
Josnel Jeudy
Examiner (ID: 12977, Phone: (571)270-7476 , Office: P/2438 )
| Most Active Art Unit | 2438 |
| Art Unit(s) | 2438 |
| Total Applications | 880 |
| Issued Applications | 708 |
| Pending Applications | 56 |
| Abandoned Applications | 137 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11239296
[patent_doc_number] => 09465941
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-11
[patent_title] => 'Method, system, and apparatus for detecting malicious code'
[patent_app_type] => utility
[patent_app_number] => 14/162139
[patent_app_country] => US
[patent_app_date] => 2014-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 17
[patent_no_of_words] => 12079
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14162139
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/162139 | Method, system, and apparatus for detecting malicious code | Jan 22, 2014 | Issued |
Array
(
[id] => 10074539
[patent_doc_number] => 09112912
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-08-18
[patent_title] => 'Security device for preemptively determining policies'
[patent_app_type] => utility
[patent_app_number] => 14/162187
[patent_app_country] => US
[patent_app_date] => 2014-01-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 9399
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14162187
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/162187 | Security device for preemptively determining policies | Jan 22, 2014 | Issued |
Array
(
[id] => 10314501
[patent_doc_number] => 20150199504
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-16
[patent_title] => 'MULTI-TOUCH LOCAL DEVICE AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/155917
[patent_app_country] => US
[patent_app_date] => 2014-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4497
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14155917
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/155917 | Multi-touch local device authentication | Jan 14, 2014 | Issued |
Array
(
[id] => 11775434
[patent_doc_number] => 09384365
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-05
[patent_title] => 'Remote data viewer'
[patent_app_type] => utility
[patent_app_number] => 14/154108
[patent_app_country] => US
[patent_app_date] => 2014-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1530
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14154108
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/154108 | Remote data viewer | Jan 12, 2014 | Issued |
Array
(
[id] => 10314526
[patent_doc_number] => 20150199530
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-16
[patent_title] => 'Systems and Methods With Cryptography and Tamper Resistance Software Security'
[patent_app_type] => utility
[patent_app_number] => 14/152167
[patent_app_country] => US
[patent_app_date] => 2014-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5594
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14152167
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/152167 | Systems and Methods With Cryptography and Tamper Resistance Software Security | Jan 9, 2014 | Abandoned |
Array
(
[id] => 10569504
[patent_doc_number] => 09292675
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-22
[patent_title] => 'System and method for creating a core cognitive fingerprint'
[patent_app_type] => utility
[patent_app_number] => 14/152610
[patent_app_country] => US
[patent_app_date] => 2014-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5233
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14152610
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/152610 | System and method for creating a core cognitive fingerprint | Jan 9, 2014 | Issued |
Array
(
[id] => 10079233
[patent_doc_number] => 09117081
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-25
[patent_title] => 'Strongly isolated malware scanning using secure virtual containers'
[patent_app_type] => utility
[patent_app_number] => 14/135902
[patent_app_country] => US
[patent_app_date] => 2013-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 14
[patent_no_of_words] => 9837
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 261
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14135902
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/135902 | Strongly isolated malware scanning using secure virtual containers | Dec 19, 2013 | Issued |
Array
(
[id] => 10295898
[patent_doc_number] => 20150180897
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-25
[patent_title] => 'Intermediate Trust State'
[patent_app_type] => utility
[patent_app_number] => 14/135759
[patent_app_country] => US
[patent_app_date] => 2013-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5840
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14135759
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/135759 | Intermediate trust state | Dec 19, 2013 | Issued |
Array
(
[id] => 9563816
[patent_doc_number] => 20140181529
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-26
[patent_title] => 'VERIFICATION OF PASSWORD USING A KEYBOARD WITH A SECURE PASSWORD ENTRY MODE'
[patent_app_type] => utility
[patent_app_number] => 14/136069
[patent_app_country] => US
[patent_app_date] => 2013-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 19099
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14136069
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/136069 | Verification of password using a keyboard with a secure password entry mode | Dec 19, 2013 | Issued |
Array
(
[id] => 10228288
[patent_doc_number] => 20150113281
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-23
[patent_title] => 'MULTIPLE APPLICATION PLATFORM OWNER KEYS IN A SECURE OBJECT COMPUTER SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/135964
[patent_app_country] => US
[patent_app_date] => 2013-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5967
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14135964
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/135964 | MULTIPLE APPLICATION PLATFORM OWNER KEYS IN A SECURE OBJECT COMPUTER SYSTEM | Dec 19, 2013 | Abandoned |
Array
(
[id] => 10462736
[patent_doc_number] => 20150347751
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'SYSTEM AND METHOD FOR MONITORING DATA IN A CLIENT ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/654488
[patent_app_country] => US
[patent_app_date] => 2013-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 14349
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14654488
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/654488 | SYSTEM AND METHOD FOR MONITORING DATA IN A CLIENT ENVIRONMENT | Dec 15, 2013 | Abandoned |
Array
(
[id] => 11897357
[patent_doc_number] => 09767294
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-19
[patent_title] => 'Intermediate server, database query processing method and program'
[patent_app_type] => utility
[patent_app_number] => 14/651111
[patent_app_country] => US
[patent_app_date] => 2013-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7216
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14651111
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/651111 | Intermediate server, database query processing method and program | Dec 12, 2013 | Issued |
Array
(
[id] => 10434145
[patent_doc_number] => 20150319156
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-05
[patent_title] => 'INDEPENDENT IDENTITY MANAGEMENT SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 14/651455
[patent_app_country] => US
[patent_app_date] => 2013-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 13642
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14651455
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/651455 | INDEPENDENT IDENTITY MANAGEMENT SYSTEMS | Dec 11, 2013 | Abandoned |
Array
(
[id] => 10427240
[patent_doc_number] => 20150312252
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-29
[patent_title] => 'METHOD OF ALLOWING ESTABLISHMENT OF A SECURE SESSION BETWEEN A DEVICE AND A SERVER'
[patent_app_type] => utility
[patent_app_number] => 14/651250
[patent_app_country] => US
[patent_app_date] => 2013-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3441
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14651250
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/651250 | Method of allowing establishment of a secure session between a device and a server | Nov 28, 2013 | Issued |
Array
(
[id] => 10433979
[patent_doc_number] => 20150318992
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-05
[patent_title] => 'METHOD FOR SERVER ASSISTED KEYSTORE PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 14/650676
[patent_app_country] => US
[patent_app_date] => 2013-11-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4263
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14650676
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/650676 | Method for server assisted keystore protection | Nov 27, 2013 | Issued |
Array
(
[id] => 10432459
[patent_doc_number] => 20150317471
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-05
[patent_title] => 'USER TRUSTED DEVICE TO ATTEST TRUSTWORTHINESS OF INITIALIZATION FIRMWARE'
[patent_app_type] => utility
[patent_app_number] => 14/651530
[patent_app_country] => US
[patent_app_date] => 2013-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 11568
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14651530
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/651530 | User trusted device to attest trustworthiness of initialization firmware | Nov 25, 2013 | Issued |
Array
(
[id] => 10557898
[patent_doc_number] => 09282107
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-08
[patent_title] => 'Secure verification of website claims'
[patent_app_type] => utility
[patent_app_number] => 14/086052
[patent_app_country] => US
[patent_app_date] => 2013-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5902
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14086052
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/086052 | Secure verification of website claims | Nov 20, 2013 | Issued |
Array
(
[id] => 9493480
[patent_doc_number] => 20140143887
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-22
[patent_title] => 'SECURITY MEASURES FOR DATA PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 14/086591
[patent_app_country] => US
[patent_app_date] => 2013-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3084
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14086591
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/086591 | Security measures for data protection | Nov 20, 2013 | Issued |
Array
(
[id] => 10157845
[patent_doc_number] => 09189627
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-11-17
[patent_title] => 'System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection'
[patent_app_type] => utility
[patent_app_number] => 14/086842
[patent_app_country] => US
[patent_app_date] => 2013-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 13
[patent_no_of_words] => 8308
[patent_no_of_claims] => 43
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 250
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14086842
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/086842 | System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection | Nov 20, 2013 | Issued |
Array
(
[id] => 10258455
[patent_doc_number] => 20150143452
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-21
[patent_title] => 'SYSTEM AND METHOD FOR RETROFITTING APPLICATION CODE'
[patent_app_type] => utility
[patent_app_number] => 14/086179
[patent_app_country] => US
[patent_app_date] => 2013-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 15198
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14086179
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/086179 | System and method for retrofitting application code | Nov 20, 2013 | Issued |