Sun U Kim
Examiner (ID: 2713)
Most Active Art Unit | 1777 |
Art Unit(s) | 1744, 1777, 1723, 1306, 1797 |
Total Applications | 2555 |
Issued Applications | 1815 |
Pending Applications | 277 |
Abandoned Applications | 429 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 8930009
[patent_doc_number] => 20130185769
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-18
[patent_title] => 'NEAR FIELD COMMUNICATION ELECTRONIC DEVICE, LOGIN SYSTEM USING THE SAME AND METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 13/726649
[patent_app_country] => US
[patent_app_date] => 2012-12-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2676
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13726649
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/726649 | NEAR FIELD COMMUNICATION ELECTRONIC DEVICE, LOGIN SYSTEM USING THE SAME AND METHOD THEREOF | Dec 25, 2012 | Abandoned |
Array
(
[id] => 11188529
[patent_doc_number] => 09419953
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-16
[patent_title] => 'Trusted container'
[patent_app_type] => utility
[patent_app_number] => 13/726167
[patent_app_country] => US
[patent_app_date] => 2012-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 18
[patent_no_of_words] => 16241
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13726167
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/726167 | Trusted container | Dec 22, 2012 | Issued |
Array
(
[id] => 9980753
[patent_doc_number] => 09027085
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-05-05
[patent_title] => 'Method, system and program product for secure authentication'
[patent_app_type] => utility
[patent_app_number] => 13/726094
[patent_app_country] => US
[patent_app_date] => 2012-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 18
[patent_no_of_words] => 15707
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 266
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13726094
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/726094 | Method, system and program product for secure authentication | Dec 21, 2012 | Issued |
Array
(
[id] => 9564272
[patent_doc_number] => 20140181985
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-26
[patent_title] => 'Content Specific Data Scrambling'
[patent_app_type] => utility
[patent_app_number] => 13/724435
[patent_app_country] => US
[patent_app_date] => 2012-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7111
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13724435
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/724435 | Content Specific Data Scrambling | Dec 20, 2012 | Abandoned |
Array
(
[id] => 9564176
[patent_doc_number] => 20140181889
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-26
[patent_title] => 'METHOD AND APARATUS FOR PRESENCE BASED RESOURCE MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 13/724990
[patent_app_country] => US
[patent_app_date] => 2012-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11439
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13724990
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/724990 | Method and aparatus for presence based resource management | Dec 20, 2012 | Issued |
Array
(
[id] => 10030198
[patent_doc_number] => 09072118
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-30
[patent_title] => 'Method for implementing WiFi communication, user equipment and wireless routing device'
[patent_app_type] => utility
[patent_app_number] => 13/725523
[patent_app_country] => US
[patent_app_date] => 2012-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10354
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13725523
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/725523 | Method for implementing WiFi communication, user equipment and wireless routing device | Dec 20, 2012 | Issued |
Array
(
[id] => 9564177
[patent_doc_number] => 20140181890
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-26
[patent_title] => 'Quantifying Risk Based on Relationships and Applying Protections Based on Business Rules'
[patent_app_type] => utility
[patent_app_number] => 13/725225
[patent_app_country] => US
[patent_app_date] => 2012-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6848
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13725225
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/725225 | Quantifying risk based on relationships and applying protections based on business rules | Dec 20, 2012 | Issued |
Array
(
[id] => 9564271
[patent_doc_number] => 20140181984
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-26
[patent_title] => 'METHOD AND APPARATUS FOR AUTHENTICATION OF SOLUTION TOPOLOGY'
[patent_app_type] => utility
[patent_app_number] => 13/723913
[patent_app_country] => US
[patent_app_date] => 2012-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 13582
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13723913
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/723913 | METHOD AND APPARATUS FOR AUTHENTICATION OF SOLUTION TOPOLOGY | Dec 20, 2012 | Abandoned |
Array
(
[id] => 9044513
[patent_doc_number] => 20130247151
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-19
[patent_title] => 'Communication Privacy'
[patent_app_type] => utility
[patent_app_number] => 13/722974
[patent_app_country] => US
[patent_app_date] => 2012-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8758
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13722974
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/722974 | Separate privacy setting control of multiple communication clients of a user | Dec 19, 2012 | Issued |
Array
(
[id] => 11792239
[patent_doc_number] => 09401901
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-26
[patent_title] => 'Self-configuring wireless network'
[patent_app_type] => utility
[patent_app_number] => 13/719159
[patent_app_country] => US
[patent_app_date] => 2012-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 16
[patent_no_of_words] => 11411
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13719159
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/719159 | Self-configuring wireless network | Dec 17, 2012 | Issued |
Array
(
[id] => 9096451
[patent_doc_number] => 20130275762
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-17
[patent_title] => 'SYSTEM FOR, AND METHOD OF, PROVIDING THE TRANSMISSION, RECEIPT AND CONTENT OF AN E-MAIL MESSAGE TO A RECIPIENT'
[patent_app_type] => utility
[patent_app_number] => 13/715811
[patent_app_country] => US
[patent_app_date] => 2012-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 23187
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13715811
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/715811 | SYSTEM FOR, AND METHOD OF, PROVIDING THE TRANSMISSION, RECEIPT AND CONTENT OF AN E-MAIL MESSAGE TO A RECIPIENT | Dec 13, 2012 | Abandoned |
Array
(
[id] => 9947844
[patent_doc_number] => 08997174
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-03-31
[patent_title] => 'Configuring browser policy settings on client computing devices'
[patent_app_type] => utility
[patent_app_number] => 13/688129
[patent_app_country] => US
[patent_app_date] => 2012-11-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7645
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13688129
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/688129 | Configuring browser policy settings on client computing devices | Nov 27, 2012 | Issued |
Array
(
[id] => 9652165
[patent_doc_number] => 08806199
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-08-12
[patent_title] => 'Writing application data to a secure element'
[patent_app_type] => utility
[patent_app_number] => 13/686887
[patent_app_country] => US
[patent_app_date] => 2012-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 13420
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13686887
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/686887 | Writing application data to a secure element | Nov 26, 2012 | Issued |
Array
(
[id] => 10403694
[patent_doc_number] => 20150288703
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'DATA POSSESSION VERIFICATION SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/438698
[patent_app_country] => US
[patent_app_date] => 2012-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 14025
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14438698
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/438698 | DATA POSSESSION VERIFICATION SYSTEM AND METHOD | Oct 30, 2012 | Abandoned |
Array
(
[id] => 9096790
[patent_doc_number] => 20130276101
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-17
[patent_title] => 'METHOD OF, AND A SYSTEM FOR ENABLING A SECURE PASSWORD ENTRY USING A NON-SECURE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/654107
[patent_app_country] => US
[patent_app_date] => 2012-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4537
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13654107
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/654107 | METHOD OF, AND A SYSTEM FOR ENABLING A SECURE PASSWORD ENTRY USING A NON-SECURE DEVICE | Oct 16, 2012 | Abandoned |
Array
(
[id] => 9348133
[patent_doc_number] => 08667296
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-03-04
[patent_title] => 'Generating a password from a media item'
[patent_app_type] => utility
[patent_app_number] => 13/648045
[patent_app_country] => US
[patent_app_date] => 2012-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5344
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13648045
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/648045 | Generating a password from a media item | Oct 8, 2012 | Issued |
Array
(
[id] => 11175469
[patent_doc_number] => 09408079
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-02
[patent_title] => 'Apparatus and method for communication security in a nationwide wireless network using wireless routers'
[patent_app_type] => utility
[patent_app_number] => 13/557095
[patent_app_country] => US
[patent_app_date] => 2012-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 9699
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13557095
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/557095 | Apparatus and method for communication security in a nationwide wireless network using wireless routers | Jul 23, 2012 | Issued |
Array
(
[id] => 9030008
[patent_doc_number] => 08539606
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-09-17
[patent_title] => 'Data protection method and data protection system'
[patent_app_type] => utility
[patent_app_number] => 13/540288
[patent_app_country] => US
[patent_app_date] => 2012-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 6821
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 739
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13540288
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/540288 | Data protection method and data protection system | Jul 1, 2012 | Issued |
Array
(
[id] => 10885886
[patent_doc_number] => 08910292
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-12-09
[patent_title] => 'Method and system for detection of remote file inclusion vulnerabilities'
[patent_app_type] => utility
[patent_app_number] => 13/533413
[patent_app_country] => US
[patent_app_date] => 2012-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3123
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13533413
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/533413 | Method and system for detection of remote file inclusion vulnerabilities | Jun 25, 2012 | Issued |
Array
(
[id] => 8794628
[patent_doc_number] => 20130111597
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-02
[patent_title] => 'OBSCURING AN ACCELEROMETER SIGNAL'
[patent_app_type] => utility
[patent_app_number] => 13/531966
[patent_app_country] => US
[patent_app_date] => 2012-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5403
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13531966
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/531966 | Obscuring an accelerometer signal | Jun 24, 2012 | Issued |