
Josnel Jeudy
Examiner (ID: 3768, Phone: (571)270-7476 , Office: P/2438 )
| Most Active Art Unit | 2438 |
| Art Unit(s) | 2438 |
| Total Applications | 882 |
| Issued Applications | 708 |
| Pending Applications | 58 |
| Abandoned Applications | 137 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 8589017
[patent_doc_number] => 20130007838
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-03
[patent_title] => 'COMMUNICATIONS SECURITY SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 13/533278
[patent_app_country] => US
[patent_app_date] => 2012-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6326
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13533278
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/533278 | Communications security systems | Jun 25, 2012 | Issued |
Array
(
[id] => 11345617
[patent_doc_number] => 09530026
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-12-27
[patent_title] => 'Privacy protection for participatory sensing system'
[patent_app_type] => utility
[patent_app_number] => 14/398183
[patent_app_country] => US
[patent_app_date] => 2012-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 7810
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14398183
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/398183 | Privacy protection for participatory sensing system | Jun 7, 2012 | Issued |
Array
(
[id] => 8404975
[patent_doc_number] => 20120237025
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-09-20
[patent_title] => 'DEVICE AND METHOD FOR DETERMINING AN INVERSE OF A VALUE RELATED TO A MODULUS'
[patent_app_type] => utility
[patent_app_number] => 13/483496
[patent_app_country] => US
[patent_app_date] => 2012-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4680
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13483496
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/483496 | Device and method for determining an inverse of a value related to a modulus | May 29, 2012 | Issued |
Array
(
[id] => 9532546
[patent_doc_number] => 08756432
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-06-17
[patent_title] => 'Systems and methods for detecting malicious digitally-signed applications'
[patent_app_type] => utility
[patent_app_number] => 13/477580
[patent_app_country] => US
[patent_app_date] => 2012-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9331
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 316
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13477580
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/477580 | Systems and methods for detecting malicious digitally-signed applications | May 21, 2012 | Issued |
Array
(
[id] => 9556057
[patent_doc_number] => 08763131
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-06-24
[patent_title] => 'Mobile application security score calculation'
[patent_app_type] => utility
[patent_app_number] => 13/477455
[patent_app_country] => US
[patent_app_date] => 2012-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3533
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 311
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13477455
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/477455 | Mobile application security score calculation | May 21, 2012 | Issued |
Array
(
[id] => 9049551
[patent_doc_number] => 08544110
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-09-24
[patent_title] => 'Sensitive data aliasing'
[patent_app_type] => utility
[patent_app_number] => 13/472279
[patent_app_country] => US
[patent_app_date] => 2012-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6800
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13472279
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/472279 | Sensitive data aliasing | May 14, 2012 | Issued |
Array
(
[id] => 8794626
[patent_doc_number] => 20130111595
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-02
[patent_title] => 'DETECTION OF DOM-BASED CROSS-SITE SCRIPTING VULNERABILITIES'
[patent_app_type] => utility
[patent_app_number] => 13/447904
[patent_app_country] => US
[patent_app_date] => 2012-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4739
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13447904
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/447904 | Detection of DOM-based cross-site scripting vulnerabilities | Apr 15, 2012 | Issued |
Array
(
[id] => 9527855
[patent_doc_number] => 08752146
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-06-10
[patent_title] => 'Providing authentication codes which include token codes and biometric factors'
[patent_app_type] => utility
[patent_app_number] => 13/434280
[patent_app_country] => US
[patent_app_date] => 2012-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5443
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13434280
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/434280 | Providing authentication codes which include token codes and biometric factors | Mar 28, 2012 | Issued |
Array
(
[id] => 9071513
[patent_doc_number] => 20130263269
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-03
[patent_title] => 'Controlling Anti-Virus Software Updates'
[patent_app_type] => utility
[patent_app_number] => 13/434002
[patent_app_country] => US
[patent_app_date] => 2012-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4200
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13434002
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/434002 | Controlling anti-virus software updates | Mar 28, 2012 | Issued |
Array
(
[id] => 8288803
[patent_doc_number] => 20120177127
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-07-12
[patent_title] => 'VIDEO ENCODING METHOD, AND VIDEO DECODING METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/429538
[patent_app_country] => US
[patent_app_date] => 2012-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 14410
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 16
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13429538
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/429538 | Video encoding method, and video decoding method | Mar 25, 2012 | Issued |
Array
(
[id] => 8303370
[patent_doc_number] => 20120185929
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-07-19
[patent_title] => 'INCORPORATING NETWORK CONNECTION SECURITY LEVELS INTO FIREWALL RULES'
[patent_app_type] => utility
[patent_app_number] => 13/427436
[patent_app_country] => US
[patent_app_date] => 2012-03-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10793
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13427436
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/427436 | Incorporating network connection security levels into firewall rules | Mar 21, 2012 | Issued |
Array
(
[id] => 9853010
[patent_doc_number] => 08954756
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-10
[patent_title] => 'Systems and methods for transformation of logical data objects for storage'
[patent_app_type] => utility
[patent_app_number] => 13/397875
[patent_app_country] => US
[patent_app_date] => 2012-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 21
[patent_no_of_words] => 19440
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13397875
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/397875 | Systems and methods for transformation of logical data objects for storage | Feb 15, 2012 | Issued |
Array
(
[id] => 8230285
[patent_doc_number] => 20120144490
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-07
[patent_title] => 'MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 13/369225
[patent_app_country] => US
[patent_app_date] => 2012-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6166
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13369225
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/369225 | Malicious code infection cause-and-effect analysis | Feb 7, 2012 | Issued |
Array
(
[id] => 8223131
[patent_doc_number] => 20120137342
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-31
[patent_title] => 'MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 13/369243
[patent_app_country] => US
[patent_app_date] => 2012-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6170
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13369243
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/369243 | Malicious code infection cause-and-effect analysis | Feb 7, 2012 | Issued |
Array
(
[id] => 8757245
[patent_doc_number] => 20130091550
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-11
[patent_title] => 'SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO CONTENT DISTRIBUTED OVER A NETWORK'
[patent_app_type] => utility
[patent_app_number] => 13/359981
[patent_app_country] => US
[patent_app_date] => 2012-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9124
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13359981
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/359981 | Systems and methods for controlling access to content distributed over a network | Jan 26, 2012 | Issued |
Array
(
[id] => 8610640
[patent_doc_number] => 20130015952
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-17
[patent_title] => 'Systems and Algorithms For Stateless Biometric Recognition'
[patent_app_type] => utility
[patent_app_number] => 13/352443
[patent_app_country] => US
[patent_app_date] => 2012-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3708
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13352443
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/352443 | Systems and algorithms for stateless biometric recognition | Jan 17, 2012 | Issued |
Array
(
[id] => 9853376
[patent_doc_number] => 08955125
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-10
[patent_title] => 'Snoop echo response extractor'
[patent_app_type] => utility
[patent_app_number] => 13/306794
[patent_app_country] => US
[patent_app_date] => 2011-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 10
[patent_no_of_words] => 4813
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 22
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13306794
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/306794 | Snoop echo response extractor | Nov 28, 2011 | Issued |
Array
(
[id] => 9379310
[patent_doc_number] => 08683596
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-25
[patent_title] => 'Detection of DOM-based cross-site scripting vulnerabilities'
[patent_app_type] => utility
[patent_app_number] => 13/283989
[patent_app_country] => US
[patent_app_date] => 2011-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4644
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13283989
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/283989 | Detection of DOM-based cross-site scripting vulnerabilities | Oct 27, 2011 | Issued |
Array
(
[id] => 11252014
[patent_doc_number] => 09477517
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-25
[patent_title] => 'Service broker systems, methods, and apparatus'
[patent_app_type] => utility
[patent_app_number] => 13/284057
[patent_app_country] => US
[patent_app_date] => 2011-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 8681
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13284057
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/284057 | Service broker systems, methods, and apparatus | Oct 27, 2011 | Issued |
Array
(
[id] => 9611989
[patent_doc_number] => 08789179
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-22
[patent_title] => 'Cloud protection techniques'
[patent_app_type] => utility
[patent_app_number] => 13/284194
[patent_app_country] => US
[patent_app_date] => 2011-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4609
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13284194
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/284194 | Cloud protection techniques | Oct 27, 2011 | Issued |