Sun U Kim
Examiner (ID: 2713)
Most Active Art Unit | 1777 |
Art Unit(s) | 1744, 1777, 1723, 1306, 1797 |
Total Applications | 2555 |
Issued Applications | 1815 |
Pending Applications | 277 |
Abandoned Applications | 429 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 4951399
[patent_doc_number] => 20080307525
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-12-11
[patent_title] => 'SYSTEM AND METHOD FOR EVALUATING SECURITY EVENTS IN THE CONTEXT OF AN ORGANIZATIONAL STRUCTURE'
[patent_app_type] => utility
[patent_app_number] => 11/758371
[patent_app_country] => US
[patent_app_date] => 2007-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4454
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0307/20080307525.pdf
[firstpage_image] =>[orig_patent_app_number] => 11758371
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/758371 | SYSTEM AND METHOD FOR EVALUATING SECURITY EVENTS IN THE CONTEXT OF AN ORGANIZATIONAL STRUCTURE | Jun 4, 2007 | Abandoned |
Array
(
[id] => 4945707
[patent_doc_number] => 20080083034
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-04-03
[patent_title] => 'ATTACK CLASSIFICATION METHOD FOR COMPUTER NETWORK SECURITY'
[patent_app_type] => utility
[patent_app_number] => 11/757701
[patent_app_country] => US
[patent_app_date] => 2007-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4962
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0083/20080083034.pdf
[firstpage_image] =>[orig_patent_app_number] => 11757701
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/757701 | ATTACK CLASSIFICATION METHOD FOR COMPUTER NETWORK SECURITY | Jun 3, 2007 | Abandoned |
Array
(
[id] => 5232644
[patent_doc_number] => 20070294753
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-12-20
[patent_title] => 'ADAPTOR OR IC CARD FOR ENCRYPTED COMMUNICATION ON NETWORK'
[patent_app_type] => utility
[patent_app_number] => 11/757443
[patent_app_country] => US
[patent_app_date] => 2007-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 14148
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0294/20070294753.pdf
[firstpage_image] =>[orig_patent_app_number] => 11757443
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/757443 | ADAPTOR OR IC CARD FOR ENCRYPTED COMMUNICATION ON NETWORK | Jun 3, 2007 | Abandoned |
Array
(
[id] => 4712939
[patent_doc_number] => 20080301465
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-12-04
[patent_title] => 'PROTECTION OF SOFTWARE TRANSMITTED OVER AN UNPROTECTED INTERFACE'
[patent_app_type] => utility
[patent_app_number] => 11/757790
[patent_app_country] => US
[patent_app_date] => 2007-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6472
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0301/20080301465.pdf
[firstpage_image] =>[orig_patent_app_number] => 11757790
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/757790 | PROTECTION OF SOFTWARE TRANSMITTED OVER AN UNPROTECTED INTERFACE | Jun 3, 2007 | Abandoned |
Array
(
[id] => 4722442
[patent_doc_number] => 20080244273
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-10-02
[patent_title] => 'CRYPTOGRAPHIC METHOD USING REDUNDANT BITS AND ADAPTIVE CLOCK FREQUENCY'
[patent_app_type] => utility
[patent_app_number] => 11/757326
[patent_app_country] => US
[patent_app_date] => 2007-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3314
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0244/20080244273.pdf
[firstpage_image] =>[orig_patent_app_number] => 11757326
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/757326 | CRYPTOGRAPHIC METHOD USING REDUNDANT BITS AND ADAPTIVE CLOCK FREQUENCY | May 31, 2007 | Abandoned |
Array
(
[id] => 4713270
[patent_doc_number] => 20080301796
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-12-04
[patent_title] => 'Adjusting the Levels of Anti-Malware Protection'
[patent_app_type] => utility
[patent_app_number] => 11/756598
[patent_app_country] => US
[patent_app_date] => 2007-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5063
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0301/20080301796.pdf
[firstpage_image] =>[orig_patent_app_number] => 11756598
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/756598 | Adjusting the Levels of Anti-Malware Protection | May 30, 2007 | Abandoned |
Array
(
[id] => 4713289
[patent_doc_number] => 20080301815
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-12-04
[patent_title] => 'Detecting Unauthorized Changes to Printed Documents'
[patent_app_type] => utility
[patent_app_number] => 11/756599
[patent_app_country] => US
[patent_app_date] => 2007-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3350
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0301/20080301815.pdf
[firstpage_image] =>[orig_patent_app_number] => 11756599
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/756599 | Detecting Unauthorized Changes to Printed Documents | May 30, 2007 | Abandoned |
Array
(
[id] => 5004131
[patent_doc_number] => 20070201699
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-08-30
[patent_title] => 'BROADCAST RECEIVER AND BROADCAST RECEIVING METHOD'
[patent_app_type] => utility
[patent_app_number] => 11/678145
[patent_app_country] => US
[patent_app_date] => 2007-02-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4221
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0201/20070201699.pdf
[firstpage_image] =>[orig_patent_app_number] => 11678145
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/678145 | BROADCAST RECEIVER AND BROADCAST RECEIVING METHOD | Feb 22, 2007 | Abandoned |
Array
(
[id] => 4486742
[patent_doc_number] => 07870399
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-01-11
[patent_title] => 'Software trusted platform module and application security wrapper'
[patent_app_type] => utility
[patent_app_number] => 11/672054
[patent_app_country] => US
[patent_app_date] => 2007-02-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 5773
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/870/07870399.pdf
[firstpage_image] =>[orig_patent_app_number] => 11672054
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/672054 | Software trusted platform module and application security wrapper | Feb 6, 2007 | Issued |
Array
(
[id] => 5081312
[patent_doc_number] => 20070124536
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-05-31
[patent_title] => 'TOKEN DEVICE PROVIDING A SECURE WORK ENVIRONMENT AND UTILIZING A VIRTUAL INTERFACE'
[patent_app_type] => utility
[patent_app_number] => 11/558103
[patent_app_country] => US
[patent_app_date] => 2006-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7377
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0124/20070124536.pdf
[firstpage_image] =>[orig_patent_app_number] => 11558103
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/558103 | TOKEN DEVICE PROVIDING A SECURE WORK ENVIRONMENT AND UTILIZING A VIRTUAL INTERFACE | Nov 8, 2006 | Abandoned |
Array
(
[id] => 4944817
[patent_doc_number] => 20080082144
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-04-03
[patent_title] => 'UNIVERSAL USB-BASED TELEMETRY RF HEAD'
[patent_app_type] => utility
[patent_app_number] => 11/537014
[patent_app_country] => US
[patent_app_date] => 2006-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 6383
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0082/20080082144.pdf
[firstpage_image] =>[orig_patent_app_number] => 11537014
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/537014 | UNIVERSAL USB-BASED TELEMETRY RF HEAD | Sep 28, 2006 | Abandoned |
Array
(
[id] => 4831121
[patent_doc_number] => 20080127327
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-05-29
[patent_title] => 'Deploying group VPNS and security groups over an end-to-end enterprise network'
[patent_app_type] => utility
[patent_app_number] => 11/529560
[patent_app_country] => US
[patent_app_date] => 2006-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4123
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0127/20080127327.pdf
[firstpage_image] =>[orig_patent_app_number] => 11529560
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/529560 | Deploying group VPNS and security groups over an end-to-end enterprise network | Sep 26, 2006 | Issued |
Array
(
[id] => 144861
[patent_doc_number] => 07688976
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-03-30
[patent_title] => 'Random wave envelope derived random numbers and their use in generating transient keys in communication security application part I'
[patent_app_type] => utility
[patent_app_number] => 11/485208
[patent_app_country] => US
[patent_app_date] => 2006-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 9583
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/688/07688976.pdf
[firstpage_image] =>[orig_patent_app_number] => 11485208
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/485208 | Random wave envelope derived random numbers and their use in generating transient keys in communication security application part I | Jul 11, 2006 | Issued |
Array
(
[id] => 5644212
[patent_doc_number] => 20060282667
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-12-14
[patent_title] => 'Method and system for performing re-association due to handover in a WLAN mesh network'
[patent_app_type] => utility
[patent_app_number] => 11/432666
[patent_app_country] => US
[patent_app_date] => 2006-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3796
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0282/20060282667.pdf
[firstpage_image] =>[orig_patent_app_number] => 11432666
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/432666 | Method and system for performing re-association due to handover in a WLAN mesh network | May 11, 2006 | Issued |
Array
(
[id] => 5150791
[patent_doc_number] => 20070050851
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-03-01
[patent_title] => 'Information processing apparatus and information processing method'
[patent_app_type] => utility
[patent_app_number] => 11/432506
[patent_app_country] => US
[patent_app_date] => 2006-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8350
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0050/20070050851.pdf
[firstpage_image] =>[orig_patent_app_number] => 11432506
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/432506 | Information processing apparatus and information processing method | May 11, 2006 | Abandoned |
Array
(
[id] => 4911644
[patent_doc_number] => 20080022411
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-01-24
[patent_title] => 'Method for local conditional access for mobile equipments'
[patent_app_type] => utility
[patent_app_number] => 11/431535
[patent_app_country] => US
[patent_app_date] => 2006-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3487
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0022/20080022411.pdf
[firstpage_image] =>[orig_patent_app_number] => 11431535
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/431535 | Method for local conditional access for mobile equipments | May 10, 2006 | Abandoned |
Array
(
[id] => 4996120
[patent_doc_number] => 20070011465
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-01-11
[patent_title] => 'Methods and systems for ensuring accuracy of health-related data transmission over a network'
[patent_app_type] => utility
[patent_app_number] => 11/432746
[patent_app_country] => US
[patent_app_date] => 2006-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3833
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0011/20070011465.pdf
[firstpage_image] =>[orig_patent_app_number] => 11432746
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/432746 | Methods and systems for ensuring accuracy of health-related data transmission over a network | May 10, 2006 | Abandoned |
Array
(
[id] => 5607542
[patent_doc_number] => 20060269058
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-11-30
[patent_title] => 'Network node, module therefor and distribution method'
[patent_app_type] => utility
[patent_app_number] => 11/430892
[patent_app_country] => US
[patent_app_date] => 2006-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3242
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0269/20060269058.pdf
[firstpage_image] =>[orig_patent_app_number] => 11430892
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/430892 | Network node, module therefor and distribution method | May 9, 2006 | Abandoned |
Array
(
[id] => 5218892
[patent_doc_number] => 20070160203
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-07-12
[patent_title] => 'Receiver non-repudiation via a secure device'
[patent_app_type] => utility
[patent_app_number] => 11/430454
[patent_app_country] => US
[patent_app_date] => 2006-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5522
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0160/20070160203.pdf
[firstpage_image] =>[orig_patent_app_number] => 11430454
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/430454 | Receiver non-repudiation via a secure device | May 8, 2006 | Issued |
Array
(
[id] => 5047161
[patent_doc_number] => 20070265835
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2007-11-15
[patent_title] => 'Method and system for securing execution of untrusted applications'
[patent_app_type] => utility
[patent_app_number] => 11/430720
[patent_app_country] => US
[patent_app_date] => 2006-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3940
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0265/20070265835.pdf
[firstpage_image] =>[orig_patent_app_number] => 11430720
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/430720 | Method and system for securing execution of untrusted applications | May 8, 2006 | Issued |