
James Leslie Grun
Examiner (ID: 7358)
| Most Active Art Unit | 1641 |
| Art Unit(s) | 1678, 1641, 1817, 1816, 1802, 1645 |
| Total Applications | 766 |
| Issued Applications | 264 |
| Pending Applications | 95 |
| Abandoned Applications | 408 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13282021
[patent_doc_number] => 10152598
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-11
[patent_title] => Process categorization using crowdsourcing
[patent_app_type] => utility
[patent_app_number] => 15/628930
[patent_app_country] => US
[patent_app_date] => 2017-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7419
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 439
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15628930
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/628930 | Process categorization using crowdsourcing | Jun 20, 2017 | Issued |
Array
(
[id] => 11910451
[patent_doc_number] => 09779265
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-10-03
[patent_title] => 'Encryption key effective date'
[patent_app_type] => utility
[patent_app_number] => 15/625539
[patent_app_country] => US
[patent_app_date] => 2017-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7596
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15625539
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/625539 | Encryption key effective date | Jun 15, 2017 | Issued |
Array
(
[id] => 15521101
[patent_doc_number] => 10567159
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-18
[patent_title] => CMAC computation using white-box implementations with external encodings
[patent_app_type] => utility
[patent_app_number] => 15/616648
[patent_app_country] => US
[patent_app_date] => 2017-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 8454
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15616648
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/616648 | CMAC computation using white-box implementations with external encodings | Jun 6, 2017 | Issued |
Array
(
[id] => 15183021
[patent_doc_number] => 20190362102
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-28
[patent_title] => TECHNIQUES FOR MASKING ELECTRONIC DATA
[patent_app_type] => utility
[patent_app_number] => 15/612038
[patent_app_country] => US
[patent_app_date] => 2017-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3514
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15612038
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/612038 | Techniques for masking electronic data | Jun 1, 2017 | Issued |
Array
(
[id] => 12804076
[patent_doc_number] => 20180159862
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-07
[patent_title] => CBR-Based Negotiation RBAC Method for Enhancing Ubiquitous Resources Management
[patent_app_type] => utility
[patent_app_number] => 15/612203
[patent_app_country] => US
[patent_app_date] => 2017-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2146
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15612203
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/612203 | CBR-based negotiation RBAC method for enhancing ubiquitous resources management | Jun 1, 2017 | Issued |
Array
(
[id] => 15402747
[patent_doc_number] => 10542041
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-21
[patent_title] => Cacheless session ticket support in TLS inspection
[patent_app_type] => utility
[patent_app_number] => 15/611229
[patent_app_country] => US
[patent_app_date] => 2017-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8454
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15611229
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/611229 | Cacheless session ticket support in TLS inspection | May 31, 2017 | Issued |
Array
(
[id] => 13600897
[patent_doc_number] => 20180351997
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-06
[patent_title] => Transparently converting a TLS session connection to facilitate session resumption
[patent_app_type] => utility
[patent_app_number] => 15/611202
[patent_app_country] => US
[patent_app_date] => 2017-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9810
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15611202
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/611202 | Transparently converting a TLS session connection to facilitate session resumption | May 31, 2017 | Issued |
Array
(
[id] => 16187866
[patent_doc_number] => 10721213
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-07-21
[patent_title] => IP source obfuscation
[patent_app_type] => utility
[patent_app_number] => 15/611127
[patent_app_country] => US
[patent_app_date] => 2017-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2991
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15611127
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/611127 | IP source obfuscation | May 31, 2017 | Issued |
Array
(
[id] => 14461633
[patent_doc_number] => 10326796
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-06-18
[patent_title] => Dynamic security mechanisms for mixed networks
[patent_app_type] => utility
[patent_app_number] => 15/611731
[patent_app_country] => US
[patent_app_date] => 2017-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 32
[patent_figures_cnt] => 32
[patent_no_of_words] => 40236
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15611731
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/611731 | Dynamic security mechanisms for mixed networks | May 31, 2017 | Issued |
Array
(
[id] => 14528097
[patent_doc_number] => 10341322
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-07-02
[patent_title] => On demand multifactor authentication
[patent_app_type] => utility
[patent_app_number] => 15/610455
[patent_app_country] => US
[patent_app_date] => 2017-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 9519
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 326
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15610455
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/610455 | On demand multifactor authentication | May 30, 2017 | Issued |
Array
(
[id] => 14528099
[patent_doc_number] => 10341323
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-07-02
[patent_title] => Automated method for on demand multifactor authentication
[patent_app_type] => utility
[patent_app_number] => 15/610460
[patent_app_country] => US
[patent_app_date] => 2017-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 9519
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 321
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15610460
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/610460 | Automated method for on demand multifactor authentication | May 30, 2017 | Issued |
Array
(
[id] => 16890053
[patent_doc_number] => 20210176251
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-10
[patent_title] => Access Control Method and Industrial Network Using a Blockchain for Access Control
[patent_app_type] => utility
[patent_app_number] => 16/616845
[patent_app_country] => US
[patent_app_date] => 2017-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11160
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16616845
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/616845 | Access Control Method and Industrial Network Using a Blockchain for Access Control | May 29, 2017 | Abandoned |
Array
(
[id] => 15686031
[patent_doc_number] => 20200097679
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-26
[patent_title] => SYSTEM AND METHOD OF EFFICIENT AND SECURE DATA FILTERING OF NON-PERMITTED DATA
[patent_app_type] => utility
[patent_app_number] => 16/303524
[patent_app_country] => US
[patent_app_date] => 2017-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 21625
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16303524
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/303524 | System and method of efficient and secure data filtering of non-permitted data | May 24, 2017 | Issued |
Array
(
[id] => 13230927
[patent_doc_number] => 10129255
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-11-13
[patent_title] => Device authentication with MAC address and time period
[patent_app_type] => utility
[patent_app_number] => 15/593473
[patent_app_country] => US
[patent_app_date] => 2017-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7872
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15593473
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/593473 | Device authentication with MAC address and time period | May 11, 2017 | Issued |
Array
(
[id] => 11938860
[patent_doc_number] => 20170243010
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-24
[patent_title] => 'PROCESS RISK CLASSIFICATION'
[patent_app_type] => utility
[patent_app_number] => 15/589517
[patent_app_country] => US
[patent_app_date] => 2017-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8296
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15589517
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/589517 | Process risk classification | May 7, 2017 | Issued |
Array
(
[id] => 14207231
[patent_doc_number] => 10270750
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-23
[patent_title] => Managing access to software based on a state of an account
[patent_app_type] => utility
[patent_app_number] => 15/583228
[patent_app_country] => US
[patent_app_date] => 2017-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 15994
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15583228
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/583228 | Managing access to software based on a state of an account | Apr 30, 2017 | Issued |
Array
(
[id] => 11984999
[patent_doc_number] => 20170289154
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-05
[patent_title] => 'Generating and Using Ephemeral Identifiers and Message Integrity Codes'
[patent_app_type] => utility
[patent_app_number] => 15/488589
[patent_app_country] => US
[patent_app_date] => 2017-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 14413
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15488589
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/488589 | Generating and using ephemeral identifiers and message integrity codes | Apr 16, 2017 | Issued |
Array
(
[id] => 15793491
[patent_doc_number] => 10630482
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-21
[patent_title] => Systems and methods for downloading code and data into a secure non-volatile memory
[patent_app_type] => utility
[patent_app_number] => 15/487092
[patent_app_country] => US
[patent_app_date] => 2017-04-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5930
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15487092
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/487092 | Systems and methods for downloading code and data into a secure non-volatile memory | Apr 12, 2017 | Issued |
Array
(
[id] => 12020655
[patent_doc_number] => 09813377
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-07
[patent_title] => 'Dynamic provisioning of protection software in a host intrusion prevention system'
[patent_app_type] => utility
[patent_app_number] => 15/483407
[patent_app_country] => US
[patent_app_date] => 2017-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 32
[patent_figures_cnt] => 32
[patent_no_of_words] => 18428
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15483407
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/483407 | Dynamic provisioning of protection software in a host intrusion prevention system | Apr 9, 2017 | Issued |
Array
(
[id] => 11905118
[patent_doc_number] => 09774569
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-26
[patent_title] => 'Detection of undesired computer files using digital certificates'
[patent_app_type] => utility
[patent_app_number] => 15/456505
[patent_app_country] => US
[patent_app_date] => 2017-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8493
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15456505
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/456505 | Detection of undesired computer files using digital certificates | Mar 10, 2017 | Issued |