Search

Josnel Jeudy

Examiner (ID: 12977, Phone: (571)270-7476 , Office: P/2438 )

Most Active Art Unit
2438
Art Unit(s)
2438
Total Applications
880
Issued Applications
708
Pending Applications
56
Abandoned Applications
137

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 15675135 [patent_doc_number] => 10601815 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-03-24 [patent_title] => Methods and devices for bootstrapping of resource constrained devices [patent_app_type] => utility [patent_app_number] => 15/036685 [patent_app_country] => US [patent_app_date] => 2013-11-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 11 [patent_no_of_words] => 8666 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 111 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15036685 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/036685
Methods and devices for bootstrapping of resource constrained devices Nov 14, 2013 Issued
Array ( [id] => 11222571 [patent_doc_number] => 09450923 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-09-20 [patent_title] => 'Systems and methods of data segmentation and multi-point storage' [patent_app_type] => utility [patent_app_number] => 14/077461 [patent_app_country] => US [patent_app_date] => 2013-11-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5371 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 368 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14077461 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/077461
Systems and methods of data segmentation and multi-point storage Nov 11, 2013 Issued
Array ( [id] => 10545514 [patent_doc_number] => 09270659 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-02-23 [patent_title] => 'Open connection manager virtualization at system-on-chip' [patent_app_type] => utility [patent_app_number] => 14/077981 [patent_app_country] => US [patent_app_date] => 2013-11-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 24765 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 234 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14077981 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/077981
Open connection manager virtualization at system-on-chip Nov 11, 2013 Issued
Array ( [id] => 11782753 [patent_doc_number] => 09391980 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-07-12 [patent_title] => 'Enterprise platform verification' [patent_app_type] => utility [patent_app_number] => 14/077120 [patent_app_country] => US [patent_app_date] => 2013-11-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 9087 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 250 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14077120 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/077120
Enterprise platform verification Nov 10, 2013 Issued
Array ( [id] => 9916227 [patent_doc_number] => 20150071432 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-12 [patent_title] => 'PHYSICALLY UNCLONABLE FUNCTION BASED ON RESISTIVITY OF MAGNETORESISTIVE RANDOM-ACCESS MEMORY MAGNETIC TUNNEL JUNCTIONS' [patent_app_type] => utility [patent_app_number] => 14/077093 [patent_app_country] => US [patent_app_date] => 2013-11-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 10072 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14077093 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/077093
PHYSICALLY UNCLONABLE FUNCTION BASED ON RESISTIVITY OF MAGNETORESISTIVE RANDOM-ACCESS MEMORY MAGNETIC TUNNEL JUNCTIONS Nov 10, 2013 Abandoned
Array ( [id] => 10250260 [patent_doc_number] => 20150135255 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-05-14 [patent_title] => 'CLIENT-CONFIGURABLE SECURITY OPTIONS FOR DATA STREAMS' [patent_app_type] => utility [patent_app_number] => 14/077158 [patent_app_country] => US [patent_app_date] => 2013-11-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 32 [patent_figures_cnt] => 32 [patent_no_of_words] => 35288 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14077158 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/077158
Client-configurable security options for data streams Nov 10, 2013 Issued
Array ( [id] => 11078324 [patent_doc_number] => 20160275288 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-09-22 [patent_title] => 'DETECTION OF ANOMALOUS PROGRAM EXECUTION USING HARDWARE-BASED MICRO-ARCHITECTURAL DATA' [patent_app_type] => utility [patent_app_number] => 14/778007 [patent_app_country] => US [patent_app_date] => 2013-11-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 11403 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14778007 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/778007
Detection of anomalous program execution using hardware-based micro-architectural data Nov 4, 2013 Issued
Array ( [id] => 11599010 [patent_doc_number] => 09646180 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-05-09 [patent_title] => 'Device monitoring using multiple servers optimized for different types of communications' [patent_app_type] => utility [patent_app_number] => 14/438226 [patent_app_country] => US [patent_app_date] => 2013-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 20 [patent_no_of_words] => 10200 [patent_no_of_claims] => 31 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 153 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14438226 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/438226
Device monitoring using multiple servers optimized for different types of communications Oct 27, 2013 Issued
Array ( [id] => 10376961 [patent_doc_number] => 20150261967 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'METHODS AND SYSTEMS FOR CONCEALING INFORMATION' [patent_app_type] => utility [patent_app_number] => 14/438552 [patent_app_country] => US [patent_app_date] => 2013-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 2710 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 10 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14438552 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/438552
Methods and systems for concealing information Oct 24, 2013 Issued
Array ( [id] => 9283343 [patent_doc_number] => 20140033311 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-01-30 [patent_title] => 'METHOD AND APPARATUS FOR DETERMINING VIRUS-INFECTED FILES' [patent_app_type] => utility [patent_app_number] => 14/040434 [patent_app_country] => US [patent_app_date] => 2013-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5437 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14040434 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/040434
Method and apparatus for determining virus-infected files Sep 26, 2013 Issued
Array ( [id] => 10119412 [patent_doc_number] => 09154309 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-06 [patent_title] => 'Method and system for running encrypted files' [patent_app_type] => utility [patent_app_number] => 14/040537 [patent_app_country] => US [patent_app_date] => 2013-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8702 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14040537 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/040537
Method and system for running encrypted files Sep 26, 2013 Issued
Array ( [id] => 10211026 [patent_doc_number] => 20150096018 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-04-02 [patent_title] => 'Systems and Methods for Using a Reputation Indicator to Facilitate Malware Scanning' [patent_app_type] => utility [patent_app_number] => 14/040430 [patent_app_country] => US [patent_app_date] => 2013-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 13498 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14040430 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/040430
Systems and methods for using a reputation indicator to facilitate malware scanning Sep 26, 2013 Issued
Array ( [id] => 11292857 [patent_doc_number] => 20160342789 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-11-24 [patent_title] => 'Injection of Data Flow Control Objects into Application Processes' [patent_app_type] => utility [patent_app_number] => 14/917839 [patent_app_country] => US [patent_app_date] => 2013-09-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4767 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14917839 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/917839
Injection of data flow control objects into application processes Sep 22, 2013 Issued
Array ( [id] => 9926667 [patent_doc_number] => 08984656 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-03-17 [patent_title] => 'Sensitive data aliasing' [patent_app_type] => utility [patent_app_number] => 14/033657 [patent_app_country] => US [patent_app_date] => 2013-09-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6828 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14033657 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/033657
Sensitive data aliasing Sep 22, 2013 Issued
Array ( [id] => 11022127 [patent_doc_number] => 20160219082 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-07-28 [patent_title] => 'APPARATUS AND METHOD FOR LAWFUL INTERCEPTION' [patent_app_type] => utility [patent_app_number] => 14/917343 [patent_app_country] => US [patent_app_date] => 2013-09-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4139 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 11 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14917343 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/917343
APPARATUS AND METHOD FOR LAWFUL INTERCEPTION Sep 8, 2013 Abandoned
Array ( [id] => 10403690 [patent_doc_number] => 20150288699 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-08 [patent_title] => 'Method and Device for Controlling an Internet Access' [patent_app_type] => utility [patent_app_number] => 14/437912 [patent_app_country] => US [patent_app_date] => 2013-09-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8344 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14437912 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/437912
Method and Device for Controlling an Internet Access Sep 5, 2013 Abandoned
Array ( [id] => 9879341 [patent_doc_number] => 08966638 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-02-24 [patent_title] => 'System, method, and computer program product for selecting a wireless network based on security information' [patent_app_type] => utility [patent_app_number] => 13/974188 [patent_app_country] => US [patent_app_date] => 2013-08-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5980 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 122 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13974188 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/974188
System, method, and computer program product for selecting a wireless network based on security information Aug 22, 2013 Issued
Array ( [id] => 10709183 [patent_doc_number] => 20160055330 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-25 [patent_title] => 'THREE-DIMENSIONAL UNLOCKING DEVICE, THREE-DIMENSIONAL UNLOCKING METHOD, AND PROGRAM' [patent_app_type] => utility [patent_app_number] => 14/778348 [patent_app_country] => US [patent_app_date] => 2013-08-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 10736 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14778348 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/778348
THREE-DIMENSIONAL UNLOCKING DEVICE, THREE-DIMENSIONAL UNLOCKING METHOD, AND PROGRAM Aug 20, 2013 Abandoned
Array ( [id] => 10384371 [patent_doc_number] => 20150269378 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-24 [patent_title] => 'Use of a Physical Unclonable Function for Checking Authentication' [patent_app_type] => utility [patent_app_number] => 14/435584 [patent_app_country] => US [patent_app_date] => 2013-08-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4916 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14435584 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/435584
Use of a Physical Unclonable Function for Checking Authentication Aug 12, 2013 Abandoned
Array ( [id] => 9860219 [patent_doc_number] => 20150040235 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-05 [patent_title] => 'COERCED ENCRYPTION ON CONNECTED DEVICES' [patent_app_type] => utility [patent_app_number] => 13/957003 [patent_app_country] => US [patent_app_date] => 2013-08-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8665 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13957003 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/957003
Coerced encryption on connected devices Jul 31, 2013 Issued
Menu