Search

Brian W. Jennison

Examiner (ID: 15120, Phone: (571)270-5930 , Office: P/3742 )

Most Active Art Unit
3761
Art Unit(s)
3761, 3742
Total Applications
1625
Issued Applications
1106
Pending Applications
149
Abandoned Applications
395

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10818733 [patent_doc_number] => 20160164897 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-06-09 [patent_title] => 'DETECTION OF AND RESPONSES TO NETWORK ATTACKS' [patent_app_type] => utility [patent_app_number] => 15/013452 [patent_app_country] => US [patent_app_date] => 2016-02-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 10009 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15013452 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/013452
DETECTION OF AND RESPONSES TO NETWORK ATTACKS Feb 1, 2016 Abandoned
Array ( [id] => 11037138 [patent_doc_number] => 20160234094 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-08-11 [patent_title] => 'STREAMING METHOD AND SYSTEM FOR PROCESSING NETWORK METADATA' [patent_app_type] => utility [patent_app_number] => 15/004614 [patent_app_country] => US [patent_app_date] => 2016-01-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8342 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15004614 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/004614
Streaming method and system for processing network metadata Jan 21, 2016 Issued
Array ( [id] => 13186553 [patent_doc_number] => 10108798 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-10-23 [patent_title] => Methods and systems for defending against cyber-attacks [patent_app_type] => utility [patent_app_number] => 14/987375 [patent_app_country] => US [patent_app_date] => 2016-01-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6537 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14987375 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/987375
Methods and systems for defending against cyber-attacks Jan 3, 2016 Issued
Array ( [id] => 14365127 [patent_doc_number] => 10303870 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-05-28 [patent_title] => Information processing apparatus, information processing method, and computer program product [patent_app_type] => utility [patent_app_number] => 14/961051 [patent_app_country] => US [patent_app_date] => 2015-12-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 30 [patent_no_of_words] => 9565 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 215 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14961051 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/961051
Information processing apparatus, information processing method, and computer program product Dec 6, 2015 Issued
Array ( [id] => 12394107 [patent_doc_number] => 09965618 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-05-08 [patent_title] => Reducing privileges for imported software packages [patent_app_type] => utility [patent_app_number] => 14/837401 [patent_app_country] => US [patent_app_date] => 2015-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 15206 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 132 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837401 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/837401
Reducing privileges for imported software packages Aug 26, 2015 Issued
Array ( [id] => 13017833 [patent_doc_number] => 10032031 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-07-24 [patent_title] => Detecting unknown software vulnerabilities and system compromises [patent_app_type] => utility [patent_app_number] => 14/837390 [patent_app_country] => US [patent_app_date] => 2015-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 15206 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837390 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/837390
Detecting unknown software vulnerabilities and system compromises Aug 26, 2015 Issued
Array ( [id] => 11905154 [patent_doc_number] => 09774605 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-09-26 [patent_title] => 'Temporary authorizations to access a computing system based on user skills' [patent_app_type] => utility [patent_app_number] => 14/837365 [patent_app_country] => US [patent_app_date] => 2015-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 7447 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 501 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837365 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/837365
Temporary authorizations to access a computing system based on user skills Aug 26, 2015 Issued
Array ( [id] => 13753229 [patent_doc_number] => 10169562 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-01-01 [patent_title] => Activity recognition to confirm secure authentication of a user [patent_app_type] => utility [patent_app_number] => 14/837334 [patent_app_country] => US [patent_app_date] => 2015-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 6677 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 319 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837334 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/837334
Activity recognition to confirm secure authentication of a user Aug 26, 2015 Issued
Array ( [id] => 12332649 [patent_doc_number] => 09946879 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-04-17 [patent_title] => Establishing risk profiles for software packages [patent_app_type] => utility [patent_app_number] => 14/837385 [patent_app_country] => US [patent_app_date] => 2015-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 15201 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 156 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837385 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/837385
Establishing risk profiles for software packages Aug 26, 2015 Issued
Array ( [id] => 11701017 [patent_doc_number] => 09690934 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-06-27 [patent_title] => 'Systems and methods for protecting computing devices from imposter accessibility services' [patent_app_type] => utility [patent_app_number] => 14/837383 [patent_app_country] => US [patent_app_date] => 2015-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8232 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 93 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837383 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/837383
Systems and methods for protecting computing devices from imposter accessibility services Aug 26, 2015 Issued
Array ( [id] => 13096863 [patent_doc_number] => 10067772 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-09-04 [patent_title] => Security-based message management [patent_app_type] => utility [patent_app_number] => 14/837444 [patent_app_country] => US [patent_app_date] => 2015-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 10442 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837444 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/837444
Security-based message management Aug 26, 2015 Issued
Array ( [id] => 10734004 [patent_doc_number] => 20160080154 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-17 [patent_title] => 'METHOD OF CONTROLLING ELECTRONIC DEVICE USING WEARABLE DEVICE AND METHOD OF OPERATING ELECTRONIC DEVICE' [patent_app_type] => utility [patent_app_number] => 14/837531 [patent_app_country] => US [patent_app_date] => 2015-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 11817 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 12 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837531 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/837531
Method of controlling electronic device using wearable device and method of operating electronic device Aug 26, 2015 Issued
Array ( [id] => 14096065 [patent_doc_number] => 10243957 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-03-26 [patent_title] => Preventing leakage of cookie data [patent_app_type] => utility [patent_app_number] => 14/837410 [patent_app_country] => US [patent_app_date] => 2015-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8168 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 203 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837410 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/837410
Preventing leakage of cookie data Aug 26, 2015 Issued
Array ( [id] => 12571953 [patent_doc_number] => 10019572 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-07-10 [patent_title] => Detecting malicious activities by imported software packages [patent_app_type] => utility [patent_app_number] => 14/837403 [patent_app_country] => US [patent_app_date] => 2015-08-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 15206 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 210 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837403 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/837403
Detecting malicious activities by imported software packages Aug 26, 2015 Issued
Array ( [id] => 11892023 [patent_doc_number] => 09762596 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-09-12 [patent_title] => 'Heuristic botnet detection' [patent_app_type] => utility [patent_app_number] => 14/826887 [patent_app_country] => US [patent_app_date] => 2015-08-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8201 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 287 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14826887 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/826887
Heuristic botnet detection Aug 13, 2015 Issued
Array ( [id] => 10439605 [patent_doc_number] => 20150324617 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-11-12 [patent_title] => 'System and Method for Remotely Initiating Lost Mode on a Computing Device' [patent_app_type] => utility [patent_app_number] => 14/805399 [patent_app_country] => US [patent_app_date] => 2015-07-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 9750 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14805399 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/805399
System and Method for Remotely Initiating Lost Mode on a Computing Device Jul 20, 2015 Abandoned
Array ( [id] => 12399039 [patent_doc_number] => 09967273 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-05-08 [patent_title] => Abusive traffic detection [patent_app_type] => utility [patent_app_number] => 14/739787 [patent_app_country] => US [patent_app_date] => 2015-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 10394 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 362 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739787 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/739787
Abusive traffic detection Jun 14, 2015 Issued
Array ( [id] => 11274584 [patent_doc_number] => 20160337131 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-11-17 [patent_title] => 'BIOMETRIC PKI AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 14/739535 [patent_app_country] => US [patent_app_date] => 2015-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 6017 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739535 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/739535
Biometric PKI authentication Jun 14, 2015 Issued
Array ( [id] => 11698346 [patent_doc_number] => 09688244 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-06-27 [patent_title] => 'Autonomous vehicle theft prevention' [patent_app_type] => utility [patent_app_number] => 14/739637 [patent_app_country] => US [patent_app_date] => 2015-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 7 [patent_no_of_words] => 6441 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 75 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739637 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/739637
Autonomous vehicle theft prevention Jun 14, 2015 Issued
Array ( [id] => 11215772 [patent_doc_number] => 09444822 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-09-13 [patent_title] => 'Storage array access control from cloud-based user authorization and authentication' [patent_app_type] => utility [patent_app_number] => 14/726449 [patent_app_country] => US [patent_app_date] => 2015-05-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7657 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 203 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14726449 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/726449
Storage array access control from cloud-based user authorization and authentication May 28, 2015 Issued
Menu