
Josnel Jeudy
Examiner (ID: 12977, Phone: (571)270-7476 , Office: P/2438 )
| Most Active Art Unit | 2438 |
| Art Unit(s) | 2438 |
| Total Applications | 880 |
| Issued Applications | 708 |
| Pending Applications | 56 |
| Abandoned Applications | 137 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15675135
[patent_doc_number] => 10601815
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-24
[patent_title] => Methods and devices for bootstrapping of resource constrained devices
[patent_app_type] => utility
[patent_app_number] => 15/036685
[patent_app_country] => US
[patent_app_date] => 2013-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 8666
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15036685
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/036685 | Methods and devices for bootstrapping of resource constrained devices | Nov 14, 2013 | Issued |
Array
(
[id] => 11222571
[patent_doc_number] => 09450923
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-20
[patent_title] => 'Systems and methods of data segmentation and multi-point storage'
[patent_app_type] => utility
[patent_app_number] => 14/077461
[patent_app_country] => US
[patent_app_date] => 2013-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5371
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 368
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14077461
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/077461 | Systems and methods of data segmentation and multi-point storage | Nov 11, 2013 | Issued |
Array
(
[id] => 10545514
[patent_doc_number] => 09270659
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-23
[patent_title] => 'Open connection manager virtualization at system-on-chip'
[patent_app_type] => utility
[patent_app_number] => 14/077981
[patent_app_country] => US
[patent_app_date] => 2013-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 24765
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14077981
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/077981 | Open connection manager virtualization at system-on-chip | Nov 11, 2013 | Issued |
Array
(
[id] => 11782753
[patent_doc_number] => 09391980
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-07-12
[patent_title] => 'Enterprise platform verification'
[patent_app_type] => utility
[patent_app_number] => 14/077120
[patent_app_country] => US
[patent_app_date] => 2013-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9087
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 250
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14077120
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/077120 | Enterprise platform verification | Nov 10, 2013 | Issued |
Array
(
[id] => 9916227
[patent_doc_number] => 20150071432
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-12
[patent_title] => 'PHYSICALLY UNCLONABLE FUNCTION BASED ON RESISTIVITY OF MAGNETORESISTIVE RANDOM-ACCESS MEMORY MAGNETIC TUNNEL JUNCTIONS'
[patent_app_type] => utility
[patent_app_number] => 14/077093
[patent_app_country] => US
[patent_app_date] => 2013-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 10072
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14077093
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/077093 | PHYSICALLY UNCLONABLE FUNCTION BASED ON RESISTIVITY OF MAGNETORESISTIVE RANDOM-ACCESS MEMORY MAGNETIC TUNNEL JUNCTIONS | Nov 10, 2013 | Abandoned |
Array
(
[id] => 10250260
[patent_doc_number] => 20150135255
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-14
[patent_title] => 'CLIENT-CONFIGURABLE SECURITY OPTIONS FOR DATA STREAMS'
[patent_app_type] => utility
[patent_app_number] => 14/077158
[patent_app_country] => US
[patent_app_date] => 2013-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 32
[patent_figures_cnt] => 32
[patent_no_of_words] => 35288
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14077158
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/077158 | Client-configurable security options for data streams | Nov 10, 2013 | Issued |
Array
(
[id] => 11078324
[patent_doc_number] => 20160275288
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-22
[patent_title] => 'DETECTION OF ANOMALOUS PROGRAM EXECUTION USING HARDWARE-BASED MICRO-ARCHITECTURAL DATA'
[patent_app_type] => utility
[patent_app_number] => 14/778007
[patent_app_country] => US
[patent_app_date] => 2013-11-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11403
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14778007
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/778007 | Detection of anomalous program execution using hardware-based micro-architectural data | Nov 4, 2013 | Issued |
Array
(
[id] => 11599010
[patent_doc_number] => 09646180
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-09
[patent_title] => 'Device monitoring using multiple servers optimized for different types of communications'
[patent_app_type] => utility
[patent_app_number] => 14/438226
[patent_app_country] => US
[patent_app_date] => 2013-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 20
[patent_no_of_words] => 10200
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14438226
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/438226 | Device monitoring using multiple servers optimized for different types of communications | Oct 27, 2013 | Issued |
Array
(
[id] => 10376961
[patent_doc_number] => 20150261967
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'METHODS AND SYSTEMS FOR CONCEALING INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 14/438552
[patent_app_country] => US
[patent_app_date] => 2013-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 2710
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14438552
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/438552 | Methods and systems for concealing information | Oct 24, 2013 | Issued |
Array
(
[id] => 9283343
[patent_doc_number] => 20140033311
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-30
[patent_title] => 'METHOD AND APPARATUS FOR DETERMINING VIRUS-INFECTED FILES'
[patent_app_type] => utility
[patent_app_number] => 14/040434
[patent_app_country] => US
[patent_app_date] => 2013-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5437
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14040434
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/040434 | Method and apparatus for determining virus-infected files | Sep 26, 2013 | Issued |
Array
(
[id] => 10119412
[patent_doc_number] => 09154309
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-06
[patent_title] => 'Method and system for running encrypted files'
[patent_app_type] => utility
[patent_app_number] => 14/040537
[patent_app_country] => US
[patent_app_date] => 2013-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8702
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14040537
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/040537 | Method and system for running encrypted files | Sep 26, 2013 | Issued |
Array
(
[id] => 10211026
[patent_doc_number] => 20150096018
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-02
[patent_title] => 'Systems and Methods for Using a Reputation Indicator to Facilitate Malware Scanning'
[patent_app_type] => utility
[patent_app_number] => 14/040430
[patent_app_country] => US
[patent_app_date] => 2013-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13498
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14040430
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/040430 | Systems and methods for using a reputation indicator to facilitate malware scanning | Sep 26, 2013 | Issued |
Array
(
[id] => 11292857
[patent_doc_number] => 20160342789
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-24
[patent_title] => 'Injection of Data Flow Control Objects into Application Processes'
[patent_app_type] => utility
[patent_app_number] => 14/917839
[patent_app_country] => US
[patent_app_date] => 2013-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4767
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14917839
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/917839 | Injection of data flow control objects into application processes | Sep 22, 2013 | Issued |
Array
(
[id] => 9926667
[patent_doc_number] => 08984656
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-03-17
[patent_title] => 'Sensitive data aliasing'
[patent_app_type] => utility
[patent_app_number] => 14/033657
[patent_app_country] => US
[patent_app_date] => 2013-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6828
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14033657
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/033657 | Sensitive data aliasing | Sep 22, 2013 | Issued |
Array
(
[id] => 11022127
[patent_doc_number] => 20160219082
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-28
[patent_title] => 'APPARATUS AND METHOD FOR LAWFUL INTERCEPTION'
[patent_app_type] => utility
[patent_app_number] => 14/917343
[patent_app_country] => US
[patent_app_date] => 2013-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4139
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 11
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14917343
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/917343 | APPARATUS AND METHOD FOR LAWFUL INTERCEPTION | Sep 8, 2013 | Abandoned |
Array
(
[id] => 10403690
[patent_doc_number] => 20150288699
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'Method and Device for Controlling an Internet Access'
[patent_app_type] => utility
[patent_app_number] => 14/437912
[patent_app_country] => US
[patent_app_date] => 2013-09-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8344
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14437912
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/437912 | Method and Device for Controlling an Internet Access | Sep 5, 2013 | Abandoned |
Array
(
[id] => 9879341
[patent_doc_number] => 08966638
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-24
[patent_title] => 'System, method, and computer program product for selecting a wireless network based on security information'
[patent_app_type] => utility
[patent_app_number] => 13/974188
[patent_app_country] => US
[patent_app_date] => 2013-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5980
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13974188
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/974188 | System, method, and computer program product for selecting a wireless network based on security information | Aug 22, 2013 | Issued |
Array
(
[id] => 10709183
[patent_doc_number] => 20160055330
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-25
[patent_title] => 'THREE-DIMENSIONAL UNLOCKING DEVICE, THREE-DIMENSIONAL UNLOCKING METHOD, AND PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 14/778348
[patent_app_country] => US
[patent_app_date] => 2013-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 10736
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14778348
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/778348 | THREE-DIMENSIONAL UNLOCKING DEVICE, THREE-DIMENSIONAL UNLOCKING METHOD, AND PROGRAM | Aug 20, 2013 | Abandoned |
Array
(
[id] => 10384371
[patent_doc_number] => 20150269378
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-24
[patent_title] => 'Use of a Physical Unclonable Function for Checking Authentication'
[patent_app_type] => utility
[patent_app_number] => 14/435584
[patent_app_country] => US
[patent_app_date] => 2013-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4916
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14435584
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/435584 | Use of a Physical Unclonable Function for Checking Authentication | Aug 12, 2013 | Abandoned |
Array
(
[id] => 9860219
[patent_doc_number] => 20150040235
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-05
[patent_title] => 'COERCED ENCRYPTION ON CONNECTED DEVICES'
[patent_app_type] => utility
[patent_app_number] => 13/957003
[patent_app_country] => US
[patent_app_date] => 2013-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8665
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13957003
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/957003 | Coerced encryption on connected devices | Jul 31, 2013 | Issued |