
Josnel Jeudy
Examiner (ID: 12977, Phone: (571)270-7476 , Office: P/2438 )
| Most Active Art Unit | 2438 |
| Art Unit(s) | 2438 |
| Total Applications | 880 |
| Issued Applications | 708 |
| Pending Applications | 56 |
| Abandoned Applications | 137 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11133050
[patent_doc_number] => 20160330025
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-10
[patent_title] => 'METHOD TO INDEPENDENTLY COMPLETE THE PERSONALIZATION OF A TOKEN'
[patent_app_type] => utility
[patent_app_number] => 15/108661
[patent_app_country] => US
[patent_app_date] => 2014-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5945
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15108661
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/108661 | METHOD TO INDEPENDENTLY COMPLETE THE PERSONALIZATION OF A TOKEN | Dec 14, 2014 | Abandoned |
Array
(
[id] => 11133641
[patent_doc_number] => 20160330617
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-10
[patent_title] => 'APPARATUS, SYSTEM AND METHOD FOR SCE'
[patent_app_type] => utility
[patent_app_number] => 15/107640
[patent_app_country] => US
[patent_app_date] => 2014-11-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 11029
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15107640
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/107640 | Apparatus, system and method for SCE | Nov 19, 2014 | Issued |
Array
(
[id] => 9919142
[patent_doc_number] => 20150074347
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-12
[patent_title] => 'SECURE SPIN TORQUE TRANSFER MAGNETIC RANDOM ACCESS MEMORY (STTMRAM)'
[patent_app_type] => utility
[patent_app_number] => 14/542533
[patent_app_country] => US
[patent_app_date] => 2014-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3851
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14542533
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/542533 | SECURE SPIN TORQUE TRANSFER MAGNETIC RANDOM ACCESS MEMORY (STTMRAM) | Nov 13, 2014 | Abandoned |
Array
(
[id] => 10243289
[patent_doc_number] => 20150128284
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-07
[patent_title] => 'Dynamic De-Identification And Anonymity'
[patent_app_type] => utility
[patent_app_number] => 14/530304
[patent_app_country] => US
[patent_app_date] => 2014-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 44
[patent_figures_cnt] => 44
[patent_no_of_words] => 52160
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14530304
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/530304 | Dynamic de-identification and anonymity | Oct 30, 2014 | Issued |
Array
(
[id] => 10726480
[patent_doc_number] => 20160072628
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'SYSTEMS AND METHODS FOR MANAGING CRYPTOGRAPHIC KEYS IN A SECURE MICROCONTROLLER'
[patent_app_type] => utility
[patent_app_number] => 14/528810
[patent_app_country] => US
[patent_app_date] => 2014-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7381
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14528810
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/528810 | Systems and methods for managing cryptographic keys in a secure microcontroller | Oct 29, 2014 | Issued |
Array
(
[id] => 11052254
[patent_doc_number] => 20160249215
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-25
[patent_title] => 'COMMUNICATION CONTROL METHOD, AUTHENTICATION SERVER, AND USER TERMINAL'
[patent_app_type] => utility
[patent_app_number] => 15/031180
[patent_app_country] => US
[patent_app_date] => 2014-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10059
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15031180
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/031180 | COMMUNICATION CONTROL METHOD, AUTHENTICATION SERVER, AND USER TERMINAL | Oct 22, 2014 | Abandoned |
Array
(
[id] => 11433177
[patent_doc_number] => 09571510
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-02-14
[patent_title] => 'Systems and methods for identifying security threat sources responsible for security events'
[patent_app_type] => utility
[patent_app_number] => 14/519565
[patent_app_country] => US
[patent_app_date] => 2014-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11270
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14519565
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/519565 | Systems and methods for identifying security threat sources responsible for security events | Oct 20, 2014 | Issued |
Array
(
[id] => 12021180
[patent_doc_number] => 09813913
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-07
[patent_title] => 'Method and apparatus for detecting unauthorized access point'
[patent_app_type] => utility
[patent_app_number] => 14/519582
[patent_app_country] => US
[patent_app_date] => 2014-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 4592
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14519582
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/519582 | Method and apparatus for detecting unauthorized access point | Oct 20, 2014 | Issued |
Array
(
[id] => 10764400
[patent_doc_number] => 20160110555
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-21
[patent_title] => 'RESOURCE SHARING APPARATUS, METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/519789
[patent_app_country] => US
[patent_app_date] => 2014-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7878
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14519789
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/519789 | RESOURCE SHARING APPARATUS, METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF | Oct 20, 2014 | Abandoned |
Array
(
[id] => 15167629
[patent_doc_number] => 10489309
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-26
[patent_title] => Memory protection key architecture with independent user and supervisor domains
[patent_app_type] => utility
[patent_app_number] => 14/519648
[patent_app_country] => US
[patent_app_date] => 2014-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 14424
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14519648
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/519648 | Memory protection key architecture with independent user and supervisor domains | Oct 20, 2014 | Issued |
Array
(
[id] => 13255481
[patent_doc_number] => 10140431
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-27
[patent_title] => File management system and user terminal in file management system
[patent_app_type] => utility
[patent_app_number] => 14/917332
[patent_app_country] => US
[patent_app_date] => 2014-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 6853
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14917332
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/917332 | File management system and user terminal in file management system | Sep 10, 2014 | Issued |
Array
(
[id] => 10216018
[patent_doc_number] => 20150101010
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-09
[patent_title] => 'MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 14/481864
[patent_app_country] => US
[patent_app_date] => 2014-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6215
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14481864
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/481864 | Malicious code infection cause-and-effect analysis | Sep 8, 2014 | Issued |
Array
(
[id] => 9801063
[patent_doc_number] => 20150013007
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-08
[patent_title] => 'MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 14/481873
[patent_app_country] => US
[patent_app_date] => 2014-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6216
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14481873
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/481873 | Malicious code infection cause-and-effect analysis | Sep 8, 2014 | Issued |
Array
(
[id] => 11088886
[patent_doc_number] => 20160285854
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-29
[patent_title] => 'ANDROID-BASED MOBILE EQUIPMENT SECURITY PROTECTION METHOD, AND DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/036934
[patent_app_country] => US
[patent_app_date] => 2014-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8707
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15036934
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/036934 | Android-based mobile equipment security protection method, and device | Aug 25, 2014 | Issued |
Array
(
[id] => 10816545
[patent_doc_number] => 20160162706
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-09
[patent_title] => 'METHOD FOR PROCESSING GEOLOCATION DATA'
[patent_app_type] => utility
[patent_app_number] => 14/907508
[patent_app_country] => US
[patent_app_date] => 2014-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5289
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14907508
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/907508 | METHOD FOR PROCESSING GEOLOCATION DATA | Jul 27, 2014 | Abandoned |
Array
(
[id] => 10955578
[patent_doc_number] => 20140358599
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-04
[patent_title] => 'SYSTEMS AND METHODS FOR IMPROVED ACCESS TO AN ATTRACTION'
[patent_app_type] => utility
[patent_app_number] => 14/341219
[patent_app_country] => US
[patent_app_date] => 2014-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 32495
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14341219
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/341219 | Systems and methods for improved access to an attraction | Jul 24, 2014 | Issued |
Array
(
[id] => 12249399
[patent_doc_number] => 09922178
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-20
[patent_title] => 'Media client device authentication using hardware root of trust'
[patent_app_type] => utility
[patent_app_number] => 14/907152
[patent_app_country] => US
[patent_app_date] => 2014-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 6676
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 267
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14907152
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/907152 | Media client device authentication using hardware root of trust | Jul 22, 2014 | Issued |
Array
(
[id] => 10818677
[patent_doc_number] => 20160164841
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-09
[patent_title] => 'MEDIA DISTRIBUTION SYSTEM WITH MANIFEST-BASED ENTITLEMENT ENFORCEMENT'
[patent_app_type] => utility
[patent_app_number] => 14/907132
[patent_app_country] => US
[patent_app_date] => 2014-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3384
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14907132
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/907132 | Media distribution system with manifest-based entitlement enforcement | Jul 22, 2014 | Issued |
Array
(
[id] => 12175943
[patent_doc_number] => 09894098
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-13
[patent_title] => 'Cloud protection techniques'
[patent_app_type] => utility
[patent_app_number] => 14/336794
[patent_app_country] => US
[patent_app_date] => 2014-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4649
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14336794
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/336794 | Cloud protection techniques | Jul 20, 2014 | Issued |
Array
(
[id] => 11029906
[patent_doc_number] => 20160226862
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-04
[patent_title] => 'WIRELESS AUTHENTICATION SYSTEM AND WIRELESS AUTHENTICATION METHOD FOR ONE TIME PASSWORD OF MOBILE COMMUNICATION TERMINAL HAVING NEAR FIELD COMMUNICATION FUNCTION'
[patent_app_type] => utility
[patent_app_number] => 14/917470
[patent_app_country] => US
[patent_app_date] => 2014-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9568
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14917470
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/917470 | Wireless authentication system and wireless authentication method for one time password of mobile communication terminal having near field communication function | Jul 16, 2014 | Issued |