 2015 | Issued |
Array
(
[id] => 10350042
[patent_doc_number] => 20150235046
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-20
[patent_title] => 'OPERATION TERMINAL APPARATUS FOR MANUFACTURING APPARATUS, AND MANUFACTURING SYSTEM INCLUDING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 14/617419
[patent_app_country] => US
[patent_app_date] => 2015-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7601
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14617419
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/617419 | OPERATION TERMINAL APPARATUS FOR MANUFACTURING APPARATUS, AND MANUFACTURING SYSTEM INCLUDING THE SAME | Feb 8, 2015 | Abandoned |
Array
(
[id] => 11659333
[patent_doc_number] => 09672336
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-06-06
[patent_title] => 'Security system for verification of user credentials'
[patent_app_type] => utility
[patent_app_number] => 14/616174
[patent_app_country] => US
[patent_app_date] => 2015-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9326
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 298
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14616174
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/616174 | Security system for verification of user credentials | Feb 5, 2015 | Issued |
Array
(
[id] => 10284876
[patent_doc_number] => 20150169874
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-18
[patent_title] => 'METHOD, DEVICE, AND SYSTEM FOR IDENTIFYING SCRIPT VIRUS'
[patent_app_type] => utility
[patent_app_number] => 14/614171
[patent_app_country] => US
[patent_app_date] => 2015-02-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8388
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14614171
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/614171 | METHOD, DEVICE, AND SYSTEM FOR IDENTIFYING SCRIPT VIRUS | Feb 3, 2015 | Abandoned |
Array
(
[id] => 14957539
[patent_doc_number] => 10440057
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-08
[patent_title] => Methods, apparatus and systems for processing service requests
[patent_app_type] => utility
[patent_app_number] => 15/118608
[patent_app_country] => US
[patent_app_date] => 2015-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8168
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 379
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15118608
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/118608 | Methods, apparatus and systems for processing service requests | Feb 2, 2015 | Issued |
Array
(
[id] => 11523755
[patent_doc_number] => 09607160
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-28
[patent_title] => 'Method and apparatus for providing string encryption and decryption in program files'
[patent_app_type] => utility
[patent_app_number] => 14/610620
[patent_app_country] => US
[patent_app_date] => 2015-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 9687
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 281
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14610620
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/610620 | Method and apparatus for providing string encryption and decryption in program files | Jan 29, 2015 | Issued |
Array
(
[id] => 10166424
[patent_doc_number] => 09197663
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-11-24
[patent_title] => 'Methods and systems for identifying potential enterprise software threats based on visual and non-visual data'
[patent_app_type] => utility
[patent_app_number] => 14/608999
[patent_app_country] => US
[patent_app_date] => 2015-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 13918
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14608999
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/608999 | Methods and systems for identifying potential enterprise software threats based on visual and non-visual data | Jan 28, 2015 | Issued |
Array
(
[id] => 11347311
[patent_doc_number] => 09531734
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-12-27
[patent_title] => 'Method and apparatus for intercepting or cleaning-up plugins'
[patent_app_type] => utility
[patent_app_number] => 14/607044
[patent_app_country] => US
[patent_app_date] => 2015-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 5195
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14607044
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/607044 | Method and apparatus for intercepting or cleaning-up plugins | Jan 26, 2015 | Issued |
Array
(
[id] => 10173082
[patent_doc_number] => 09203802
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-01
[patent_title] => 'Secure layered iterative gateway'
[patent_app_type] => utility
[patent_app_number] => 14/604788
[patent_app_country] => US
[patent_app_date] => 2015-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6378
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14604788
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/604788 | Secure layered iterative gateway | Jan 25, 2015 | Issued |
Array
(
[id] => 10352024
[patent_doc_number] => 20150237029
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-20
[patent_title] => 'SYSTEMS AND METHODS FOR IMPORTING RELATION CHAIN AND PROVIDING CONTACT INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 14/602026
[patent_app_country] => US
[patent_app_date] => 2015-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 18535
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602026
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/602026 | Systems and methods for importing relation chain and providing contact information | Jan 20, 2015 | Issued |
Array
(
[id] => 15793485
[patent_doc_number] => 10630479
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-21
[patent_title] => Network communication method having function of recovering terminal session
[patent_app_type] => utility
[patent_app_number] => 15/541482
[patent_app_country] => US
[patent_app_date] => 2015-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4514
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 404
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15541482
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/541482 | Network communication method having function of recovering terminal session | Jan 20, 2015 | Issued |
Array
(
[id] => 11846755
[patent_doc_number] => 09734310
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-15
[patent_title] => 'Authentication method and computer-readable recording medium'
[patent_app_type] => utility
[patent_app_number] => 14/598618
[patent_app_country] => US
[patent_app_date] => 2015-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 7227
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14598618
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/598618 | Authentication method and computer-readable recording medium | Jan 15, 2015 | Issued |
Array
(
[id] => 10236484
[patent_doc_number] => 20150121478
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-30
[patent_title] => 'Permission Management Method, Apparatus, and Terminal'
[patent_app_type] => utility
[patent_app_number] => 14/586218
[patent_app_country] => US
[patent_app_date] => 2014-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13229
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14586218
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/586218 | Permission management method, apparatus, and terminal | Dec 29, 2014 | Issued |
Array
(
[id] => 10228648
[patent_doc_number] => 20150113641
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-23
[patent_title] => 'PLUG-IN ANTI-REGENERATION METHOD, SYSTEM, AND STORAGE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 14/583130
[patent_app_country] => US
[patent_app_date] => 2014-12-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2973
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14583130
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/583130 | PLUG-IN ANTI-REGENERATION METHOD, SYSTEM, AND STORAGE MEDIUM | Dec 24, 2014 | Abandoned |
Array
(
[id] => 10295909
[patent_doc_number] => 20150180908
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-25
[patent_title] => 'SYSTEM AND METHOD FOR WHITELISTING APPLICATIONS IN A MOBILE NETWORK ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/580930
[patent_app_country] => US
[patent_app_date] => 2014-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 12214
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14580930
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/580930 | SYSTEM AND METHOD FOR WHITELISTING APPLICATIONS IN A MOBILE NETWORK ENVIRONMENT | Dec 22, 2014 | Abandoned |
Array
(
[id] => 10221632
[patent_doc_number] => 20150106625
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-16
[patent_title] => 'Group Key Management and Authentication Schemes for Mesh Networks'
[patent_app_type] => utility
[patent_app_number] => 14/576723
[patent_app_country] => US
[patent_app_date] => 2014-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6604
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14576723
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/576723 | Group key management and authentication schemes for mesh networks | Dec 18, 2014 | Issued |