
Josnel Jeudy
Examiner (ID: 12977, Phone: (571)270-7476 , Office: P/2438 )
| Most Active Art Unit | 2438 |
| Art Unit(s) | 2438 |
| Total Applications | 880 |
| Issued Applications | 708 |
| Pending Applications | 56 |
| Abandoned Applications | 137 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13611715
[patent_doc_number] => 20180357407
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-13
[patent_title] => AUTHENTICATION SYSTEM WITH MOTION PARAMETERS
[patent_app_type] => utility
[patent_app_number] => 15/780383
[patent_app_country] => US
[patent_app_date] => 2016-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3828
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15780383
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/780383 | AUTHENTICATION SYSTEM WITH MOTION PARAMETERS | Nov 28, 2016 | Abandoned |
Array
(
[id] => 12358122
[patent_doc_number] => 09954895
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-24
[patent_title] => System and method for identifying phishing website
[patent_app_type] => utility
[patent_app_number] => 15/359131
[patent_app_country] => US
[patent_app_date] => 2016-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 4526
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 291
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15359131
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/359131 | System and method for identifying phishing website | Nov 21, 2016 | Issued |
Array
(
[id] => 14957467
[patent_doc_number] => 10440021
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-08
[patent_title] => Authentication method, authentication system, and controller
[patent_app_type] => utility
[patent_app_number] => 15/358283
[patent_app_country] => US
[patent_app_date] => 2016-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 40
[patent_no_of_words] => 16967
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15358283
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/358283 | Authentication method, authentication system, and controller | Nov 21, 2016 | Issued |
Array
(
[id] => 13560559
[patent_doc_number] => 20180331827
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-15
[patent_title] => A UNIQUE IDENTIFIER MODULE, A SYSTEM FOR PROVIDING WITH A UNIQUE IDENTIFICATION, A RELATED MODULE AND RELATED METHOD
[patent_app_type] => utility
[patent_app_number] => 15/774758
[patent_app_country] => US
[patent_app_date] => 2016-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4103
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15774758
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/774758 | Unique identifier module, a system for providing with a unique identification, a related module and related method | Nov 6, 2016 | Issued |
Array
(
[id] => 11460842
[patent_doc_number] => 20170054748
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-23
[patent_title] => 'LATENCY-BASED DETECTION OF COVERT ROUTING'
[patent_app_type] => utility
[patent_app_number] => 15/344396
[patent_app_country] => US
[patent_app_date] => 2016-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 12755
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15344396
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/344396 | Latency-based detection of covert routing | Nov 3, 2016 | Issued |
Array
(
[id] => 13560545
[patent_doc_number] => 20180331820
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-15
[patent_title] => CRYPTOGRAPHIC DEVICE ARRANGED TO COMPUTE A TARGET BLOCK CIPHER
[patent_app_type] => utility
[patent_app_number] => 15/774859
[patent_app_country] => US
[patent_app_date] => 2016-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9748
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15774859
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/774859 | Cryptographic device arranged to compute a target block cipher | Oct 19, 2016 | Issued |
Array
(
[id] => 13512599
[patent_doc_number] => 20180307842
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-25
[patent_title] => INFORMATION PROCESSING APPARATUS, SECURITY MANAGEMENT SYSTEM, SECURITY MEASURE PROVIDING METHOD, SECURITY INFORMATION DISTRIBUTION METHOD, AND PROGRAM
[patent_app_type] => utility
[patent_app_number] => 15/769248
[patent_app_country] => US
[patent_app_date] => 2016-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9498
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15769248
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/769248 | Information processing apparatus, security management system, security measure providing method, security information distribution method, and program | Oct 11, 2016 | Issued |
Array
(
[id] => 13497909
[patent_doc_number] => 20180300497
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-18
[patent_title] => METHOD FOR CONFIDENTIALLY QUERYING AN ENCRYPTED DATABASE
[patent_app_type] => utility
[patent_app_number] => 15/767885
[patent_app_country] => US
[patent_app_date] => 2016-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4905
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15767885
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/767885 | Method for confidentially querying an encrypted database | Oct 11, 2016 | Issued |
Array
(
[id] => 13501777
[patent_doc_number] => 20180302431
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-18
[patent_title] => METHOD AND DEVICE FOR AVERTING A MANIPULATION ON A CAN BUS USING A NODE CONNECTED TO THE BUS BY A CAN CONTROLLER
[patent_app_type] => utility
[patent_app_number] => 15/767935
[patent_app_country] => US
[patent_app_date] => 2016-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1598
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15767935
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/767935 | Method and device for averting a manipulation on a CAN bus using a node connected to the bus by a CAN controller | Oct 9, 2016 | Issued |
Array
(
[id] => 11926701
[patent_doc_number] => 09794297
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-10-17
[patent_title] => 'Security compliance framework usage'
[patent_app_type] => utility
[patent_app_number] => 15/284005
[patent_app_country] => US
[patent_app_date] => 2016-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9175
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15284005
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/284005 | Security compliance framework usage | Oct 2, 2016 | Issued |
Array
(
[id] => 17138964
[patent_doc_number] => 11140549
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-05
[patent_title] => Information processing apparatus and information processing method
[patent_app_type] => utility
[patent_app_number] => 15/781784
[patent_app_country] => US
[patent_app_date] => 2016-10-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 19286
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15781784
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/781784 | Information processing apparatus and information processing method | Oct 2, 2016 | Issued |
Array
(
[id] => 12967441
[patent_doc_number] => 09875376
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-01-23
[patent_title] => Sensitive data aliasing
[patent_app_type] => utility
[patent_app_number] => 15/271970
[patent_app_country] => US
[patent_app_date] => 2016-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6618
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15271970
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/271970 | Sensitive data aliasing | Sep 20, 2016 | Issued |
Array
(
[id] => 14689723
[patent_doc_number] => 20190243977
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-08
[patent_title] => SYSTEM AND METHOD FOR THREAT IMPACT CHARACTERIZATION
[patent_app_type] => utility
[patent_app_number] => 16/320242
[patent_app_country] => US
[patent_app_date] => 2016-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10809
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16320242
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/320242 | System and method for threat impact characterization | Aug 23, 2016 | Issued |
Array
(
[id] => 13403997
[patent_doc_number] => 20180253541
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-06
[patent_title] => TRANSACTION SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/754897
[patent_app_country] => US
[patent_app_date] => 2016-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7544
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15754897
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/754897 | Transaction system | Aug 21, 2016 | Issued |
Array
(
[id] => 16235030
[patent_doc_number] => 10742603
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-11
[patent_title] => System and method for monitoring and protecting an untrusted operating system by means of a trusted operating system
[patent_app_type] => utility
[patent_app_number] => 15/755073
[patent_app_country] => US
[patent_app_date] => 2016-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4008
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15755073
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/755073 | System and method for monitoring and protecting an untrusted operating system by means of a trusted operating system | Aug 16, 2016 | Issued |
Array
(
[id] => 11386947
[patent_doc_number] => 20170013002
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-12
[patent_title] => 'THREAT ASSESSMENT LEVEL DETERMINATION AND REMEDIATION FOR A CLOUD-BASED MULTI-LAYER SECURITY ARCHITECTURE'
[patent_app_type] => utility
[patent_app_number] => 15/237189
[patent_app_country] => US
[patent_app_date] => 2016-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 16595
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15237189
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/237189 | Threat assessment level determination and remediation for a cloud-based multi-layer security architecture | Aug 14, 2016 | Issued |
Array
(
[id] => 13952691
[patent_doc_number] => 10212135
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-02-19
[patent_title] => Locked down network interface
[patent_app_type] => utility
[patent_app_number] => 15/231564
[patent_app_country] => US
[patent_app_date] => 2016-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 13550
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15231564
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/231564 | Locked down network interface | Aug 7, 2016 | Issued |
Array
(
[id] => 11544264
[patent_doc_number] => 20170098089
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-06
[patent_title] => 'METHOD OF PROTECTING SECRET DATA WHEN USED IN A CRYPTOGRAPHIC ALGORITHM'
[patent_app_type] => utility
[patent_app_number] => 15/212819
[patent_app_country] => US
[patent_app_date] => 2016-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 13470
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15212819
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/212819 | Method of protecting secret data when used in a cryptographic algorithm | Jul 17, 2016 | Issued |
Array
(
[id] => 11682400
[patent_doc_number] => 09680950
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-06-13
[patent_title] => 'Method and apparatus for causing delay in processing requests for internet resources received from client devices'
[patent_app_type] => utility
[patent_app_number] => 15/211790
[patent_app_country] => US
[patent_app_date] => 2016-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10711
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 301
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15211790
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/211790 | Method and apparatus for causing delay in processing requests for internet resources received from client devices | Jul 14, 2016 | Issued |
Array
(
[id] => 11126312
[patent_doc_number] => 20160323287
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-03
[patent_title] => 'METHOD FOR DETECTING AND DEALING WITH UNAUTHORIZED FRAMES IN VEHICLE NETWORK SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/209882
[patent_app_country] => US
[patent_app_date] => 2016-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13386
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15209882
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/209882 | Method for detecting and dealing with unauthorized frames in vehicle network system | Jul 13, 2016 | Issued |