Search

Sun U Kim

Examiner (ID: 2713)

Most Active Art Unit
1777
Art Unit(s)
1744, 1777, 1723, 1306, 1797
Total Applications
2555
Issued Applications
1815
Pending Applications
277
Abandoned Applications
429

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 4951399 [patent_doc_number] => 20080307525 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-12-11 [patent_title] => 'SYSTEM AND METHOD FOR EVALUATING SECURITY EVENTS IN THE CONTEXT OF AN ORGANIZATIONAL STRUCTURE' [patent_app_type] => utility [patent_app_number] => 11/758371 [patent_app_country] => US [patent_app_date] => 2007-06-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4454 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0307/20080307525.pdf [firstpage_image] =>[orig_patent_app_number] => 11758371 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/758371
SYSTEM AND METHOD FOR EVALUATING SECURITY EVENTS IN THE CONTEXT OF AN ORGANIZATIONAL STRUCTURE Jun 4, 2007 Abandoned
Array ( [id] => 4945707 [patent_doc_number] => 20080083034 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-04-03 [patent_title] => 'ATTACK CLASSIFICATION METHOD FOR COMPUTER NETWORK SECURITY' [patent_app_type] => utility [patent_app_number] => 11/757701 [patent_app_country] => US [patent_app_date] => 2007-06-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4962 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0083/20080083034.pdf [firstpage_image] =>[orig_patent_app_number] => 11757701 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/757701
ATTACK CLASSIFICATION METHOD FOR COMPUTER NETWORK SECURITY Jun 3, 2007 Abandoned
Array ( [id] => 5232644 [patent_doc_number] => 20070294753 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-12-20 [patent_title] => 'ADAPTOR OR IC CARD FOR ENCRYPTED COMMUNICATION ON NETWORK' [patent_app_type] => utility [patent_app_number] => 11/757443 [patent_app_country] => US [patent_app_date] => 2007-06-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 14148 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0294/20070294753.pdf [firstpage_image] =>[orig_patent_app_number] => 11757443 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/757443
ADAPTOR OR IC CARD FOR ENCRYPTED COMMUNICATION ON NETWORK Jun 3, 2007 Abandoned
Array ( [id] => 4712939 [patent_doc_number] => 20080301465 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-12-04 [patent_title] => 'PROTECTION OF SOFTWARE TRANSMITTED OVER AN UNPROTECTED INTERFACE' [patent_app_type] => utility [patent_app_number] => 11/757790 [patent_app_country] => US [patent_app_date] => 2007-06-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6472 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0301/20080301465.pdf [firstpage_image] =>[orig_patent_app_number] => 11757790 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/757790
PROTECTION OF SOFTWARE TRANSMITTED OVER AN UNPROTECTED INTERFACE Jun 3, 2007 Abandoned
Array ( [id] => 4722442 [patent_doc_number] => 20080244273 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-10-02 [patent_title] => 'CRYPTOGRAPHIC METHOD USING REDUNDANT BITS AND ADAPTIVE CLOCK FREQUENCY' [patent_app_type] => utility [patent_app_number] => 11/757326 [patent_app_country] => US [patent_app_date] => 2007-06-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 3314 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0244/20080244273.pdf [firstpage_image] =>[orig_patent_app_number] => 11757326 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/757326
CRYPTOGRAPHIC METHOD USING REDUNDANT BITS AND ADAPTIVE CLOCK FREQUENCY May 31, 2007 Abandoned
Array ( [id] => 4713270 [patent_doc_number] => 20080301796 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-12-04 [patent_title] => 'Adjusting the Levels of Anti-Malware Protection' [patent_app_type] => utility [patent_app_number] => 11/756598 [patent_app_country] => US [patent_app_date] => 2007-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5063 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0301/20080301796.pdf [firstpage_image] =>[orig_patent_app_number] => 11756598 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/756598
Adjusting the Levels of Anti-Malware Protection May 30, 2007 Abandoned
Array ( [id] => 4713289 [patent_doc_number] => 20080301815 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-12-04 [patent_title] => 'Detecting Unauthorized Changes to Printed Documents' [patent_app_type] => utility [patent_app_number] => 11/756599 [patent_app_country] => US [patent_app_date] => 2007-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3350 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0301/20080301815.pdf [firstpage_image] =>[orig_patent_app_number] => 11756599 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/756599
Detecting Unauthorized Changes to Printed Documents May 30, 2007 Abandoned
Array ( [id] => 5004131 [patent_doc_number] => 20070201699 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-08-30 [patent_title] => 'BROADCAST RECEIVER AND BROADCAST RECEIVING METHOD' [patent_app_type] => utility [patent_app_number] => 11/678145 [patent_app_country] => US [patent_app_date] => 2007-02-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4221 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0201/20070201699.pdf [firstpage_image] =>[orig_patent_app_number] => 11678145 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/678145
BROADCAST RECEIVER AND BROADCAST RECEIVING METHOD Feb 22, 2007 Abandoned
Array ( [id] => 4486742 [patent_doc_number] => 07870399 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-01-11 [patent_title] => 'Software trusted platform module and application security wrapper' [patent_app_type] => utility [patent_app_number] => 11/672054 [patent_app_country] => US [patent_app_date] => 2007-02-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 5773 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 109 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/870/07870399.pdf [firstpage_image] =>[orig_patent_app_number] => 11672054 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/672054
Software trusted platform module and application security wrapper Feb 6, 2007 Issued
Array ( [id] => 5081312 [patent_doc_number] => 20070124536 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-05-31 [patent_title] => 'TOKEN DEVICE PROVIDING A SECURE WORK ENVIRONMENT AND UTILIZING A VIRTUAL INTERFACE' [patent_app_type] => utility [patent_app_number] => 11/558103 [patent_app_country] => US [patent_app_date] => 2006-11-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7377 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0124/20070124536.pdf [firstpage_image] =>[orig_patent_app_number] => 11558103 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/558103
TOKEN DEVICE PROVIDING A SECURE WORK ENVIRONMENT AND UTILIZING A VIRTUAL INTERFACE Nov 8, 2006 Abandoned
Array ( [id] => 4944817 [patent_doc_number] => 20080082144 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-04-03 [patent_title] => 'UNIVERSAL USB-BASED TELEMETRY RF HEAD' [patent_app_type] => utility [patent_app_number] => 11/537014 [patent_app_country] => US [patent_app_date] => 2006-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 6383 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0082/20080082144.pdf [firstpage_image] =>[orig_patent_app_number] => 11537014 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/537014
UNIVERSAL USB-BASED TELEMETRY RF HEAD Sep 28, 2006 Abandoned
Array ( [id] => 4831121 [patent_doc_number] => 20080127327 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-05-29 [patent_title] => 'Deploying group VPNS and security groups over an end-to-end enterprise network' [patent_app_type] => utility [patent_app_number] => 11/529560 [patent_app_country] => US [patent_app_date] => 2006-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4123 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0127/20080127327.pdf [firstpage_image] =>[orig_patent_app_number] => 11529560 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/529560
Deploying group VPNS and security groups over an end-to-end enterprise network Sep 26, 2006 Issued
Array ( [id] => 144861 [patent_doc_number] => 07688976 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-03-30 [patent_title] => 'Random wave envelope derived random numbers and their use in generating transient keys in communication security application part I' [patent_app_type] => utility [patent_app_number] => 11/485208 [patent_app_country] => US [patent_app_date] => 2006-07-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 10 [patent_no_of_words] => 9583 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 119 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/688/07688976.pdf [firstpage_image] =>[orig_patent_app_number] => 11485208 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/485208
Random wave envelope derived random numbers and their use in generating transient keys in communication security application part I Jul 11, 2006 Issued
Array ( [id] => 5644212 [patent_doc_number] => 20060282667 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-12-14 [patent_title] => 'Method and system for performing re-association due to handover in a WLAN mesh network' [patent_app_type] => utility [patent_app_number] => 11/432666 [patent_app_country] => US [patent_app_date] => 2006-05-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3796 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0282/20060282667.pdf [firstpage_image] =>[orig_patent_app_number] => 11432666 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/432666
Method and system for performing re-association due to handover in a WLAN mesh network May 11, 2006 Issued
Array ( [id] => 5150791 [patent_doc_number] => 20070050851 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-03-01 [patent_title] => 'Information processing apparatus and information processing method' [patent_app_type] => utility [patent_app_number] => 11/432506 [patent_app_country] => US [patent_app_date] => 2006-05-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8350 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0050/20070050851.pdf [firstpage_image] =>[orig_patent_app_number] => 11432506 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/432506
Information processing apparatus and information processing method May 11, 2006 Abandoned
Array ( [id] => 4911644 [patent_doc_number] => 20080022411 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-01-24 [patent_title] => 'Method for local conditional access for mobile equipments' [patent_app_type] => utility [patent_app_number] => 11/431535 [patent_app_country] => US [patent_app_date] => 2006-05-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3487 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0022/20080022411.pdf [firstpage_image] =>[orig_patent_app_number] => 11431535 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/431535
Method for local conditional access for mobile equipments May 10, 2006 Abandoned
Array ( [id] => 4996120 [patent_doc_number] => 20070011465 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-01-11 [patent_title] => 'Methods and systems for ensuring accuracy of health-related data transmission over a network' [patent_app_type] => utility [patent_app_number] => 11/432746 [patent_app_country] => US [patent_app_date] => 2006-05-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3833 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0011/20070011465.pdf [firstpage_image] =>[orig_patent_app_number] => 11432746 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/432746
Methods and systems for ensuring accuracy of health-related data transmission over a network May 10, 2006 Abandoned
Array ( [id] => 5607542 [patent_doc_number] => 20060269058 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-11-30 [patent_title] => 'Network node, module therefor and distribution method' [patent_app_type] => utility [patent_app_number] => 11/430892 [patent_app_country] => US [patent_app_date] => 2006-05-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3242 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0269/20060269058.pdf [firstpage_image] =>[orig_patent_app_number] => 11430892 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/430892
Network node, module therefor and distribution method May 9, 2006 Abandoned
Array ( [id] => 5218892 [patent_doc_number] => 20070160203 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-07-12 [patent_title] => 'Receiver non-repudiation via a secure device' [patent_app_type] => utility [patent_app_number] => 11/430454 [patent_app_country] => US [patent_app_date] => 2006-05-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5522 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0160/20070160203.pdf [firstpage_image] =>[orig_patent_app_number] => 11430454 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/430454
Receiver non-repudiation via a secure device May 8, 2006 Issued
Array ( [id] => 5047161 [patent_doc_number] => 20070265835 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-11-15 [patent_title] => 'Method and system for securing execution of untrusted applications' [patent_app_type] => utility [patent_app_number] => 11/430720 [patent_app_country] => US [patent_app_date] => 2006-05-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3940 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0265/20070265835.pdf [firstpage_image] =>[orig_patent_app_number] => 11430720 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/430720
Method and system for securing execution of untrusted applications May 8, 2006 Issued
Menu