Search

Josnel Jeudy

Examiner (ID: 3768, Phone: (571)270-7476 , Office: P/2438 )

Most Active Art Unit
2438
Art Unit(s)
2438
Total Applications
882
Issued Applications
708
Pending Applications
58
Abandoned Applications
137

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 8589017 [patent_doc_number] => 20130007838 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-01-03 [patent_title] => 'COMMUNICATIONS SECURITY SYSTEMS' [patent_app_type] => utility [patent_app_number] => 13/533278 [patent_app_country] => US [patent_app_date] => 2012-06-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6326 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13533278 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/533278
Communications security systems Jun 25, 2012 Issued
Array ( [id] => 11345617 [patent_doc_number] => 09530026 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-12-27 [patent_title] => 'Privacy protection for participatory sensing system' [patent_app_type] => utility [patent_app_number] => 14/398183 [patent_app_country] => US [patent_app_date] => 2012-06-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 7810 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 182 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14398183 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/398183
Privacy protection for participatory sensing system Jun 7, 2012 Issued
Array ( [id] => 8404975 [patent_doc_number] => 20120237025 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-09-20 [patent_title] => 'DEVICE AND METHOD FOR DETERMINING AN INVERSE OF A VALUE RELATED TO A MODULUS' [patent_app_type] => utility [patent_app_number] => 13/483496 [patent_app_country] => US [patent_app_date] => 2012-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4680 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13483496 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/483496
Device and method for determining an inverse of a value related to a modulus May 29, 2012 Issued
Array ( [id] => 9532546 [patent_doc_number] => 08756432 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-06-17 [patent_title] => 'Systems and methods for detecting malicious digitally-signed applications' [patent_app_type] => utility [patent_app_number] => 13/477580 [patent_app_country] => US [patent_app_date] => 2012-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9331 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 316 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13477580 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/477580
Systems and methods for detecting malicious digitally-signed applications May 21, 2012 Issued
Array ( [id] => 9556057 [patent_doc_number] => 08763131 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-06-24 [patent_title] => 'Mobile application security score calculation' [patent_app_type] => utility [patent_app_number] => 13/477455 [patent_app_country] => US [patent_app_date] => 2012-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3533 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 311 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13477455 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/477455
Mobile application security score calculation May 21, 2012 Issued
Array ( [id] => 9049551 [patent_doc_number] => 08544110 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-09-24 [patent_title] => 'Sensitive data aliasing' [patent_app_type] => utility [patent_app_number] => 13/472279 [patent_app_country] => US [patent_app_date] => 2012-05-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6800 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 143 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13472279 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/472279
Sensitive data aliasing May 14, 2012 Issued
Array ( [id] => 8794626 [patent_doc_number] => 20130111595 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-05-02 [patent_title] => 'DETECTION OF DOM-BASED CROSS-SITE SCRIPTING VULNERABILITIES' [patent_app_type] => utility [patent_app_number] => 13/447904 [patent_app_country] => US [patent_app_date] => 2012-04-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4739 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13447904 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/447904
Detection of DOM-based cross-site scripting vulnerabilities Apr 15, 2012 Issued
Array ( [id] => 9527855 [patent_doc_number] => 08752146 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-06-10 [patent_title] => 'Providing authentication codes which include token codes and biometric factors' [patent_app_type] => utility [patent_app_number] => 13/434280 [patent_app_country] => US [patent_app_date] => 2012-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5443 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 169 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13434280 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/434280
Providing authentication codes which include token codes and biometric factors Mar 28, 2012 Issued
Array ( [id] => 9071513 [patent_doc_number] => 20130263269 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-10-03 [patent_title] => 'Controlling Anti-Virus Software Updates' [patent_app_type] => utility [patent_app_number] => 13/434002 [patent_app_country] => US [patent_app_date] => 2012-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4200 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 9 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13434002 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/434002
Controlling anti-virus software updates Mar 28, 2012 Issued
Array ( [id] => 8288803 [patent_doc_number] => 20120177127 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-07-12 [patent_title] => 'VIDEO ENCODING METHOD, AND VIDEO DECODING METHOD' [patent_app_type] => utility [patent_app_number] => 13/429538 [patent_app_country] => US [patent_app_date] => 2012-03-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 24 [patent_figures_cnt] => 24 [patent_no_of_words] => 14410 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 16 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13429538 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/429538
Video encoding method, and video decoding method Mar 25, 2012 Issued
Array ( [id] => 8303370 [patent_doc_number] => 20120185929 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-07-19 [patent_title] => 'INCORPORATING NETWORK CONNECTION SECURITY LEVELS INTO FIREWALL RULES' [patent_app_type] => utility [patent_app_number] => 13/427436 [patent_app_country] => US [patent_app_date] => 2012-03-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 10793 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13427436 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/427436
Incorporating network connection security levels into firewall rules Mar 21, 2012 Issued
Array ( [id] => 9853010 [patent_doc_number] => 08954756 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-02-10 [patent_title] => 'Systems and methods for transformation of logical data objects for storage' [patent_app_type] => utility [patent_app_number] => 13/397875 [patent_app_country] => US [patent_app_date] => 2012-02-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 21 [patent_no_of_words] => 19440 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13397875 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/397875
Systems and methods for transformation of logical data objects for storage Feb 15, 2012 Issued
Array ( [id] => 8230285 [patent_doc_number] => 20120144490 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-06-07 [patent_title] => 'MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS' [patent_app_type] => utility [patent_app_number] => 13/369225 [patent_app_country] => US [patent_app_date] => 2012-02-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6166 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13369225 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/369225
Malicious code infection cause-and-effect analysis Feb 7, 2012 Issued
Array ( [id] => 8223131 [patent_doc_number] => 20120137342 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-05-31 [patent_title] => 'MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS' [patent_app_type] => utility [patent_app_number] => 13/369243 [patent_app_country] => US [patent_app_date] => 2012-02-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6170 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13369243 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/369243
Malicious code infection cause-and-effect analysis Feb 7, 2012 Issued
Array ( [id] => 8757245 [patent_doc_number] => 20130091550 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-04-11 [patent_title] => 'SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO CONTENT DISTRIBUTED OVER A NETWORK' [patent_app_type] => utility [patent_app_number] => 13/359981 [patent_app_country] => US [patent_app_date] => 2012-01-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 9124 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13359981 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/359981
Systems and methods for controlling access to content distributed over a network Jan 26, 2012 Issued
Array ( [id] => 8610640 [patent_doc_number] => 20130015952 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-01-17 [patent_title] => 'Systems and Algorithms For Stateless Biometric Recognition' [patent_app_type] => utility [patent_app_number] => 13/352443 [patent_app_country] => US [patent_app_date] => 2012-01-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3708 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13352443 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/352443
Systems and algorithms for stateless biometric recognition Jan 17, 2012 Issued
Array ( [id] => 9853376 [patent_doc_number] => 08955125 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-02-10 [patent_title] => 'Snoop echo response extractor' [patent_app_type] => utility [patent_app_number] => 13/306794 [patent_app_country] => US [patent_app_date] => 2011-11-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 10 [patent_no_of_words] => 4813 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 22 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13306794 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/306794
Snoop echo response extractor Nov 28, 2011 Issued
Array ( [id] => 9379310 [patent_doc_number] => 08683596 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-03-25 [patent_title] => 'Detection of DOM-based cross-site scripting vulnerabilities' [patent_app_type] => utility [patent_app_number] => 13/283989 [patent_app_country] => US [patent_app_date] => 2011-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4644 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 142 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13283989 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/283989
Detection of DOM-based cross-site scripting vulnerabilities Oct 27, 2011 Issued
Array ( [id] => 11252014 [patent_doc_number] => 09477517 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-10-25 [patent_title] => 'Service broker systems, methods, and apparatus' [patent_app_type] => utility [patent_app_number] => 13/284057 [patent_app_country] => US [patent_app_date] => 2011-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 10 [patent_no_of_words] => 8681 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 123 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13284057 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/284057
Service broker systems, methods, and apparatus Oct 27, 2011 Issued
Array ( [id] => 9611989 [patent_doc_number] => 08789179 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-07-22 [patent_title] => 'Cloud protection techniques' [patent_app_type] => utility [patent_app_number] => 13/284194 [patent_app_country] => US [patent_app_date] => 2011-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4609 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 164 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13284194 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/284194
Cloud protection techniques Oct 27, 2011 Issued
Menu