
Kimberly R. Jordan
Examiner (ID: 14382)
| Most Active Art Unit | 1205 |
| Art Unit(s) | 1617, 1614, 1205, 2899 |
| Total Applications | 742 |
| Issued Applications | 500 |
| Pending Applications | 101 |
| Abandoned Applications | 141 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11711882
[patent_doc_number] => 20170180380
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-22
[patent_title] => 'NETWORK ACCESS SECURITY FOR INTERNET OF THINGS (IoT) DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/970848
[patent_app_country] => US
[patent_app_date] => 2015-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 11837
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14970848
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/970848 | Network access security for internet of things (IoT) devices | Dec 15, 2015 | Issued |
Array
(
[id] => 10766219
[patent_doc_number] => 20160112375
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-21
[patent_title] => 'METHOD AND SYSTEM FOR PROTECTING CLOUD-BASED APPLICATIONS EXECUTED IN A CLOUD COMPUTING PLATFORM'
[patent_app_type] => utility
[patent_app_number] => 14/968432
[patent_app_country] => US
[patent_app_date] => 2015-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 11236
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14968432
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/968432 | Method and system for protecting cloud-based applications executed in a cloud computing platform | Dec 13, 2015 | Issued |
Array
(
[id] => 10753656
[patent_doc_number] => 20160099808
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-07
[patent_title] => 'Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment'
[patent_app_type] => utility
[patent_app_number] => 14/966114
[patent_app_country] => US
[patent_app_date] => 2015-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4234
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14966114
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/966114 | Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment | Dec 10, 2015 | Issued |
Array
(
[id] => 14250763
[patent_doc_number] => 10275584
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-30
[patent_title] => Method and system for unlocking mobile terminal on the basis of a high-quality eyeprint image
[patent_app_type] => utility
[patent_app_number] => 15/107992
[patent_app_country] => US
[patent_app_date] => 2015-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3433
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 419
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15107992
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/107992 | Method and system for unlocking mobile terminal on the basis of a high-quality eyeprint image | Dec 7, 2015 | Issued |
Array
(
[id] => 11933596
[patent_doc_number] => 09800606
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-10-24
[patent_title] => 'Systems and methods for evaluating network security'
[patent_app_type] => utility
[patent_app_number] => 14/952410
[patent_app_country] => US
[patent_app_date] => 2015-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11242
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14952410
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/952410 | Systems and methods for evaluating network security | Nov 24, 2015 | Issued |
Array
(
[id] => 14556299
[patent_doc_number] => 10346611
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-07-09
[patent_title] => Detecting malicious software
[patent_app_type] => utility
[patent_app_number] => 14/952716
[patent_app_country] => US
[patent_app_date] => 2015-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5315
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14952716
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/952716 | Detecting malicious software | Nov 24, 2015 | Issued |
Array
(
[id] => 12039758
[patent_doc_number] => 09817992
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-11-14
[patent_title] => 'System and method for secure USIM wireless network access'
[patent_app_type] => utility
[patent_app_number] => 14/947257
[patent_app_country] => US
[patent_app_date] => 2015-11-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 10281
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 305
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14947257
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/947257 | System and method for secure USIM wireless network access | Nov 19, 2015 | Issued |
Array
(
[id] => 14335027
[patent_doc_number] => 10298547
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-21
[patent_title] => Systems, methods, and media for a cloud based social media network
[patent_app_type] => utility
[patent_app_number] => 14/936606
[patent_app_country] => US
[patent_app_date] => 2015-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 8695
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14936606
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/936606 | Systems, methods, and media for a cloud based social media network | Nov 8, 2015 | Issued |
Array
(
[id] => 10710812
[patent_doc_number] => 20160056959
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-25
[patent_title] => 'Key Management For Secure Communication'
[patent_app_type] => utility
[patent_app_number] => 14/927834
[patent_app_country] => US
[patent_app_date] => 2015-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6483
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14927834
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/927834 | Key management for secure communication | Oct 29, 2015 | Issued |
Array
(
[id] => 11882914
[patent_doc_number] => 09754088
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-05
[patent_title] => 'Information processing system, electronic device and service authorization method'
[patent_app_type] => utility
[patent_app_number] => 14/918772
[patent_app_country] => US
[patent_app_date] => 2015-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 20
[patent_no_of_words] => 10954
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 266
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14918772
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/918772 | Information processing system, electronic device and service authorization method | Oct 20, 2015 | Issued |
Array
(
[id] => 10779046
[patent_doc_number] => 20160125202
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-05
[patent_title] => 'Method for operating a control device'
[patent_app_type] => utility
[patent_app_number] => 14/884280
[patent_app_country] => US
[patent_app_date] => 2015-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4346
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14884280
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/884280 | Method for operating a control device | Oct 14, 2015 | Abandoned |
Array
(
[id] => 11558518
[patent_doc_number] => 20170104764
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-13
[patent_title] => 'FRAUD PREVENTION'
[patent_app_type] => utility
[patent_app_number] => 14/881316
[patent_app_country] => US
[patent_app_date] => 2015-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7187
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14881316
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/881316 | Fraud prevention | Oct 12, 2015 | Issued |
Array
(
[id] => 11558490
[patent_doc_number] => 20170104736
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-13
[patent_title] => 'SECURE DATA STORAGE ON A CLOUD ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/880455
[patent_app_country] => US
[patent_app_date] => 2015-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 14055
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14880455
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/880455 | Secure data storage on a cloud environment | Oct 11, 2015 | Issued |
Array
(
[id] => 11545455
[patent_doc_number] => 20170099280
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-06
[patent_title] => 'Single Sign-On Method for Appliance Secure Shell'
[patent_app_type] => utility
[patent_app_number] => 14/874173
[patent_app_country] => US
[patent_app_date] => 2015-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9321
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14874173
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/874173 | Single sign-on method for appliance secure shell | Oct 1, 2015 | Issued |
Array
(
[id] => 10682577
[patent_doc_number] => 20160028723
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-28
[patent_title] => 'METHOD FOR DOMAIN CONTROL VALIDATION'
[patent_app_type] => utility
[patent_app_number] => 14/873016
[patent_app_country] => US
[patent_app_date] => 2015-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6136
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14873016
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/873016 | Method for domain control validation | Sep 30, 2015 | Issued |
Array
(
[id] => 11863091
[patent_doc_number] => 09742795
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-08-22
[patent_title] => 'Mitigating network attacks'
[patent_app_type] => utility
[patent_app_number] => 14/864683
[patent_app_country] => US
[patent_app_date] => 2015-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 20437
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14864683
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/864683 | Mitigating network attacks | Sep 23, 2015 | Issued |
Array
(
[id] => 10666067
[patent_doc_number] => 20160012211
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-14
[patent_title] => 'TOKEN BASED DIGITAL CONTENT LICENSING METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/862208
[patent_app_country] => US
[patent_app_date] => 2015-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6931
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14862208
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/862208 | Token based digital content licensing method | Sep 22, 2015 | Issued |
Array
(
[id] => 10739826
[patent_doc_number] => 20160085977
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'TOKEN-BASED SCHEME FOR GRANTING PERMISSIONS'
[patent_app_type] => utility
[patent_app_number] => 14/858146
[patent_app_country] => US
[patent_app_date] => 2015-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10515
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14858146
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/858146 | Token-based scheme for granting permissions | Sep 17, 2015 | Issued |
Array
(
[id] => 11504115
[patent_doc_number] => 20170078299
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-16
[patent_title] => 'CONTROLLING ACCESS TO DATA'
[patent_app_type] => utility
[patent_app_number] => 14/851728
[patent_app_country] => US
[patent_app_date] => 2015-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8215
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14851728
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/851728 | Controlling access to data | Sep 10, 2015 | Issued |
Array
(
[id] => 11511111
[patent_doc_number] => 09602284
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-03-21
[patent_title] => 'Secure offline authentication'
[patent_app_type] => utility
[patent_app_number] => 14/852204
[patent_app_country] => US
[patent_app_date] => 2015-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3668
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14852204
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/852204 | Secure offline authentication | Sep 10, 2015 | Issued |