
Josnel Jeudy
Examiner (ID: 3768, Phone: (571)270-7476 , Office: P/2438 )
| Most Active Art Unit | 2438 |
| Art Unit(s) | 2438 |
| Total Applications | 882 |
| Issued Applications | 708 |
| Pending Applications | 58 |
| Abandoned Applications | 137 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11525385
[patent_doc_number] => 09608805
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-28
[patent_title] => 'Encryption key generation'
[patent_app_type] => utility
[patent_app_number] => 14/401956
[patent_app_country] => US
[patent_app_date] => 2013-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7341
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14401956
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/401956 | Encryption key generation | May 16, 2013 | Issued |
Array
(
[id] => 9871849
[patent_doc_number] => 08959641
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-17
[patent_title] => 'Foiling a document exploit attack'
[patent_app_type] => utility
[patent_app_number] => 13/894471
[patent_app_country] => US
[patent_app_date] => 2013-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2805
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13894471
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/894471 | Foiling a document exploit attack | May 14, 2013 | Issued |
Array
(
[id] => 10726479
[patent_doc_number] => 20160072625
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'CRYPTOGRAPHIC SYSTEM, CRYPTOGRAPHIC METHOD, AND CRYPTOGRAPHIC PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 14/787317
[patent_app_country] => US
[patent_app_date] => 2013-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 16308
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14787317
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/787317 | Cryptographic system, cryptographic method, and computer readable medium | May 14, 2013 | Issued |
Array
(
[id] => 13161853
[patent_doc_number] => 10097666
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-09
[patent_title] => Accessing a service using an encrypted token
[patent_app_type] => utility
[patent_app_number] => 14/409575
[patent_app_country] => US
[patent_app_date] => 2013-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12767
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14409575
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/409575 | Accessing a service using an encrypted token | Apr 10, 2013 | Issued |
Array
(
[id] => 9372827
[patent_doc_number] => 20140082700
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-20
[patent_title] => 'INFORMATION PROCESSING APPARATUS, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 13/990633
[patent_app_country] => US
[patent_app_date] => 2013-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 26
[patent_no_of_words] => 12672
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13990633
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/990633 | Information processing apparatus, authentication system, authentication method, and program | Apr 9, 2013 | Issued |
Array
(
[id] => 14987531
[patent_doc_number] => 10447695
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-15
[patent_title] => Mobile terminal, network node server, method and computer program
[patent_app_type] => utility
[patent_app_number] => 14/398691
[patent_app_country] => US
[patent_app_date] => 2013-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 15
[patent_no_of_words] => 5733
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14398691
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/398691 | Mobile terminal, network node server, method and computer program | Mar 26, 2013 | Issued |
Array
(
[id] => 8965792
[patent_doc_number] => 20130205394
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-08
[patent_title] => 'Threat Detection in a Data Processing System'
[patent_app_type] => utility
[patent_app_number] => 13/832887
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7362
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13832887
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/832887 | Threat Detection in a Data Processing System | Mar 14, 2013 | Abandoned |
Array
(
[id] => 9465417
[patent_doc_number] => 20140129844
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-08
[patent_title] => 'STORAGE SECURITY USING CRYPTOGRAPHIC SPLITTING'
[patent_app_type] => utility
[patent_app_number] => 13/833774
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 21425
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13833774
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/833774 | STORAGE SECURITY USING CRYPTOGRAPHIC SPLITTING | Mar 14, 2013 | Abandoned |
Array
(
[id] => 9163512
[patent_doc_number] => 20130311789
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-21
[patent_title] => 'BLOCK-LEVEL DATA STORAGE SECURITY SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/835185
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 14947
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13835185
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/835185 | Block-level data storage security system | Mar 14, 2013 | Issued |
Array
(
[id] => 11179989
[patent_doc_number] => 09411983
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-09
[patent_title] => 'Apparatus and method to protect digital content'
[patent_app_type] => utility
[patent_app_number] => 13/833119
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9862
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13833119
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/833119 | Apparatus and method to protect digital content | Mar 14, 2013 | Issued |
Array
(
[id] => 9424146
[patent_doc_number] => 20140108797
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-17
[patent_title] => 'STORAGE COMMUNITIES OF INTEREST USING CRYPTOGRAPHIC SPLITTING'
[patent_app_type] => utility
[patent_app_number] => 13/834852
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 20231
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13834852
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/834852 | STORAGE COMMUNITIES OF INTEREST USING CRYPTOGRAPHIC SPLITTING | Mar 14, 2013 | Abandoned |
Array
(
[id] => 9424145
[patent_doc_number] => 20140108796
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-17
[patent_title] => 'STORAGE OF CRYPTOGRAPHICALLY-SPLIT DATA BLOCKS AT GEOGRAPHICALLY-SEPARATED LOCATIONS'
[patent_app_type] => utility
[patent_app_number] => 13/834113
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 25324
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13834113
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/834113 | STORAGE OF CRYPTOGRAPHICALLY-SPLIT DATA BLOCKS AT GEOGRAPHICALLY-SEPARATED LOCATIONS | Mar 14, 2013 | Abandoned |
Array
(
[id] => 9871563
[patent_doc_number] => 08959356
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-17
[patent_title] => 'Double authentication for controlling disruptive operations on storage resources'
[patent_app_type] => utility
[patent_app_number] => 13/837454
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4472
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13837454
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/837454 | Double authentication for controlling disruptive operations on storage resources | Mar 14, 2013 | Issued |
Array
(
[id] => 9747371
[patent_doc_number] => 20140283091
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'DIFFERENTIALLY PRIVATE LINEAR QUERIES ON HISTOGRAMS'
[patent_app_type] => utility
[patent_app_number] => 13/831948
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6124
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13831948
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/831948 | Differentially private linear queries on histograms | Mar 14, 2013 | Issued |
Array
(
[id] => 8978970
[patent_doc_number] => 20130212400
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-15
[patent_title] => 'DOUBLE AUTHENTICATION FOR CONTROLLING DISRUPTIVE OPERATIONS ON STORAGE RESOURCES'
[patent_app_type] => utility
[patent_app_number] => 13/837127
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4474
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13837127
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/837127 | Double authentication for controlling disruptive operations on storage resources | Mar 14, 2013 | Issued |
Array
(
[id] => 8991891
[patent_doc_number] => 20130219172
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-22
[patent_title] => 'SYSTEM AND METHOD FOR PROVIDING A SECURE BOOK DEVICE USING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS SECURE NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 13/830988
[patent_app_country] => US
[patent_app_date] => 2013-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 17550
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13830988
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/830988 | SYSTEM AND METHOD FOR PROVIDING A SECURE BOOK DEVICE USING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS SECURE NETWORKS | Mar 13, 2013 | Abandoned |
Array
(
[id] => 9451706
[patent_doc_number] => 20140122876
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-01
[patent_title] => 'SYSTEM AND METHOD FOR PROVIDING A SECURE BOOK DEVICE USING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS SECURE NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 13/830879
[patent_app_country] => US
[patent_app_date] => 2013-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 17534
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13830879
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/830879 | SYSTEM AND METHOD FOR PROVIDING A SECURE BOOK DEVICE USING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS SECURE NETWORKS | Mar 13, 2013 | Abandoned |
Array
(
[id] => 11538802
[patent_doc_number] => 09613212
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-04
[patent_title] => 'Execution profile assembly using branch records'
[patent_app_type] => utility
[patent_app_number] => 14/129245
[patent_app_country] => US
[patent_app_date] => 2013-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7072
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14129245
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/129245 | Execution profile assembly using branch records | Mar 4, 2013 | Issued |
Array
(
[id] => 9688245
[patent_doc_number] => 20140245010
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-28
[patent_title] => 'DEVICE AND AUTHENTICATION METHOD THEREFOR'
[patent_app_type] => utility
[patent_app_number] => 13/775527
[patent_app_country] => US
[patent_app_date] => 2013-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 43
[patent_figures_cnt] => 43
[patent_no_of_words] => 26911
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13775527
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/775527 | DEVICE AND AUTHENTICATION METHOD THEREFOR | Feb 24, 2013 | Abandoned |
Array
(
[id] => 10901800
[patent_doc_number] => 08925046
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-30
[patent_title] => 'Device, method, and recording medium'
[patent_app_type] => utility
[patent_app_number] => 13/775707
[patent_app_country] => US
[patent_app_date] => 2013-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 15234
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13775707
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/775707 | Device, method, and recording medium | Feb 24, 2013 | Issued |