Search

Andre L. Jackson

Examiner (ID: 18925)

Most Active Art Unit
3677
Art Unit(s)
3677, 3626
Total Applications
399
Issued Applications
255
Pending Applications
11
Abandoned Applications
133

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 13742833 [patent_doc_number] => 20180375886 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-12-27 [patent_title] => TECHNIQUES FOR MONITORING PRIVILEGED USERS AND DETECTING ANOMALOUS ACTIVITIES IN A COMPUTING ENVIRONMENT [patent_app_type] => utility [patent_app_number] => 16/011538 [patent_app_country] => US [patent_app_date] => 2018-06-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 32629 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 256 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16011538 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/011538
Techniques for monitoring privileged users and detecting anomalous activities in a computing environment Jun 17, 2018 Issued
Array ( [id] => 17926619 [patent_doc_number] => 11469891 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-10-11 [patent_title] => Expendable cryptographic key access [patent_app_type] => utility [patent_app_number] => 16/620260 [patent_app_country] => US [patent_app_date] => 2018-06-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 3425 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 222 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16620260 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/620260
Expendable cryptographic key access Jun 10, 2018 Issued
Array ( [id] => 14153575 [patent_doc_number] => 10257181 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-04-09 [patent_title] => Methods and processes for utilizing information collected for enhanced verification [patent_app_type] => utility [patent_app_number] => 15/972697 [patent_app_country] => US [patent_app_date] => 2018-05-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9742 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15972697 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/972697
Methods and processes for utilizing information collected for enhanced verification May 6, 2018 Issued
Array ( [id] => 13203455 [patent_doc_number] => 10116657 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-10-30 [patent_title] => Systems and methods for providing block chain-based multifactor personal identity verification [patent_app_type] => utility [patent_app_number] => 15/966320 [patent_app_country] => US [patent_app_date] => 2018-04-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5555 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 198 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15966320 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/966320
Systems and methods for providing block chain-based multifactor personal identity verification Apr 29, 2018 Issued
Array ( [id] => 16716724 [patent_doc_number] => 20210083871 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-03-18 [patent_title] => METHOD AND DEVICE FOR IMPLEMENTATION OF SAFE TRANSACTIONS IN BLOCKCHAIN INFRASTRUCTURE [patent_app_type] => utility [patent_app_number] => 16/309454 [patent_app_country] => US [patent_app_date] => 2018-04-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 1750 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -8 [patent_words_short_claim] => 100 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16309454 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/309454
METHOD AND DEVICE FOR IMPLEMENTATION OF SAFE TRANSACTIONS IN BLOCKCHAIN INFRASTRUCTURE Apr 10, 2018 Abandoned
Array ( [id] => 14646109 [patent_doc_number] => 10367811 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-30 [patent_title] => Methods for internet communication security [patent_app_type] => utility [patent_app_number] => 15/949749 [patent_app_country] => US [patent_app_date] => 2018-04-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 41 [patent_figures_cnt] => 41 [patent_no_of_words] => 127820 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 412 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15949749 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/949749
Methods for internet communication security Apr 9, 2018 Issued
Array ( [id] => 16070815 [patent_doc_number] => 10694384 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-06-23 [patent_title] => Schemes for connecting to wireless network [patent_app_type] => utility [patent_app_number] => 15/941476 [patent_app_country] => US [patent_app_date] => 2018-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5695 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 149 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15941476 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/941476
Schemes for connecting to wireless network Mar 29, 2018 Issued
Array ( [id] => 13572807 [patent_doc_number] => 20180337952 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-11-22 [patent_title] => CYBER SECURITY SHARING AND IDENTIFICATION SYSTEM [patent_app_type] => utility [patent_app_number] => 15/923949 [patent_app_country] => US [patent_app_date] => 2018-03-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11651 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15923949 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/923949
Cyber security sharing and identification system Mar 15, 2018 Issued
Array ( [id] => 12920350 [patent_doc_number] => 20180198626 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-07-12 [patent_title] => BLOCKCHAIN-SUPPORTED, FAIL-SAFE SYNCHRONIZATION IN A DATA AUTHENTICATION INFRASTRUCTURE [patent_app_type] => utility [patent_app_number] => 15/913816 [patent_app_country] => US [patent_app_date] => 2018-03-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15955 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -15 [patent_words_short_claim] => 323 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15913816 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/913816
Blockchain-supported, fail-safe synchronization in a data authentication infrastructure Mar 5, 2018 Issued
Array ( [id] => 12798001 [patent_doc_number] => 20180157836 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-06-07 [patent_title] => METHOD AND SYSTEM FOR PROACTIVE DETECTION OF MALICIOUS SHARED LIBRARIES VIA A REMOTE REPUTATION SYSTEM [patent_app_type] => utility [patent_app_number] => 15/888532 [patent_app_country] => US [patent_app_date] => 2018-02-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10460 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15888532 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/888532
Method and system for proactive detection of malicious shared libraries via a remote reputation system Feb 4, 2018 Issued
Array ( [id] => 12781942 [patent_doc_number] => 20180152483 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-05-31 [patent_title] => DATA PROCESSING SYSTEMS AND METHODS FOR PERFORMING PRIVACY ASSESSMENTS AND MONITORING OF NEW VERSIONS OF COMPUTER CODE FOR PRIVACY COMPLIANCE [patent_app_type] => utility [patent_app_number] => 15/882989 [patent_app_country] => US [patent_app_date] => 2018-01-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10753 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -23 [patent_words_short_claim] => 252 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15882989 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/882989
Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance Jan 28, 2018 Issued
Array ( [id] => 12804190 [patent_doc_number] => 20180159900 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-06-07 [patent_title] => DATA PROCESSING SYSTEMS AND METHODS FOR PERFORMING PRIVACY ASSESSMENTS AND MONITORING OF NEW VERSIONS OF COMPUTER CODE FOR PRIVACY COMPLIANCE [patent_app_type] => utility [patent_app_number] => 15/883041 [patent_app_country] => US [patent_app_date] => 2018-01-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9732 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 158 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15883041 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/883041
Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance Jan 28, 2018 Issued
Array ( [id] => 12781831 [patent_doc_number] => 20180152446 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-05-31 [patent_title] => SYSTEM AND METHOD FOR SPEAKER RECOGNITION ON MOBILE DEVICES [patent_app_type] => utility [patent_app_number] => 15/879797 [patent_app_country] => US [patent_app_date] => 2018-01-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 24228 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -9 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15879797 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/879797
System and method for speaker recognition on mobile devices Jan 24, 2018 Issued
Array ( [id] => 14302509 [patent_doc_number] => 10291395 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-05-14 [patent_title] => Secure storage of data via a distributed ledger system [patent_app_type] => utility [patent_app_number] => 15/880193 [patent_app_country] => US [patent_app_date] => 2018-01-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7732 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 210 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15880193 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/880193
Secure storage of data via a distributed ledger system Jan 24, 2018 Issued
Array ( [id] => 12914542 [patent_doc_number] => 20180196690 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-07-12 [patent_title] => VIRTUAL MACHINE BASED CONTENT PROCESSING [patent_app_type] => utility [patent_app_number] => 15/876932 [patent_app_country] => US [patent_app_date] => 2018-01-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6564 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15876932 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/876932
Virtual machine based content processing Jan 21, 2018 Issued
Array ( [id] => 13322431 [patent_doc_number] => 20180212753 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-07-26 [patent_title] => End-To-End Secure Operations Using a Query Vector [patent_app_type] => utility [patent_app_number] => 15/875952 [patent_app_country] => US [patent_app_date] => 2018-01-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5294 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 94 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15875952 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/875952
End-to-end secure operations using a query vector Jan 18, 2018 Issued
Array ( [id] => 16747241 [patent_doc_number] => 10972251 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-04-06 [patent_title] => Secure web browsing via homomorphic encryption [patent_app_type] => utility [patent_app_number] => 15/876043 [patent_app_country] => US [patent_app_date] => 2018-01-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 5588 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 77 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15876043 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/876043
Secure web browsing via homomorphic encryption Jan 18, 2018 Issued
Array ( [id] => 13336727 [patent_doc_number] => 20180219902 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-08-02 [patent_title] => ENDPOINT VULNERABILITY ANALYSIS PLATFORM [patent_app_type] => utility [patent_app_number] => 15/865509 [patent_app_country] => US [patent_app_date] => 2018-01-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9721 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 354 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15865509 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/865509
Endpoint vulnerability analysis platform Jan 8, 2018 Issued
Array ( [id] => 13545321 [patent_doc_number] => 20180324208 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-11-08 [patent_title] => SYSTEM AND METHOD FOR IDENTIFYING AND PREVENTING MALICIOUS API ATTACKS [patent_app_type] => utility [patent_app_number] => 15/821124 [patent_app_country] => US [patent_app_date] => 2017-11-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8511 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 192 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15821124 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/821124
SYSTEM AND METHOD FOR IDENTIFYING AND PREVENTING MALICIOUS API ATTACKS Nov 21, 2017 Abandoned
Array ( [id] => 15374941 [patent_doc_number] => 10529194 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-01-07 [patent_title] => End user protection against ATM keypad overlay [patent_app_type] => utility [patent_app_number] => 15/800183 [patent_app_country] => US [patent_app_date] => 2017-11-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7094 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15800183 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/800183
End user protection against ATM keypad overlay Oct 31, 2017 Issued
Menu