
James Leslie Grun
Examiner (ID: 7358)
| Most Active Art Unit | 1641 |
| Art Unit(s) | 1678, 1641, 1817, 1816, 1802, 1645 |
| Total Applications | 766 |
| Issued Applications | 264 |
| Pending Applications | 95 |
| Abandoned Applications | 408 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12762346
[patent_doc_number] => 20180145950
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-24
[patent_title] => CONNECTIVITY BETWEEN CLOUD-HOSTED SYSTEMS AND ON-PREMISES ENTERPRISE RESOURCES
[patent_app_type] => utility
[patent_app_number] => 15/358806
[patent_app_country] => US
[patent_app_date] => 2016-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7384
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15358806
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/358806 | Connectivity between cloud-hosted systems and on-premises enterprise resources | Nov 21, 2016 | Issued |
Array
(
[id] => 11494627
[patent_doc_number] => 20170068812
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-09
[patent_title] => 'Data Access Control Method and Apparatus, and Terminal'
[patent_app_type] => utility
[patent_app_number] => 15/355585
[patent_app_country] => US
[patent_app_date] => 2016-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7512
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15355585
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/355585 | Data Access Control Method and Apparatus, and Terminal | Nov 17, 2016 | Abandoned |
Array
(
[id] => 12762010
[patent_doc_number] => 20180145838
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-24
[patent_title] => MESSAGE-BASED KEY GENERATION USING PHYSICAL UNCLONABLE FUNCTION (PUF)
[patent_app_type] => utility
[patent_app_number] => 15/356112
[patent_app_country] => US
[patent_app_date] => 2016-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15835
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 45
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15356112
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/356112 | Message-based key generation using physical unclonable function (PUF) | Nov 17, 2016 | Issued |
Array
(
[id] => 12763603
[patent_doc_number] => 20180146369
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-24
[patent_title] => SECURE ACCESS AUTHORIZATION METHOD
[patent_app_type] => utility
[patent_app_number] => 15/355520
[patent_app_country] => US
[patent_app_date] => 2016-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4801
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15355520
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/355520 | Secure access authorization method | Nov 17, 2016 | Issued |
Array
(
[id] => 14674327
[patent_doc_number] => 10375095
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-08-06
[patent_title] => Modeling behavior in a network using event logs
[patent_app_type] => utility
[patent_app_number] => 15/355142
[patent_app_country] => US
[patent_app_date] => 2016-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 14
[patent_no_of_words] => 9235
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15355142
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/355142 | Modeling behavior in a network using event logs | Nov 17, 2016 | Issued |
Array
(
[id] => 11477066
[patent_doc_number] => 20170063849
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'STAMPER, TERMINAL, AND METHOD FOR OPERATING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 15/352286
[patent_app_country] => US
[patent_app_date] => 2016-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6370
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15352286
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/352286 | Stamper, terminal, and method for operating the same | Nov 14, 2016 | Issued |
Array
(
[id] => 14645785
[patent_doc_number] => 10367647
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-30
[patent_title] => Certificate acquiring method and device
[patent_app_type] => utility
[patent_app_number] => 15/345829
[patent_app_country] => US
[patent_app_date] => 2016-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 11
[patent_no_of_words] => 18212
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15345829
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/345829 | Certificate acquiring method and device | Nov 7, 2016 | Issued |
Array
(
[id] => 11724492
[patent_doc_number] => 09697348
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-07-04
[patent_title] => 'Location specific image based authentication'
[patent_app_type] => utility
[patent_app_number] => 15/332474
[patent_app_country] => US
[patent_app_date] => 2016-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 12
[patent_no_of_words] => 7418
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15332474
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/332474 | Location specific image based authentication | Oct 23, 2016 | Issued |
Array
(
[id] => 11438372
[patent_doc_number] => 20170039393
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'NDM File Protection Method and Apparatus'
[patent_app_type] => utility
[patent_app_number] => 15/332421
[patent_app_country] => US
[patent_app_date] => 2016-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5406
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15332421
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/332421 | NDM file protection method and apparatus | Oct 23, 2016 | Issued |
Array
(
[id] => 11666941
[patent_doc_number] => 20170155661
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-01
[patent_title] => 'Systems and Methods for Controlling Access to a Computer Device using Traps'
[patent_app_type] => utility
[patent_app_number] => 15/286754
[patent_app_country] => US
[patent_app_date] => 2016-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10399
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15286754
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/286754 | Systems and Methods for Controlling Access to a Computer Device using Traps | Oct 5, 2016 | Abandoned |
Array
(
[id] => 11474338
[patent_doc_number] => 20170061121
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'LOW OVERHEAD RANDOM PRE-CHARGE COUNTERMEASURE FOR SIDE-CHANNEL ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 15/245507
[patent_app_country] => US
[patent_app_date] => 2016-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6353
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15245507
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/245507 | Low overhead random pre-charge countermeasure for side-channel attacks | Aug 23, 2016 | Issued |
Array
(
[id] => 11391248
[patent_doc_number] => 09552494
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-01-24
[patent_title] => 'Protected indexing and querying of large sets of textual data'
[patent_app_type] => utility
[patent_app_number] => 15/233117
[patent_app_country] => US
[patent_app_date] => 2016-08-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 5534
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15233117
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/233117 | Protected indexing and querying of large sets of textual data | Aug 9, 2016 | Issued |
Array
(
[id] => 15017701
[patent_doc_number] => 10455025
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Multi-factor authentication
[patent_app_type] => utility
[patent_app_number] => 15/226499
[patent_app_country] => US
[patent_app_date] => 2016-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6908
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15226499
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/226499 | Multi-factor authentication | Aug 1, 2016 | Issued |
Array
(
[id] => 11294787
[patent_doc_number] => 20160344719
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-24
[patent_title] => 'INTER-APPLICATION MANAGEMENT OF USER CREDENTIAL DATA'
[patent_app_type] => utility
[patent_app_number] => 15/225751
[patent_app_country] => US
[patent_app_date] => 2016-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7974
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15225751
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/225751 | Inter-application management of user credential data | Jul 31, 2016 | Issued |
Array
(
[id] => 11398845
[patent_doc_number] => 20170019383
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-19
[patent_title] => 'SYSTEM AND METHOD FOR WIRELESS DATA PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 15/217674
[patent_app_country] => US
[patent_app_date] => 2016-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 7709
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15217674
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/217674 | System and method for wireless data protection | Jul 21, 2016 | Issued |
Array
(
[id] => 11440303
[patent_doc_number] => 20170041323
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'Registration and Credential Roll-out for Accessing a Subscription-based Service'
[patent_app_type] => utility
[patent_app_number] => 15/206816
[patent_app_country] => US
[patent_app_date] => 2016-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 29808
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15206816
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/206816 | Registration and Credential Roll-out for Accessing a Subscription-based Service | Jul 10, 2016 | Abandoned |
Array
(
[id] => 11368079
[patent_doc_number] => 20170006061
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'THREAT INTELLIGENCE SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/202259
[patent_app_country] => US
[patent_app_date] => 2016-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5058
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15202259
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/202259 | Threat intelligence system and method | Jul 4, 2016 | Issued |
Array
(
[id] => 13021221
[patent_doc_number] => 10033740
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-24
[patent_title] => Inter-application management of user credential data
[patent_app_type] => utility
[patent_app_number] => 15/197728
[patent_app_country] => US
[patent_app_date] => 2016-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7777
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15197728
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/197728 | Inter-application management of user credential data | Jun 28, 2016 | Issued |
Array
(
[id] => 12938887
[patent_doc_number] => 09832225
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-28
[patent_title] => Identity theft countermeasures
[patent_app_type] => utility
[patent_app_number] => 15/191195
[patent_app_country] => US
[patent_app_date] => 2016-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 11395
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15191195
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/191195 | Identity theft countermeasures | Jun 22, 2016 | Issued |
Array
(
[id] => 11097898
[patent_doc_number] => 20160294868
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'DYNAMIC SECURE PACKET BLOCK SIZING'
[patent_app_type] => utility
[patent_app_number] => 15/180283
[patent_app_country] => US
[patent_app_date] => 2016-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4866
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15180283
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/180283 | Dynamic secure packet block sizing | Jun 12, 2016 | Issued |