Search

Jonathan R. Labud

Examiner (ID: 15195, Phone: (571)270-5174 , Office: P/2196 )

Most Active Art Unit
2196
Art Unit(s)
2192, 2196
Total Applications
511
Issued Applications
400
Pending Applications
43
Abandoned Applications
84

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9795312 [patent_doc_number] => 20150007256 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-01 [patent_title] => 'MONETIZING DOWNLOADABLE FILES BASED ON RESOLVING CUSTODIANSHIP THEREOF TO REFERRING PUBLISHER AND PRESENTATION OF MONETIZED CONTENT IN A MODAL OVERLAY CONTEMPORANEOUSLY WITH DOWNLOAD' [patent_app_type] => utility [patent_app_number] => 14/318109 [patent_app_country] => US [patent_app_date] => 2014-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 12855 [patent_no_of_claims] => 60 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14318109 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/318109
Monetizing downloadable files based on resolving custodianship thereof to referring publisher and presentation of monetized content in a modal overlay contemporaneously with download Jun 26, 2014 Issued
Array ( [id] => 11226954 [patent_doc_number] => 09454676 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-09-27 [patent_title] => 'Technologies for preventing hook-skipping attacks using processor virtualization features' [patent_app_type] => utility [patent_app_number] => 14/318215 [patent_app_country] => US [patent_app_date] => 2014-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 12024 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 197 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14318215 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/318215
Technologies for preventing hook-skipping attacks using processor virtualization features Jun 26, 2014 Issued
Array ( [id] => 10952742 [patent_doc_number] => 20140355763 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-04 [patent_title] => 'METHOD AND APPARATUS FOR GENERATION AND DISTRIBUTING A GROUP KEY IN WIRELESS DOCKING' [patent_app_type] => utility [patent_app_number] => 14/295932 [patent_app_country] => US [patent_app_date] => 2014-06-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6720 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14295932 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/295932
METHOD AND APPARATUS FOR GENERATION AND DISTRIBUTING A GROUP KEY IN WIRELESS DOCKING Jun 3, 2014 Abandoned
Array ( [id] => 10956771 [patent_doc_number] => 20140359793 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-04 [patent_title] => 'METHOD AND SYSTEM FOR ISOLATING SECURE COMMUNICATION EVENTS FROM A NON-SECURE APPLICATION' [patent_app_type] => utility [patent_app_number] => 14/291905 [patent_app_country] => US [patent_app_date] => 2014-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 6304 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291905 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/291905
Method and system for isolating secure communication events from a non-secure application May 29, 2014 Issued
Array ( [id] => 10644582 [patent_doc_number] => 09361454 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-06-07 [patent_title] => 'Methods for restricting resources used by an application based on a base profile and an application specific profile' [patent_app_type] => utility [patent_app_number] => 14/292712 [patent_app_country] => US [patent_app_date] => 2014-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5936 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 159 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292712 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/292712
Methods for restricting resources used by an application based on a base profile and an application specific profile May 29, 2014 Issued
Array ( [id] => 10465189 [patent_doc_number] => 20150350204 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-03 [patent_title] => 'CLOUD-BASED DEVICE AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 14/292214 [patent_app_country] => US [patent_app_date] => 2014-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4429 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292214 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/292214
CLOUD-BASED DEVICE AUTHENTICATION May 29, 2014 Abandoned
Array ( [id] => 10530596 [patent_doc_number] => 09256731 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-02-09 [patent_title] => 'System, information processing apparatus, secure module, and verification method' [patent_app_type] => utility [patent_app_number] => 14/292053 [patent_app_country] => US [patent_app_date] => 2014-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 16 [patent_no_of_words] => 11844 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 174 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292053 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/292053
System, information processing apparatus, secure module, and verification method May 29, 2014 Issued
Array ( [id] => 11285775 [patent_doc_number] => 09501630 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-11-22 [patent_title] => 'Method for generating a human likeness score' [patent_app_type] => utility [patent_app_number] => 14/292266 [patent_app_country] => US [patent_app_date] => 2014-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 31 [patent_no_of_words] => 10107 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 295 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292266 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/292266
Method for generating a human likeness score May 29, 2014 Issued
Array ( [id] => 10462735 [patent_doc_number] => 20150347750 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-03 [patent_title] => 'METHOD AND APPARATUS FOR A SCORING SERVICE FOR SECURITY THREAT MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 14/292700 [patent_app_country] => US [patent_app_date] => 2014-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 9110 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292700 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/292700
Method and apparatus for a scoring service for security threat management May 29, 2014 Issued
Array ( [id] => 10021606 [patent_doc_number] => 09064094 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-06-23 [patent_title] => 'Protected resource access control utilizing intermediate values of a hash chain' [patent_app_type] => utility [patent_app_number] => 14/289831 [patent_app_country] => US [patent_app_date] => 2014-05-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 6517 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 105 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14289831 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/289831
Protected resource access control utilizing intermediate values of a hash chain May 28, 2014 Issued
Array ( [id] => 10918630 [patent_doc_number] => 20140321649 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-10-30 [patent_title] => 'METHOD AND APPARATUS FOR DISTRIBUTING A QUANTUM KEY' [patent_app_type] => utility [patent_app_number] => 14/263436 [patent_app_country] => US [patent_app_date] => 2014-04-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4548 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14263436 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/263436
METHOD AND APPARATUS FOR DISTRIBUTING A QUANTUM KEY Apr 27, 2014 Abandoned
Array ( [id] => 12537369 [patent_doc_number] => 10009321 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-06-26 [patent_title] => Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end encryption communication [patent_app_type] => utility [patent_app_number] => 14/786526 [patent_app_country] => US [patent_app_date] => 2014-04-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6808 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14786526 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/786526
Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end encryption communication Apr 22, 2014 Issued
Array ( [id] => 10803746 [patent_doc_number] => 20160149903 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-05-26 [patent_title] => 'METHOD FOR SUPPORTING SUBSCRIBER\'S SERVICE PROVIDER CHANGE RESTRICTION POLICY IN MOBILE COMMUNICATIONS AND APPARATUS THEREFOR' [patent_app_type] => utility [patent_app_number] => 14/784906 [patent_app_country] => US [patent_app_date] => 2014-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 16908 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14784906 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/784906
Method for supporting subscriber's service provider change restriction policy in mobile communications and apparatus therefor Apr 14, 2014 Issued
Array ( [id] => 12089840 [patent_doc_number] => 09843582 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-12-12 [patent_title] => 'Identity verification systems and methods' [patent_app_type] => utility [patent_app_number] => 14/246991 [patent_app_country] => US [patent_app_date] => 2014-04-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 6351 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 214 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14246991 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/246991
Identity verification systems and methods Apr 6, 2014 Issued
Array ( [id] => 9998998 [patent_doc_number] => 09043615 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-05-26 [patent_title] => 'Method and apparatus for a trust processor' [patent_app_type] => utility [patent_app_number] => 14/196249 [patent_app_country] => US [patent_app_date] => 2014-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 10522 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 265 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14196249 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/196249
Method and apparatus for a trust processor Mar 3, 2014 Issued
Array ( [id] => 10873260 [patent_doc_number] => 08898481 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-11-25 [patent_title] => 'Auditable cryptographic protected cloud computing communications system' [patent_app_type] => utility [patent_app_number] => 14/197023 [patent_app_country] => US [patent_app_date] => 2014-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 11 [patent_no_of_words] => 6258 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 1018 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14197023 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/197023
Auditable cryptographic protected cloud computing communications system Mar 3, 2014 Issued
Array ( [id] => 10072723 [patent_doc_number] => 09111083 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-08-18 [patent_title] => 'Applications login using a mechanism relating sub-tokens to the quality of a master token' [patent_app_type] => utility [patent_app_number] => 14/178716 [patent_app_country] => US [patent_app_date] => 2014-02-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5464 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 226 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14178716 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/178716
Applications login using a mechanism relating sub-tokens to the quality of a master token Feb 11, 2014 Issued
Array ( [id] => 11117338 [patent_doc_number] => 20160314312 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-27 [patent_title] => 'METHOD FOR CAUSING OPERATING SYSTEM TO HAVE IMMUNE FUNCTION' [patent_app_type] => utility [patent_app_number] => 15/103525 [patent_app_country] => US [patent_app_date] => 2014-01-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 1240 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15103525 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/103525
METHOD FOR CAUSING OPERATING SYSTEM TO HAVE IMMUNE FUNCTION Jan 15, 2014 Abandoned
Array ( [id] => 11801666 [patent_doc_number] => 09542548 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-01-10 [patent_title] => 'Computer application security' [patent_app_type] => utility [patent_app_number] => 14/157250 [patent_app_country] => US [patent_app_date] => 2014-01-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 13 [patent_no_of_words] => 7132 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 182 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14157250 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/157250
Computer application security Jan 15, 2014 Issued
Array ( [id] => 9618256 [patent_doc_number] => 20140208114 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-24 [patent_title] => 'SYSTEM AND METHOD FOR MASSIVE CONTROLLED AND SECURED UPDATE OF DEVICES FIRMWARE' [patent_app_type] => utility [patent_app_number] => 14/157059 [patent_app_country] => US [patent_app_date] => 2014-01-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3437 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14157059 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/157059
System and method for massive controlled and secured update of devices firmware Jan 15, 2014 Issued
Menu