Search

Josnel Jeudy

Examiner (ID: 12977, Phone: (571)270-7476 , Office: P/2438 )

Most Active Art Unit
2438
Art Unit(s)
2438
Total Applications
880
Issued Applications
708
Pending Applications
56
Abandoned Applications
137

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11133050 [patent_doc_number] => 20160330025 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-11-10 [patent_title] => 'METHOD TO INDEPENDENTLY COMPLETE THE PERSONALIZATION OF A TOKEN' [patent_app_type] => utility [patent_app_number] => 15/108661 [patent_app_country] => US [patent_app_date] => 2014-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5945 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15108661 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/108661
METHOD TO INDEPENDENTLY COMPLETE THE PERSONALIZATION OF A TOKEN Dec 14, 2014 Abandoned
Array ( [id] => 11133641 [patent_doc_number] => 20160330617 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-11-10 [patent_title] => 'APPARATUS, SYSTEM AND METHOD FOR SCE' [patent_app_type] => utility [patent_app_number] => 15/107640 [patent_app_country] => US [patent_app_date] => 2014-11-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 11029 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15107640 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/107640
Apparatus, system and method for SCE Nov 19, 2014 Issued
Array ( [id] => 9919142 [patent_doc_number] => 20150074347 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-12 [patent_title] => 'SECURE SPIN TORQUE TRANSFER MAGNETIC RANDOM ACCESS MEMORY (STTMRAM)' [patent_app_type] => utility [patent_app_number] => 14/542533 [patent_app_country] => US [patent_app_date] => 2014-11-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3851 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14542533 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/542533
SECURE SPIN TORQUE TRANSFER MAGNETIC RANDOM ACCESS MEMORY (STTMRAM) Nov 13, 2014 Abandoned
Array ( [id] => 10243289 [patent_doc_number] => 20150128284 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-05-07 [patent_title] => 'Dynamic De-Identification And Anonymity' [patent_app_type] => utility [patent_app_number] => 14/530304 [patent_app_country] => US [patent_app_date] => 2014-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 44 [patent_figures_cnt] => 44 [patent_no_of_words] => 52160 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14530304 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/530304
Dynamic de-identification and anonymity Oct 30, 2014 Issued
Array ( [id] => 10726480 [patent_doc_number] => 20160072628 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-10 [patent_title] => 'SYSTEMS AND METHODS FOR MANAGING CRYPTOGRAPHIC KEYS IN A SECURE MICROCONTROLLER' [patent_app_type] => utility [patent_app_number] => 14/528810 [patent_app_country] => US [patent_app_date] => 2014-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 7381 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14528810 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/528810
Systems and methods for managing cryptographic keys in a secure microcontroller Oct 29, 2014 Issued
Array ( [id] => 11052254 [patent_doc_number] => 20160249215 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-08-25 [patent_title] => 'COMMUNICATION CONTROL METHOD, AUTHENTICATION SERVER, AND USER TERMINAL' [patent_app_type] => utility [patent_app_number] => 15/031180 [patent_app_country] => US [patent_app_date] => 2014-10-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10059 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15031180 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/031180
COMMUNICATION CONTROL METHOD, AUTHENTICATION SERVER, AND USER TERMINAL Oct 22, 2014 Abandoned
Array ( [id] => 11433177 [patent_doc_number] => 09571510 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-02-14 [patent_title] => 'Systems and methods for identifying security threat sources responsible for security events' [patent_app_type] => utility [patent_app_number] => 14/519565 [patent_app_country] => US [patent_app_date] => 2014-10-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 11270 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 287 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14519565 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/519565
Systems and methods for identifying security threat sources responsible for security events Oct 20, 2014 Issued
Array ( [id] => 12021180 [patent_doc_number] => 09813913 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-11-07 [patent_title] => 'Method and apparatus for detecting unauthorized access point' [patent_app_type] => utility [patent_app_number] => 14/519582 [patent_app_country] => US [patent_app_date] => 2014-10-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 4592 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 118 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14519582 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/519582
Method and apparatus for detecting unauthorized access point Oct 20, 2014 Issued
Array ( [id] => 10764400 [patent_doc_number] => 20160110555 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-04-21 [patent_title] => 'RESOURCE SHARING APPARATUS, METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF' [patent_app_type] => utility [patent_app_number] => 14/519789 [patent_app_country] => US [patent_app_date] => 2014-10-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 7878 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14519789 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/519789
RESOURCE SHARING APPARATUS, METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF Oct 20, 2014 Abandoned
Array ( [id] => 15167629 [patent_doc_number] => 10489309 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-11-26 [patent_title] => Memory protection key architecture with independent user and supervisor domains [patent_app_type] => utility [patent_app_number] => 14/519648 [patent_app_country] => US [patent_app_date] => 2014-10-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 13 [patent_no_of_words] => 14424 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 213 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14519648 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/519648
Memory protection key architecture with independent user and supervisor domains Oct 20, 2014 Issued
Array ( [id] => 13255481 [patent_doc_number] => 10140431 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-11-27 [patent_title] => File management system and user terminal in file management system [patent_app_type] => utility [patent_app_number] => 14/917332 [patent_app_country] => US [patent_app_date] => 2014-09-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 6853 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 269 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14917332 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/917332
File management system and user terminal in file management system Sep 10, 2014 Issued
Array ( [id] => 10216018 [patent_doc_number] => 20150101010 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-04-09 [patent_title] => 'MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS' [patent_app_type] => utility [patent_app_number] => 14/481864 [patent_app_country] => US [patent_app_date] => 2014-09-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6215 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14481864 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/481864
Malicious code infection cause-and-effect analysis Sep 8, 2014 Issued
Array ( [id] => 9801063 [patent_doc_number] => 20150013007 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-08 [patent_title] => 'MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS' [patent_app_type] => utility [patent_app_number] => 14/481873 [patent_app_country] => US [patent_app_date] => 2014-09-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6216 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14481873 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/481873
Malicious code infection cause-and-effect analysis Sep 8, 2014 Issued
Array ( [id] => 11088886 [patent_doc_number] => 20160285854 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-09-29 [patent_title] => 'ANDROID-BASED MOBILE EQUIPMENT SECURITY PROTECTION METHOD, AND DEVICE' [patent_app_type] => utility [patent_app_number] => 15/036934 [patent_app_country] => US [patent_app_date] => 2014-08-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 8707 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15036934 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/036934
Android-based mobile equipment security protection method, and device Aug 25, 2014 Issued
Array ( [id] => 10816545 [patent_doc_number] => 20160162706 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-06-09 [patent_title] => 'METHOD FOR PROCESSING GEOLOCATION DATA' [patent_app_type] => utility [patent_app_number] => 14/907508 [patent_app_country] => US [patent_app_date] => 2014-07-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 5289 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14907508 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/907508
METHOD FOR PROCESSING GEOLOCATION DATA Jul 27, 2014 Abandoned
Array ( [id] => 10955578 [patent_doc_number] => 20140358599 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-04 [patent_title] => 'SYSTEMS AND METHODS FOR IMPROVED ACCESS TO AN ATTRACTION' [patent_app_type] => utility [patent_app_number] => 14/341219 [patent_app_country] => US [patent_app_date] => 2014-07-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 27 [patent_figures_cnt] => 27 [patent_no_of_words] => 32495 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14341219 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/341219
Systems and methods for improved access to an attraction Jul 24, 2014 Issued
Array ( [id] => 12249399 [patent_doc_number] => 09922178 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-03-20 [patent_title] => 'Media client device authentication using hardware root of trust' [patent_app_type] => utility [patent_app_number] => 14/907152 [patent_app_country] => US [patent_app_date] => 2014-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 6676 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 267 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14907152 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/907152
Media client device authentication using hardware root of trust Jul 22, 2014 Issued
Array ( [id] => 10818677 [patent_doc_number] => 20160164841 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-06-09 [patent_title] => 'MEDIA DISTRIBUTION SYSTEM WITH MANIFEST-BASED ENTITLEMENT ENFORCEMENT' [patent_app_type] => utility [patent_app_number] => 14/907132 [patent_app_country] => US [patent_app_date] => 2014-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3384 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14907132 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/907132
Media distribution system with manifest-based entitlement enforcement Jul 22, 2014 Issued
Array ( [id] => 12175943 [patent_doc_number] => 09894098 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-02-13 [patent_title] => 'Cloud protection techniques' [patent_app_type] => utility [patent_app_number] => 14/336794 [patent_app_country] => US [patent_app_date] => 2014-07-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4649 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 108 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14336794 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/336794
Cloud protection techniques Jul 20, 2014 Issued
Array ( [id] => 11029906 [patent_doc_number] => 20160226862 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-08-04 [patent_title] => 'WIRELESS AUTHENTICATION SYSTEM AND WIRELESS AUTHENTICATION METHOD FOR ONE TIME PASSWORD OF MOBILE COMMUNICATION TERMINAL HAVING NEAR FIELD COMMUNICATION FUNCTION' [patent_app_type] => utility [patent_app_number] => 14/917470 [patent_app_country] => US [patent_app_date] => 2014-07-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 9568 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14917470 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/917470
Wireless authentication system and wireless authentication method for one time password of mobile communication terminal having near field communication function Jul 16, 2014 Issued
Menu