
Josnel Jeudy
Examiner (ID: 12977, Phone: (571)270-7476 , Office: P/2438 )
| Most Active Art Unit | 2438 |
| Art Unit(s) | 2438 |
| Total Applications | 880 |
| Issued Applications | 708 |
| Pending Applications | 56 |
| Abandoned Applications | 137 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14614515
[patent_doc_number] => 10359957
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-23
[patent_title] => Integrated circuit device that includes a secure element and a wireless component for transmitting protected data over short range wireless point-to-point communications
[patent_app_type] => utility
[patent_app_number] => 15/042051
[patent_app_country] => US
[patent_app_date] => 2016-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 3275
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 298
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15042051
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/042051 | Integrated circuit device that includes a secure element and a wireless component for transmitting protected data over short range wireless point-to-point communications | Feb 10, 2016 | Issued |
Array
(
[id] => 13175893
[patent_doc_number] => 10104076
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-16
[patent_title] => Authentication method and authentication system
[patent_app_type] => utility
[patent_app_number] => 15/012913
[patent_app_country] => US
[patent_app_date] => 2016-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 32
[patent_no_of_words] => 23485
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15012913
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/012913 | Authentication method and authentication system | Feb 1, 2016 | Issued |
Array
(
[id] => 10803733
[patent_doc_number] => 20160149890
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'AUTHENTICATION METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/012915
[patent_app_country] => US
[patent_app_date] => 2016-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 19633
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15012915
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/012915 | Authentication method | Feb 1, 2016 | Issued |
Array
(
[id] => 10803770
[patent_doc_number] => 20160149927
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'SYSTEM AND METHODS FOR PROTECTING USERS FROM MALICIOUS CONTENT'
[patent_app_type] => utility
[patent_app_number] => 15/012309
[patent_app_country] => US
[patent_app_date] => 2016-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7945
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15012309
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/012309 | System and methods for protecting users from malicious content | Jan 31, 2016 | Issued |
Array
(
[id] => 14642957
[patent_doc_number] => 10366223
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-30
[patent_title] => Methods and apparatus for restricting batch requests for service
[patent_app_type] => utility
[patent_app_number] => 15/563034
[patent_app_country] => US
[patent_app_date] => 2016-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 2
[patent_no_of_words] => 3277
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15563034
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/563034 | Methods and apparatus for restricting batch requests for service | Jan 26, 2016 | Issued |
Array
(
[id] => 10788475
[patent_doc_number] => 20160134630
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-12
[patent_title] => 'OPEN CONNECTION MANAGER VIRTUALIZATION AT SYSTEM-ON-CHIP'
[patent_app_type] => utility
[patent_app_number] => 14/996082
[patent_app_country] => US
[patent_app_date] => 2016-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 24813
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14996082
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/996082 | Open connection manager virtualization at system-on-chip | Jan 13, 2016 | Issued |
Array
(
[id] => 11797752
[patent_doc_number] => 09407633
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-02
[patent_title] => 'System and method for cross-channel authentication'
[patent_app_type] => utility
[patent_app_number] => 14/987845
[patent_app_country] => US
[patent_app_date] => 2016-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7836
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14987845
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/987845 | System and method for cross-channel authentication | Jan 4, 2016 | Issued |
Array
(
[id] => 11509490
[patent_doc_number] => 09600651
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-03-21
[patent_title] => 'System and method for determining use of non-human users in a distributed computer network environment'
[patent_app_type] => utility
[patent_app_number] => 14/988559
[patent_app_country] => US
[patent_app_date] => 2016-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 29558
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14988559
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/988559 | System and method for determining use of non-human users in a distributed computer network environment | Jan 4, 2016 | Issued |
Array
(
[id] => 13742365
[patent_doc_number] => 20180375652
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-27
[patent_title] => METHOD FOR RE-KEYING AN ENCRPYTED DATA FILE
[patent_app_type] => utility
[patent_app_number] => 15/781706
[patent_app_country] => US
[patent_app_date] => 2015-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4611
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15781706
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/781706 | Method for re-keying an encrypted data file | Dec 7, 2015 | Issued |
Array
(
[id] => 11600859
[patent_doc_number] => 09648045
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-09
[patent_title] => 'Systems and methods involving aspects of hardware virtualization such as hypervisor, detection and interception of code or instruction execution including API calls, and/or other features'
[patent_app_type] => utility
[patent_app_number] => 14/955018
[patent_app_country] => US
[patent_app_date] => 2015-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 13588
[patent_no_of_claims] => 54
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14955018
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/955018 | Systems and methods involving aspects of hardware virtualization such as hypervisor, detection and interception of code or instruction execution including API calls, and/or other features | Nov 29, 2015 | Issued |
Array
(
[id] => 12695857
[patent_doc_number] => 20180123785
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-03
[patent_title] => DISTRIBUTION AND VERIFICATION OF TRANSACTION INTEGRITY KEYS
[patent_app_type] => utility
[patent_app_number] => 15/573565
[patent_app_country] => US
[patent_app_date] => 2015-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5108
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15573565
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/573565 | Distribution and verification of transaction integrity keys | Nov 26, 2015 | Issued |
Array
(
[id] => 10740249
[patent_doc_number] => 20160086401
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'METHOD FOR PREVENTING RELAY-ATTACK ON SMART KEY SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/949452
[patent_app_country] => US
[patent_app_date] => 2015-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7695
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14949452
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/949452 | Method for preventing relay-attack on smart key system | Nov 22, 2015 | Issued |
Array
(
[id] => 13820831
[patent_doc_number] => 10187204
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-22
[patent_title] => Generating a key for use as a shared secret
[patent_app_type] => utility
[patent_app_number] => 14/900627
[patent_app_country] => US
[patent_app_date] => 2015-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 8
[patent_no_of_words] => 9001
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14900627
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/900627 | Generating a key for use as a shared secret | Nov 16, 2015 | Issued |
Array
(
[id] => 11412734
[patent_doc_number] => 09560059
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-01-31
[patent_title] => 'System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection'
[patent_app_type] => utility
[patent_app_number] => 14/942327
[patent_app_country] => US
[patent_app_date] => 2015-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 13
[patent_no_of_words] => 8338
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 240
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14942327
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/942327 | System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection | Nov 15, 2015 | Issued |
Array
(
[id] => 10727028
[patent_doc_number] => 20160073177
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'METHOD FOR BUILDING AND TRANSMITTING A WATERMARKED CONTENT, AND METHOD FOR DETECTING A WATERMARK OF SAID CONTENT'
[patent_app_type] => utility
[patent_app_number] => 14/942727
[patent_app_country] => US
[patent_app_date] => 2015-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5617
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14942727
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/942727 | Method for building and transmitting a watermarked content, and method for detecting a watermark of said content | Nov 15, 2015 | Issued |
Array
(
[id] => 10803798
[patent_doc_number] => 20160149955
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'COMMUNICATIONS SECURITY SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 14/927937
[patent_app_country] => US
[patent_app_date] => 2015-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6339
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14927937
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/927937 | COMMUNICATIONS SECURITY SYSTEMS | Oct 29, 2015 | Abandoned |
Array
(
[id] => 16174241
[patent_doc_number] => 10715834
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-14
[patent_title] => Film grain simulation based on pre-computed transform coefficients
[patent_app_type] => utility
[patent_app_number] => 14/870484
[patent_app_country] => US
[patent_app_date] => 2015-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 2910
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14870484
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/870484 | Film grain simulation based on pre-computed transform coefficients | Sep 29, 2015 | Issued |
Array
(
[id] => 10598286
[patent_doc_number] => 09319387
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-19
[patent_title] => 'Secure spin torque transfer magnetic random access memory (STTMRAM)'
[patent_app_type] => utility
[patent_app_number] => 14/867881
[patent_app_country] => US
[patent_app_date] => 2015-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 3884
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14867881
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/867881 | Secure spin torque transfer magnetic random access memory (STTMRAM) | Sep 27, 2015 | Issued |
Array
(
[id] => 13611697
[patent_doc_number] => 20180357398
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-13
[patent_title] => MOBILE TERMINAL AND CONTROL METHOD THEREOF
[patent_app_type] => utility
[patent_app_number] => 15/573451
[patent_app_country] => US
[patent_app_date] => 2015-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14252
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 42
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15573451
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/573451 | MOBILE TERMINAL AND CONTROL METHOD THEREOF | Sep 9, 2015 | Abandoned |
Array
(
[id] => 10494282
[patent_doc_number] => 20150379303
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'Systems And Methods For Contextualized Data Protection'
[patent_app_type] => utility
[patent_app_number] => 14/846167
[patent_app_country] => US
[patent_app_date] => 2015-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 51
[patent_figures_cnt] => 51
[patent_no_of_words] => 58812
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14846167
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/846167 | Systems and methods for contextualized data protection | Sep 3, 2015 | Issued |