
James Leslie Grun
Examiner (ID: 7358)
| Most Active Art Unit | 1641 |
| Art Unit(s) | 1678, 1641, 1817, 1816, 1802, 1645 |
| Total Applications | 766 |
| Issued Applications | 264 |
| Pending Applications | 95 |
| Abandoned Applications | 408 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11180214
[patent_doc_number] => 09412209
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-09
[patent_title] => 'Prevention device for operating vehicle running record'
[patent_app_type] => utility
[patent_app_number] => 14/471340
[patent_app_country] => US
[patent_app_date] => 2014-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4901
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14471340
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/471340 | Prevention device for operating vehicle running record | Aug 27, 2014 | Issued |
Array
(
[id] => 10145875
[patent_doc_number] => 09178697
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-03
[patent_title] => 'Security for remote access VPN'
[patent_app_type] => utility
[patent_app_number] => 14/458088
[patent_app_country] => US
[patent_app_date] => 2014-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7371
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14458088
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/458088 | Security for remote access VPN | Aug 11, 2014 | Issued |
Array
(
[id] => 11877530
[patent_doc_number] => 09749318
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-29
[patent_title] => 'Key management in a communication network'
[patent_app_type] => utility
[patent_app_number] => 14/454936
[patent_app_country] => US
[patent_app_date] => 2014-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 10
[patent_no_of_words] => 6610
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14454936
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/454936 | Key management in a communication network | Aug 7, 2014 | Issued |
Array
(
[id] => 10941881
[patent_doc_number] => 20140344902
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-20
[patent_title] => 'MANAGED VIRTUAL POINT TO POINT COMMUNICATION SERVICE HAVING VERIFIED DIRECTORY, SECURE TRANSMISSION AND CONTROLLED DELIVERY'
[patent_app_type] => utility
[patent_app_number] => 14/450717
[patent_app_country] => US
[patent_app_date] => 2014-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 13932
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14450717
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/450717 | Managed virtual point to point communication service having verified directory, secure transmission and controlled delivery | Aug 3, 2014 | Issued |
Array
(
[id] => 9860223
[patent_doc_number] => 20150040239
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-05
[patent_title] => 'SYSTEMS AND METHODS FOR MANAGING LOST DEVICES OF MULTIPLE TYPES WITH MULTIPLE POLICIES USING MELDED PROFILES ASSOCIATED WITH GROUPS'
[patent_app_type] => utility
[patent_app_number] => 14/448359
[patent_app_country] => US
[patent_app_date] => 2014-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 45
[patent_figures_cnt] => 45
[patent_no_of_words] => 22818
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14448359
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/448359 | Systems and methods for managing lost devices of multiple types with multiple policies using melded profiles associated with groups | Jul 30, 2014 | Issued |
Array
(
[id] => 11247426
[patent_doc_number] => 09473481
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-18
[patent_title] => 'Method and system for providing a virtual asset perimeter'
[patent_app_type] => utility
[patent_app_number] => 14/448281
[patent_app_country] => US
[patent_app_date] => 2014-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9827
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 436
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14448281
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/448281 | Method and system for providing a virtual asset perimeter | Jul 30, 2014 | Issued |
Array
(
[id] => 10195049
[patent_doc_number] => 09223960
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-12-29
[patent_title] => 'State-machine clock tampering detection'
[patent_app_type] => utility
[patent_app_number] => 14/447644
[patent_app_country] => US
[patent_app_date] => 2014-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3559
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14447644
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/447644 | State-machine clock tampering detection | Jul 30, 2014 | Issued |
Array
(
[id] => 11228111
[patent_doc_number] => 09455839
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-27
[patent_title] => 'Wireless key management for authentication'
[patent_app_type] => utility
[patent_app_number] => 14/447514
[patent_app_country] => US
[patent_app_date] => 2014-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13928
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14447514
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/447514 | Wireless key management for authentication | Jul 29, 2014 | Issued |
Array
(
[id] => 13241349
[patent_doc_number] => 10133878
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-20
[patent_title] => Stochastic privacy
[patent_app_type] => utility
[patent_app_number] => 14/447563
[patent_app_country] => US
[patent_app_date] => 2014-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 7760
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 31
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14447563
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/447563 | Stochastic privacy | Jul 29, 2014 | Issued |
Array
(
[id] => 10688551
[patent_doc_number] => 20160034696
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'Data Permission Management for Wearable Devices'
[patent_app_type] => utility
[patent_app_number] => 14/447466
[patent_app_country] => US
[patent_app_date] => 2014-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 17814
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14447466
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/447466 | Data permission management for wearable devices | Jul 29, 2014 | Issued |
Array
(
[id] => 9903779
[patent_doc_number] => 20150058979
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-26
[patent_title] => 'PROCESSING SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/447402
[patent_app_country] => US
[patent_app_date] => 2014-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5321
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14447402
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/447402 | PROCESSING SYSTEM | Jul 29, 2014 | Abandoned |
Array
(
[id] => 10963053
[patent_doc_number] => 20140366083
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-11
[patent_title] => 'AUTHENTICATION POLICY USAGE FOR AUTHENTICATING A USER'
[patent_app_type] => utility
[patent_app_number] => 14/337631
[patent_app_country] => US
[patent_app_date] => 2014-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8212
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14337631
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/337631 | Authentication policy usage for authenticating a user | Jul 21, 2014 | Issued |
Array
(
[id] => 10108093
[patent_doc_number] => 09143888
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-22
[patent_title] => 'Method for the authentication of applications'
[patent_app_type] => utility
[patent_app_number] => 14/332946
[patent_app_country] => US
[patent_app_date] => 2014-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 10
[patent_no_of_words] => 5776
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 338
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14332946
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/332946 | Method for the authentication of applications | Jul 15, 2014 | Issued |
Array
(
[id] => 10922669
[patent_doc_number] => 20140325689
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-30
[patent_title] => 'SHUTDOWN VERIFICATION METHOD AND DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/328692
[patent_app_country] => US
[patent_app_date] => 2014-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 2829
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14328692
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/328692 | SHUTDOWN VERIFICATION METHOD AND DEVICE | Jul 9, 2014 | Abandoned |
Array
(
[id] => 14066817
[patent_doc_number] => 10237732
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-19
[patent_title] => Mobile device authentication in heterogeneous communication networks scenario
[patent_app_type] => utility
[patent_app_number] => 14/896551
[patent_app_country] => US
[patent_app_date] => 2014-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9992
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14896551
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/896551 | Mobile device authentication in heterogeneous communication networks scenario | Jun 10, 2014 | Issued |
Array
(
[id] => 10107733
[patent_doc_number] => 09143525
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-22
[patent_title] => 'Integrated network intrusion detection'
[patent_app_type] => utility
[patent_app_number] => 14/300420
[patent_app_country] => US
[patent_app_date] => 2014-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5301
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14300420
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/300420 | Integrated network intrusion detection | Jun 9, 2014 | Issued |
Array
(
[id] => 10464945
[patent_doc_number] => 20150349960
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'TWO FACTOR AUTHENTICATION USING A PROTECTED PIN-LIKE PASSCODE'
[patent_app_type] => utility
[patent_app_number] => 14/120439
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6431
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14120439
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/120439 | Two factor authentication using a protected pin-like passcode | May 29, 2014 | Issued |
Array
(
[id] => 9900576
[patent_doc_number] => 20150055776
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-26
[patent_title] => 'Method and System for High Throughput Blockwise Independent Encryption/Decryption'
[patent_app_type] => utility
[patent_app_number] => 14/279856
[patent_app_country] => US
[patent_app_date] => 2014-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 9774
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14279856
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/279856 | Method and system for high throughput blockwise independent encryption/decryption | May 15, 2014 | Issued |
Array
(
[id] => 10618679
[patent_doc_number] => 09338136
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-10
[patent_title] => 'Security key generation for simultaneous multiple cell connections for mobile device'
[patent_app_type] => utility
[patent_app_number] => 14/265987
[patent_app_country] => US
[patent_app_date] => 2014-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 5515
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14265987
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/265987 | Security key generation for simultaneous multiple cell connections for mobile device | Apr 29, 2014 | Issued |
Array
(
[id] => 10639258
[patent_doc_number] => 09356776
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-31
[patent_title] => 'Key managing system and method for sensor network security'
[patent_app_type] => utility
[patent_app_number] => 14/265985
[patent_app_country] => US
[patent_app_date] => 2014-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 7971
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14265985
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/265985 | Key managing system and method for sensor network security | Apr 29, 2014 | Issued |