
Andre L. Jackson
Examiner (ID: 18925)
| Most Active Art Unit | 3677 |
| Art Unit(s) | 3677, 3626 |
| Total Applications | 399 |
| Issued Applications | 255 |
| Pending Applications | 11 |
| Abandoned Applications | 133 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13742833
[patent_doc_number] => 20180375886
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-27
[patent_title] => TECHNIQUES FOR MONITORING PRIVILEGED USERS AND DETECTING ANOMALOUS ACTIVITIES IN A COMPUTING ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 16/011538
[patent_app_country] => US
[patent_app_date] => 2018-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 32629
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16011538
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/011538 | Techniques for monitoring privileged users and detecting anomalous activities in a computing environment | Jun 17, 2018 | Issued |
Array
(
[id] => 17926619
[patent_doc_number] => 11469891
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-11
[patent_title] => Expendable cryptographic key access
[patent_app_type] => utility
[patent_app_number] => 16/620260
[patent_app_country] => US
[patent_app_date] => 2018-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 3425
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16620260
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/620260 | Expendable cryptographic key access | Jun 10, 2018 | Issued |
Array
(
[id] => 14153575
[patent_doc_number] => 10257181
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-04-09
[patent_title] => Methods and processes for utilizing information collected for enhanced verification
[patent_app_type] => utility
[patent_app_number] => 15/972697
[patent_app_country] => US
[patent_app_date] => 2018-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9742
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15972697
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/972697 | Methods and processes for utilizing information collected for enhanced verification | May 6, 2018 | Issued |
Array
(
[id] => 13203455
[patent_doc_number] => 10116657
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-30
[patent_title] => Systems and methods for providing block chain-based multifactor personal identity verification
[patent_app_type] => utility
[patent_app_number] => 15/966320
[patent_app_country] => US
[patent_app_date] => 2018-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5555
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15966320
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/966320 | Systems and methods for providing block chain-based multifactor personal identity verification | Apr 29, 2018 | Issued |
Array
(
[id] => 16716724
[patent_doc_number] => 20210083871
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-18
[patent_title] => METHOD AND DEVICE FOR IMPLEMENTATION OF SAFE TRANSACTIONS IN BLOCKCHAIN INFRASTRUCTURE
[patent_app_type] => utility
[patent_app_number] => 16/309454
[patent_app_country] => US
[patent_app_date] => 2018-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1750
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16309454
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/309454 | METHOD AND DEVICE FOR IMPLEMENTATION OF SAFE TRANSACTIONS IN BLOCKCHAIN INFRASTRUCTURE | Apr 10, 2018 | Abandoned |
Array
(
[id] => 14646109
[patent_doc_number] => 10367811
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-30
[patent_title] => Methods for internet communication security
[patent_app_type] => utility
[patent_app_number] => 15/949749
[patent_app_country] => US
[patent_app_date] => 2018-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 41
[patent_figures_cnt] => 41
[patent_no_of_words] => 127820
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 412
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15949749
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/949749 | Methods for internet communication security | Apr 9, 2018 | Issued |
Array
(
[id] => 16070815
[patent_doc_number] => 10694384
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-23
[patent_title] => Schemes for connecting to wireless network
[patent_app_type] => utility
[patent_app_number] => 15/941476
[patent_app_country] => US
[patent_app_date] => 2018-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5695
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15941476
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/941476 | Schemes for connecting to wireless network | Mar 29, 2018 | Issued |
Array
(
[id] => 13572807
[patent_doc_number] => 20180337952
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-22
[patent_title] => CYBER SECURITY SHARING AND IDENTIFICATION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/923949
[patent_app_country] => US
[patent_app_date] => 2018-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11651
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15923949
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/923949 | Cyber security sharing and identification system | Mar 15, 2018 | Issued |
Array
(
[id] => 12920350
[patent_doc_number] => 20180198626
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-12
[patent_title] => BLOCKCHAIN-SUPPORTED, FAIL-SAFE SYNCHRONIZATION IN A DATA AUTHENTICATION INFRASTRUCTURE
[patent_app_type] => utility
[patent_app_number] => 15/913816
[patent_app_country] => US
[patent_app_date] => 2018-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15955
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 323
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15913816
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/913816 | Blockchain-supported, fail-safe synchronization in a data authentication infrastructure | Mar 5, 2018 | Issued |
Array
(
[id] => 12798001
[patent_doc_number] => 20180157836
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-07
[patent_title] => METHOD AND SYSTEM FOR PROACTIVE DETECTION OF MALICIOUS SHARED LIBRARIES VIA A REMOTE REPUTATION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/888532
[patent_app_country] => US
[patent_app_date] => 2018-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10460
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15888532
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/888532 | Method and system for proactive detection of malicious shared libraries via a remote reputation system | Feb 4, 2018 | Issued |
Array
(
[id] => 12781942
[patent_doc_number] => 20180152483
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-31
[patent_title] => DATA PROCESSING SYSTEMS AND METHODS FOR PERFORMING PRIVACY ASSESSMENTS AND MONITORING OF NEW VERSIONS OF COMPUTER CODE FOR PRIVACY COMPLIANCE
[patent_app_type] => utility
[patent_app_number] => 15/882989
[patent_app_country] => US
[patent_app_date] => 2018-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10753
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -23
[patent_words_short_claim] => 252
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15882989
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/882989 | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance | Jan 28, 2018 | Issued |
Array
(
[id] => 12804190
[patent_doc_number] => 20180159900
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-07
[patent_title] => DATA PROCESSING SYSTEMS AND METHODS FOR PERFORMING PRIVACY ASSESSMENTS AND MONITORING OF NEW VERSIONS OF COMPUTER CODE FOR PRIVACY COMPLIANCE
[patent_app_type] => utility
[patent_app_number] => 15/883041
[patent_app_country] => US
[patent_app_date] => 2018-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9732
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15883041
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/883041 | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance | Jan 28, 2018 | Issued |
Array
(
[id] => 12781831
[patent_doc_number] => 20180152446
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-31
[patent_title] => SYSTEM AND METHOD FOR SPEAKER RECOGNITION ON MOBILE DEVICES
[patent_app_type] => utility
[patent_app_number] => 15/879797
[patent_app_country] => US
[patent_app_date] => 2018-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 24228
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15879797
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/879797 | System and method for speaker recognition on mobile devices | Jan 24, 2018 | Issued |
Array
(
[id] => 14302509
[patent_doc_number] => 10291395
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-05-14
[patent_title] => Secure storage of data via a distributed ledger system
[patent_app_type] => utility
[patent_app_number] => 15/880193
[patent_app_country] => US
[patent_app_date] => 2018-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7732
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15880193
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/880193 | Secure storage of data via a distributed ledger system | Jan 24, 2018 | Issued |
Array
(
[id] => 12914542
[patent_doc_number] => 20180196690
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-12
[patent_title] => VIRTUAL MACHINE BASED CONTENT PROCESSING
[patent_app_type] => utility
[patent_app_number] => 15/876932
[patent_app_country] => US
[patent_app_date] => 2018-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6564
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15876932
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/876932 | Virtual machine based content processing | Jan 21, 2018 | Issued |
Array
(
[id] => 13322431
[patent_doc_number] => 20180212753
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-26
[patent_title] => End-To-End Secure Operations Using a Query Vector
[patent_app_type] => utility
[patent_app_number] => 15/875952
[patent_app_country] => US
[patent_app_date] => 2018-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5294
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15875952
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/875952 | End-to-end secure operations using a query vector | Jan 18, 2018 | Issued |
Array
(
[id] => 16747241
[patent_doc_number] => 10972251
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-06
[patent_title] => Secure web browsing via homomorphic encryption
[patent_app_type] => utility
[patent_app_number] => 15/876043
[patent_app_country] => US
[patent_app_date] => 2018-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 5588
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15876043
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/876043 | Secure web browsing via homomorphic encryption | Jan 18, 2018 | Issued |
Array
(
[id] => 13336727
[patent_doc_number] => 20180219902
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-02
[patent_title] => ENDPOINT VULNERABILITY ANALYSIS PLATFORM
[patent_app_type] => utility
[patent_app_number] => 15/865509
[patent_app_country] => US
[patent_app_date] => 2018-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9721
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 354
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15865509
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/865509 | Endpoint vulnerability analysis platform | Jan 8, 2018 | Issued |
Array
(
[id] => 13545321
[patent_doc_number] => 20180324208
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-08
[patent_title] => SYSTEM AND METHOD FOR IDENTIFYING AND PREVENTING MALICIOUS API ATTACKS
[patent_app_type] => utility
[patent_app_number] => 15/821124
[patent_app_country] => US
[patent_app_date] => 2017-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8511
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15821124
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/821124 | SYSTEM AND METHOD FOR IDENTIFYING AND PREVENTING MALICIOUS API ATTACKS | Nov 21, 2017 | Abandoned |
Array
(
[id] => 15374941
[patent_doc_number] => 10529194
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-07
[patent_title] => End user protection against ATM keypad overlay
[patent_app_type] => utility
[patent_app_number] => 15/800183
[patent_app_country] => US
[patent_app_date] => 2017-11-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7094
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15800183
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/800183 | End user protection against ATM keypad overlay | Oct 31, 2017 | Issued |