Search

Andre L. Jackson

Examiner (ID: 18925)

Most Active Art Unit
3677
Art Unit(s)
3677, 3626
Total Applications
399
Issued Applications
255
Pending Applications
11
Abandoned Applications
133

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 14165223 [patent_doc_number] => 20190109714 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-04-11 [patent_title] => Methods for Internet Communication Security [patent_app_type] => utility [patent_app_number] => 16/153409 [patent_app_country] => US [patent_app_date] => 2018-10-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 153172 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -23 [patent_words_short_claim] => 125 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16153409 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/153409
Methods for internet communication security Oct 4, 2018 Issued
Array ( [id] => 14369183 [patent_doc_number] => 10305914 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-05-28 [patent_title] => Secure transfer of secrets for computing devices to access network resources [patent_app_type] => utility [patent_app_number] => 16/150580 [patent_app_country] => US [patent_app_date] => 2018-10-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 9481 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 171 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16150580 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/150580
Secure transfer of secrets for computing devices to access network resources Oct 2, 2018 Issued
Array ( [id] => 13849973 [patent_doc_number] => 20190028471 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-01-24 [patent_title] => SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION [patent_app_type] => utility [patent_app_number] => 16/138454 [patent_app_country] => US [patent_app_date] => 2018-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5553 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -27 [patent_words_short_claim] => 314 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16138454 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/138454
Systems and methods for providing block chain-based multifactor personal identity verification Sep 20, 2018 Issued
Array ( [id] => 13881155 [patent_doc_number] => 20190036918 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-01-31 [patent_title] => SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION [patent_app_type] => utility [patent_app_number] => 16/138359 [patent_app_country] => US [patent_app_date] => 2018-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5553 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -26 [patent_words_short_claim] => 314 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16138359 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/138359
Systems and methods for providing block chain-based multifactor personal identity verification Sep 20, 2018 Issued
Array ( [id] => 16292424 [patent_doc_number] => 10769276 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-09-08 [patent_title] => Advanced threat protection cross-product security controller [patent_app_type] => utility [patent_app_number] => 16/133485 [patent_app_country] => US [patent_app_date] => 2018-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 7542 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 103 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16133485 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/133485
Advanced threat protection cross-product security controller Sep 16, 2018 Issued
Array ( [id] => 14189441 [patent_doc_number] => 20190114426 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-04-18 [patent_title] => METHOD OF REMEDIATING OPERATIONS PERFORMED BY A PROGRAM AND SYSTEM THEREOF [patent_app_type] => utility [patent_app_number] => 16/132240 [patent_app_country] => US [patent_app_date] => 2018-09-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 19762 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16132240 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/132240
Method of remediating operations performed by a program and system thereof Sep 13, 2018 Issued
Array ( [id] => 15477647 [patent_doc_number] => 10554720 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-02-04 [patent_title] => Selecting routes through a network [patent_app_type] => utility [patent_app_number] => 16/128098 [patent_app_country] => US [patent_app_date] => 2018-09-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 12269 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 268 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16128098 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/128098
Selecting routes through a network Sep 10, 2018 Issued
Array ( [id] => 16082895 [patent_doc_number] => 20200195434 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-06-18 [patent_title] => HARDWARE SECURITY MODULE EQUIPMENT WITH NATIVE IMPLEMENTATION OF A CRYPTOGRAPHIC KEY MANAGEMENT COMMUNICATION PROTOCOL AND REMOTE CONFIDENCE ENHANCEMENT METHOD FOR AUTHORIZATION OF OPERATIONS [patent_app_type] => utility [patent_app_number] => 16/639963 [patent_app_country] => US [patent_app_date] => 2018-08-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2351 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -5 [patent_words_short_claim] => 38 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16639963 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/639963
HARDWARE SECURITY MODULE EQUIPMENT WITH NATIVE IMPLEMENTATION OF A CRYPTOGRAPHIC KEY MANAGEMENT COMMUNICATION PROTOCOL AND REMOTE CONFIDENCE ENHANCEMENT METHOD FOR AUTHORIZATION OF OPERATIONS Aug 16, 2018 Abandoned
Array ( [id] => 16566503 [patent_doc_number] => 10891877 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-01-12 [patent_title] => Methods and apparatus for securing sounding symbols [patent_app_type] => utility [patent_app_number] => 15/998726 [patent_app_country] => US [patent_app_date] => 2018-08-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 17383 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 89 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15998726 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/998726
Methods and apparatus for securing sounding symbols Aug 14, 2018 Issued
Array ( [id] => 15505093 [patent_doc_number] => 20200052735 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-02-13 [patent_title] => METHOD OF IMPROVED CYBER SECURITY WITH FREQUENCY SEPARATION [patent_app_type] => utility [patent_app_number] => 16/057546 [patent_app_country] => US [patent_app_date] => 2018-08-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4706 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 87 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16057546 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/057546
Method of improved cyber security with frequency separation Aug 6, 2018 Issued
Array ( [id] => 14112661 [patent_doc_number] => 20190098006 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-03-28 [patent_title] => DEVICE-TO-DEVICE COMMUNICATION METHOD INCLUDING DEVICE-TO-DEVICE AUTHENTICATION USING HASH CHAIN [patent_app_type] => utility [patent_app_number] => 16/052074 [patent_app_country] => US [patent_app_date] => 2018-08-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15633 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -9 [patent_words_short_claim] => 138 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16052074 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/052074
Device-to-device communication method including device-to-device authentication using hash chain Jul 31, 2018 Issued
Array ( [id] => 13600905 [patent_doc_number] => 20180352001 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-12-06 [patent_title] => DATA PROCESSING SYSTEMS AND METHODS FOR PERFORMING PRIVACY ASSESSMENTS AND MONITORING OF NEW VERSIONS OF COMPUTER CODE FOR PRIVACY COMPLIANCE [patent_app_type] => utility [patent_app_number] => 16/042673 [patent_app_country] => US [patent_app_date] => 2018-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9911 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 267 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16042673 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/042673
Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance Jul 22, 2018 Issued
Array ( [id] => 14448743 [patent_doc_number] => 20190182245 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-06-13 [patent_title] => Securing Remote Authentication [patent_app_type] => utility [patent_app_number] => 16/041283 [patent_app_country] => US [patent_app_date] => 2018-07-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7519 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16041283 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/041283
Securing remote authentication Jul 19, 2018 Issued
Array ( [id] => 18030627 [patent_doc_number] => 11513816 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-11-29 [patent_title] => System configuration control of a hardware system [patent_app_type] => utility [patent_app_number] => 16/630666 [patent_app_country] => US [patent_app_date] => 2018-07-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 14761 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 293 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16630666 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/630666
System configuration control of a hardware system Jul 15, 2018 Issued
Array ( [id] => 14826011 [patent_doc_number] => 10410016 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-09-10 [patent_title] => Cloud-based system for protecting sensitive information in shared content [patent_app_type] => utility [patent_app_number] => 16/028373 [patent_app_country] => US [patent_app_date] => 2018-07-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9948 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16028373 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/028373
Cloud-based system for protecting sensitive information in shared content Jul 4, 2018 Issued
16/022219 SYSTEMS AND METHODS FOR MANAGING OBFUSCATED CONTENT Jun 27, 2018
Array ( [id] => 13740207 [patent_doc_number] => 20180374573 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-12-27 [patent_title] => Access Systems For Use With Patient Support Apparatuses [patent_app_type] => utility [patent_app_number] => 16/019986 [patent_app_country] => US [patent_app_date] => 2018-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12551 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -21 [patent_words_short_claim] => 119 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16019986 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/019986
Access systems for use with patient support apparatuses Jun 26, 2018 Issued
Array ( [id] => 14724795 [patent_doc_number] => 20190253461 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-08-15 [patent_title] => SECURITY MANAGEMENT IN COMMUNICATION SYSTEMS WITH PROVISIONING BASED MECHANISM TO IDENTIFY INFORMATION ELEMENTS [patent_app_type] => utility [patent_app_number] => 16/014358 [patent_app_country] => US [patent_app_date] => 2018-06-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4927 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 110 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16014358 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/014358
Security management in communication systems with provisioning based mechanism to identify information elements Jun 20, 2018 Issued
Array ( [id] => 17819285 [patent_doc_number] => 11424913 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-08-23 [patent_title] => Key exchange system and key exchange method [patent_app_type] => utility [patent_app_number] => 16/621000 [patent_app_country] => US [patent_app_date] => 2018-06-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 6573 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 269 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16621000 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/621000
Key exchange system and key exchange method Jun 19, 2018 Issued
Array ( [id] => 18705486 [patent_doc_number] => 11792008 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-10-17 [patent_title] => Actively monitoring encrypted traffic by inspecting logs [patent_app_type] => utility [patent_app_number] => 16/612422 [patent_app_country] => US [patent_app_date] => 2018-06-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 12508 [patent_no_of_claims] => 42 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 123 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16612422 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/612422
Actively monitoring encrypted traffic by inspecting logs Jun 18, 2018 Issued
Menu