
Andre L. Jackson
Examiner (ID: 18925)
| Most Active Art Unit | 3677 |
| Art Unit(s) | 3677, 3626 |
| Total Applications | 399 |
| Issued Applications | 255 |
| Pending Applications | 11 |
| Abandoned Applications | 133 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14165223
[patent_doc_number] => 20190109714
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-11
[patent_title] => Methods for Internet Communication Security
[patent_app_type] => utility
[patent_app_number] => 16/153409
[patent_app_country] => US
[patent_app_date] => 2018-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 153172
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -23
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16153409
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/153409 | Methods for internet communication security | Oct 4, 2018 | Issued |
Array
(
[id] => 14369183
[patent_doc_number] => 10305914
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-05-28
[patent_title] => Secure transfer of secrets for computing devices to access network resources
[patent_app_type] => utility
[patent_app_number] => 16/150580
[patent_app_country] => US
[patent_app_date] => 2018-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9481
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16150580
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/150580 | Secure transfer of secrets for computing devices to access network resources | Oct 2, 2018 | Issued |
Array
(
[id] => 13849973
[patent_doc_number] => 20190028471
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-24
[patent_title] => SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION
[patent_app_type] => utility
[patent_app_number] => 16/138454
[patent_app_country] => US
[patent_app_date] => 2018-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5553
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 314
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16138454
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/138454 | Systems and methods for providing block chain-based multifactor personal identity verification | Sep 20, 2018 | Issued |
Array
(
[id] => 13881155
[patent_doc_number] => 20190036918
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-31
[patent_title] => SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION
[patent_app_type] => utility
[patent_app_number] => 16/138359
[patent_app_country] => US
[patent_app_date] => 2018-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5553
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 314
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16138359
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/138359 | Systems and methods for providing block chain-based multifactor personal identity verification | Sep 20, 2018 | Issued |
Array
(
[id] => 16292424
[patent_doc_number] => 10769276
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-08
[patent_title] => Advanced threat protection cross-product security controller
[patent_app_type] => utility
[patent_app_number] => 16/133485
[patent_app_country] => US
[patent_app_date] => 2018-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 7542
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16133485
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/133485 | Advanced threat protection cross-product security controller | Sep 16, 2018 | Issued |
Array
(
[id] => 14189441
[patent_doc_number] => 20190114426
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-18
[patent_title] => METHOD OF REMEDIATING OPERATIONS PERFORMED BY A PROGRAM AND SYSTEM THEREOF
[patent_app_type] => utility
[patent_app_number] => 16/132240
[patent_app_country] => US
[patent_app_date] => 2018-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19762
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16132240
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/132240 | Method of remediating operations performed by a program and system thereof | Sep 13, 2018 | Issued |
Array
(
[id] => 15477647
[patent_doc_number] => 10554720
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-02-04
[patent_title] => Selecting routes through a network
[patent_app_type] => utility
[patent_app_number] => 16/128098
[patent_app_country] => US
[patent_app_date] => 2018-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12269
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 268
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16128098
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/128098 | Selecting routes through a network | Sep 10, 2018 | Issued |
Array
(
[id] => 16082895
[patent_doc_number] => 20200195434
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-18
[patent_title] => HARDWARE SECURITY MODULE EQUIPMENT WITH NATIVE IMPLEMENTATION OF A CRYPTOGRAPHIC KEY MANAGEMENT COMMUNICATION PROTOCOL AND REMOTE CONFIDENCE ENHANCEMENT METHOD FOR AUTHORIZATION OF OPERATIONS
[patent_app_type] => utility
[patent_app_number] => 16/639963
[patent_app_country] => US
[patent_app_date] => 2018-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2351
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 38
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16639963
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/639963 | HARDWARE SECURITY MODULE EQUIPMENT WITH NATIVE IMPLEMENTATION OF A CRYPTOGRAPHIC KEY MANAGEMENT COMMUNICATION PROTOCOL AND REMOTE CONFIDENCE ENHANCEMENT METHOD FOR AUTHORIZATION OF OPERATIONS | Aug 16, 2018 | Abandoned |
Array
(
[id] => 16566503
[patent_doc_number] => 10891877
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-01-12
[patent_title] => Methods and apparatus for securing sounding symbols
[patent_app_type] => utility
[patent_app_number] => 15/998726
[patent_app_country] => US
[patent_app_date] => 2018-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 17383
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15998726
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/998726 | Methods and apparatus for securing sounding symbols | Aug 14, 2018 | Issued |
Array
(
[id] => 15505093
[patent_doc_number] => 20200052735
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-13
[patent_title] => METHOD OF IMPROVED CYBER SECURITY WITH FREQUENCY SEPARATION
[patent_app_type] => utility
[patent_app_number] => 16/057546
[patent_app_country] => US
[patent_app_date] => 2018-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4706
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16057546
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/057546 | Method of improved cyber security with frequency separation | Aug 6, 2018 | Issued |
Array
(
[id] => 14112661
[patent_doc_number] => 20190098006
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-28
[patent_title] => DEVICE-TO-DEVICE COMMUNICATION METHOD INCLUDING DEVICE-TO-DEVICE AUTHENTICATION USING HASH CHAIN
[patent_app_type] => utility
[patent_app_number] => 16/052074
[patent_app_country] => US
[patent_app_date] => 2018-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15633
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16052074
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/052074 | Device-to-device communication method including device-to-device authentication using hash chain | Jul 31, 2018 | Issued |
Array
(
[id] => 13600905
[patent_doc_number] => 20180352001
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-06
[patent_title] => DATA PROCESSING SYSTEMS AND METHODS FOR PERFORMING PRIVACY ASSESSMENTS AND MONITORING OF NEW VERSIONS OF COMPUTER CODE FOR PRIVACY COMPLIANCE
[patent_app_type] => utility
[patent_app_number] => 16/042673
[patent_app_country] => US
[patent_app_date] => 2018-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9911
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 267
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16042673
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/042673 | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance | Jul 22, 2018 | Issued |
Array
(
[id] => 14448743
[patent_doc_number] => 20190182245
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-06-13
[patent_title] => Securing Remote Authentication
[patent_app_type] => utility
[patent_app_number] => 16/041283
[patent_app_country] => US
[patent_app_date] => 2018-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7519
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16041283
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/041283 | Securing remote authentication | Jul 19, 2018 | Issued |
Array
(
[id] => 18030627
[patent_doc_number] => 11513816
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-29
[patent_title] => System configuration control of a hardware system
[patent_app_type] => utility
[patent_app_number] => 16/630666
[patent_app_country] => US
[patent_app_date] => 2018-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 14761
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 293
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16630666
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/630666 | System configuration control of a hardware system | Jul 15, 2018 | Issued |
Array
(
[id] => 14826011
[patent_doc_number] => 10410016
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-09-10
[patent_title] => Cloud-based system for protecting sensitive information in shared content
[patent_app_type] => utility
[patent_app_number] => 16/028373
[patent_app_country] => US
[patent_app_date] => 2018-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9948
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16028373
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/028373 | Cloud-based system for protecting sensitive information in shared content | Jul 4, 2018 | Issued |
| 16/022219 | SYSTEMS AND METHODS FOR MANAGING OBFUSCATED CONTENT | Jun 27, 2018 | |
Array
(
[id] => 13740207
[patent_doc_number] => 20180374573
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-27
[patent_title] => Access Systems For Use With Patient Support Apparatuses
[patent_app_type] => utility
[patent_app_number] => 16/019986
[patent_app_country] => US
[patent_app_date] => 2018-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12551
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16019986
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/019986 | Access systems for use with patient support apparatuses | Jun 26, 2018 | Issued |
Array
(
[id] => 14724795
[patent_doc_number] => 20190253461
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-15
[patent_title] => SECURITY MANAGEMENT IN COMMUNICATION SYSTEMS WITH PROVISIONING BASED MECHANISM TO IDENTIFY INFORMATION ELEMENTS
[patent_app_type] => utility
[patent_app_number] => 16/014358
[patent_app_country] => US
[patent_app_date] => 2018-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4927
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16014358
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/014358 | Security management in communication systems with provisioning based mechanism to identify information elements | Jun 20, 2018 | Issued |
Array
(
[id] => 17819285
[patent_doc_number] => 11424913
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-23
[patent_title] => Key exchange system and key exchange method
[patent_app_type] => utility
[patent_app_number] => 16/621000
[patent_app_country] => US
[patent_app_date] => 2018-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 6573
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16621000
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/621000 | Key exchange system and key exchange method | Jun 19, 2018 | Issued |
Array
(
[id] => 18705486
[patent_doc_number] => 11792008
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-10-17
[patent_title] => Actively monitoring encrypted traffic by inspecting logs
[patent_app_type] => utility
[patent_app_number] => 16/612422
[patent_app_country] => US
[patent_app_date] => 2018-06-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 12508
[patent_no_of_claims] => 42
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16612422
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/612422 | Actively monitoring encrypted traffic by inspecting logs | Jun 18, 2018 | Issued |