
Brian W. Jennison
Examiner (ID: 15120, Phone: (571)270-5930 , Office: P/3742 )
| Most Active Art Unit | 3761 |
| Art Unit(s) | 3761, 3742 |
| Total Applications | 1625 |
| Issued Applications | 1106 |
| Pending Applications | 149 |
| Abandoned Applications | 395 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10818733
[patent_doc_number] => 20160164897
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-09
[patent_title] => 'DETECTION OF AND RESPONSES TO NETWORK ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 15/013452
[patent_app_country] => US
[patent_app_date] => 2016-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10009
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15013452
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/013452 | DETECTION OF AND RESPONSES TO NETWORK ATTACKS | Feb 1, 2016 | Abandoned |
Array
(
[id] => 11037138
[patent_doc_number] => 20160234094
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'STREAMING METHOD AND SYSTEM FOR PROCESSING NETWORK METADATA'
[patent_app_type] => utility
[patent_app_number] => 15/004614
[patent_app_country] => US
[patent_app_date] => 2016-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8342
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15004614
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/004614 | Streaming method and system for processing network metadata | Jan 21, 2016 | Issued |
Array
(
[id] => 13186553
[patent_doc_number] => 10108798
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-10-23
[patent_title] => Methods and systems for defending against cyber-attacks
[patent_app_type] => utility
[patent_app_number] => 14/987375
[patent_app_country] => US
[patent_app_date] => 2016-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6537
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14987375
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/987375 | Methods and systems for defending against cyber-attacks | Jan 3, 2016 | Issued |
Array
(
[id] => 14365127
[patent_doc_number] => 10303870
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-28
[patent_title] => Information processing apparatus, information processing method, and computer program product
[patent_app_type] => utility
[patent_app_number] => 14/961051
[patent_app_country] => US
[patent_app_date] => 2015-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 30
[patent_no_of_words] => 9565
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14961051
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/961051 | Information processing apparatus, information processing method, and computer program product | Dec 6, 2015 | Issued |
Array
(
[id] => 12394107
[patent_doc_number] => 09965618
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-05-08
[patent_title] => Reducing privileges for imported software packages
[patent_app_type] => utility
[patent_app_number] => 14/837401
[patent_app_country] => US
[patent_app_date] => 2015-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15206
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837401
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/837401 | Reducing privileges for imported software packages | Aug 26, 2015 | Issued |
Array
(
[id] => 13017833
[patent_doc_number] => 10032031
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-07-24
[patent_title] => Detecting unknown software vulnerabilities and system compromises
[patent_app_type] => utility
[patent_app_number] => 14/837390
[patent_app_country] => US
[patent_app_date] => 2015-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15206
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837390
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/837390 | Detecting unknown software vulnerabilities and system compromises | Aug 26, 2015 | Issued |
Array
(
[id] => 11905154
[patent_doc_number] => 09774605
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-26
[patent_title] => 'Temporary authorizations to access a computing system based on user skills'
[patent_app_type] => utility
[patent_app_number] => 14/837365
[patent_app_country] => US
[patent_app_date] => 2015-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 7447
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 501
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837365
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/837365 | Temporary authorizations to access a computing system based on user skills | Aug 26, 2015 | Issued |
Array
(
[id] => 13753229
[patent_doc_number] => 10169562
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-01
[patent_title] => Activity recognition to confirm secure authentication of a user
[patent_app_type] => utility
[patent_app_number] => 14/837334
[patent_app_country] => US
[patent_app_date] => 2015-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 6677
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 319
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837334
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/837334 | Activity recognition to confirm secure authentication of a user | Aug 26, 2015 | Issued |
Array
(
[id] => 12332649
[patent_doc_number] => 09946879
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-04-17
[patent_title] => Establishing risk profiles for software packages
[patent_app_type] => utility
[patent_app_number] => 14/837385
[patent_app_country] => US
[patent_app_date] => 2015-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15201
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837385
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/837385 | Establishing risk profiles for software packages | Aug 26, 2015 | Issued |
Array
(
[id] => 11701017
[patent_doc_number] => 09690934
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-06-27
[patent_title] => 'Systems and methods for protecting computing devices from imposter accessibility services'
[patent_app_type] => utility
[patent_app_number] => 14/837383
[patent_app_country] => US
[patent_app_date] => 2015-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8232
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837383
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/837383 | Systems and methods for protecting computing devices from imposter accessibility services | Aug 26, 2015 | Issued |
Array
(
[id] => 13096863
[patent_doc_number] => 10067772
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-09-04
[patent_title] => Security-based message management
[patent_app_type] => utility
[patent_app_number] => 14/837444
[patent_app_country] => US
[patent_app_date] => 2015-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 10442
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837444
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/837444 | Security-based message management | Aug 26, 2015 | Issued |
Array
(
[id] => 10734004
[patent_doc_number] => 20160080154
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-17
[patent_title] => 'METHOD OF CONTROLLING ELECTRONIC DEVICE USING WEARABLE DEVICE AND METHOD OF OPERATING ELECTRONIC DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/837531
[patent_app_country] => US
[patent_app_date] => 2015-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 11817
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 12
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837531
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/837531 | Method of controlling electronic device using wearable device and method of operating electronic device | Aug 26, 2015 | Issued |
Array
(
[id] => 14096065
[patent_doc_number] => 10243957
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-03-26
[patent_title] => Preventing leakage of cookie data
[patent_app_type] => utility
[patent_app_number] => 14/837410
[patent_app_country] => US
[patent_app_date] => 2015-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8168
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837410
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/837410 | Preventing leakage of cookie data | Aug 26, 2015 | Issued |
Array
(
[id] => 12571953
[patent_doc_number] => 10019572
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-07-10
[patent_title] => Detecting malicious activities by imported software packages
[patent_app_type] => utility
[patent_app_number] => 14/837403
[patent_app_country] => US
[patent_app_date] => 2015-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15206
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837403
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/837403 | Detecting malicious activities by imported software packages | Aug 26, 2015 | Issued |
Array
(
[id] => 11892023
[patent_doc_number] => 09762596
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-12
[patent_title] => 'Heuristic botnet detection'
[patent_app_type] => utility
[patent_app_number] => 14/826887
[patent_app_country] => US
[patent_app_date] => 2015-08-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8201
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14826887
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/826887 | Heuristic botnet detection | Aug 13, 2015 | Issued |
Array
(
[id] => 10439605
[patent_doc_number] => 20150324617
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'System and Method for Remotely Initiating Lost Mode on a Computing Device'
[patent_app_type] => utility
[patent_app_number] => 14/805399
[patent_app_country] => US
[patent_app_date] => 2015-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 9750
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14805399
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/805399 | System and Method for Remotely Initiating Lost Mode on a Computing Device | Jul 20, 2015 | Abandoned |
Array
(
[id] => 12399039
[patent_doc_number] => 09967273
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-08
[patent_title] => Abusive traffic detection
[patent_app_type] => utility
[patent_app_number] => 14/739787
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 10394
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 362
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739787
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/739787 | Abusive traffic detection | Jun 14, 2015 | Issued |
Array
(
[id] => 11274584
[patent_doc_number] => 20160337131
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'BIOMETRIC PKI AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/739535
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6017
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739535
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/739535 | Biometric PKI authentication | Jun 14, 2015 | Issued |
Array
(
[id] => 11698346
[patent_doc_number] => 09688244
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-27
[patent_title] => 'Autonomous vehicle theft prevention'
[patent_app_type] => utility
[patent_app_number] => 14/739637
[patent_app_country] => US
[patent_app_date] => 2015-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 6441
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 75
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14739637
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/739637 | Autonomous vehicle theft prevention | Jun 14, 2015 | Issued |
Array
(
[id] => 11215772
[patent_doc_number] => 09444822
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-09-13
[patent_title] => 'Storage array access control from cloud-based user authorization and authentication'
[patent_app_type] => utility
[patent_app_number] => 14/726449
[patent_app_country] => US
[patent_app_date] => 2015-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7657
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14726449
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/726449 | Storage array access control from cloud-based user authorization and authentication | May 28, 2015 | Issued |