
Kimberly R. Jordan
Examiner (ID: 14382)
| Most Active Art Unit | 1205 |
| Art Unit(s) | 1617, 1614, 1205, 2899 |
| Total Applications | 742 |
| Issued Applications | 500 |
| Pending Applications | 101 |
| Abandoned Applications | 141 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12182558
[patent_doc_number] => 20180041495
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-08
[patent_title] => 'Technique for Handling Accesses of User Equipments'
[patent_app_type] => utility
[patent_app_number] => 15/554137
[patent_app_country] => US
[patent_app_date] => 2015-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6868
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15554137
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/554137 | Technique for handling accesses of user equipments | Mar 9, 2015 | Issued |
Array
(
[id] => 11496311
[patent_doc_number] => 20170070496
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-09
[patent_title] => 'METHOD FOR SUPPLYING PROTECTED MULTIMEDIA CONTENT TO A TERMINAL'
[patent_app_type] => utility
[patent_app_number] => 15/122764
[patent_app_country] => US
[patent_app_date] => 2015-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8765
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15122764
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/122764 | Method for supplying protected multimedia content to a terminal | Feb 19, 2015 | Issued |
Array
(
[id] => 11285574
[patent_doc_number] => 09501429
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-22
[patent_title] => 'Dynamic key and rule storage protection'
[patent_app_type] => utility
[patent_app_number] => 14/614806
[patent_app_country] => US
[patent_app_date] => 2015-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 32
[patent_no_of_words] => 17921
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14614806
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/614806 | Dynamic key and rule storage protection | Feb 4, 2015 | Issued |
Array
(
[id] => 10808587
[patent_doc_number] => 20160154744
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-02
[patent_title] => 'PROVISIONING OF SECURE STORAGE FOR BOTH STATIC AND DYNAMIC RULES FOR CRYPTOGRAPHIC KEY INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 14/614797
[patent_app_country] => US
[patent_app_date] => 2015-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 17917
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14614797
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/614797 | Provisioning of secure storage for both static and dynamic rules for cryptographic key information | Feb 4, 2015 | Issued |
Array
(
[id] => 11680625
[patent_doc_number] => 09679157
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-13
[patent_title] => 'Limiting exposure to compliance and risk in a cloud environment'
[patent_app_type] => utility
[patent_app_number] => 14/591578
[patent_app_country] => US
[patent_app_date] => 2015-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6005
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14591578
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/591578 | Limiting exposure to compliance and risk in a cloud environment | Jan 6, 2015 | Issued |
Array
(
[id] => 11863062
[patent_doc_number] => 09742765
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-22
[patent_title] => 'Authentication system and authentication method'
[patent_app_type] => utility
[patent_app_number] => 14/591390
[patent_app_country] => US
[patent_app_date] => 2015-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 14445
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 332
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14591390
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/591390 | Authentication system and authentication method | Jan 6, 2015 | Issued |
Array
(
[id] => 11540397
[patent_doc_number] => 09614828
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-04-04
[patent_title] => 'Native authentication experience with failover'
[patent_app_type] => utility
[patent_app_number] => 14/589534
[patent_app_country] => US
[patent_app_date] => 2015-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 8996
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14589534
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/589534 | Native authentication experience with failover | Jan 4, 2015 | Issued |
Array
(
[id] => 10258476
[patent_doc_number] => 20150143473
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-21
[patent_title] => 'ELECTRONIC DEVICE AND METHOD FOR UPDATING AUTHENTICATION INFORMATION IN THE ELECTRONIC DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/542752
[patent_app_country] => US
[patent_app_date] => 2014-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7997
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14542752
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/542752 | Electronic device and method for updating authentication information in the electronic device | Nov 16, 2014 | Issued |
Array
(
[id] => 11247475
[patent_doc_number] => 09473531
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-18
[patent_title] => 'Endpoint traffic profiling for early detection of malware spread'
[patent_app_type] => utility
[patent_app_number] => 14/542693
[patent_app_country] => US
[patent_app_date] => 2014-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6254
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 467
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14542693
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/542693 | Endpoint traffic profiling for early detection of malware spread | Nov 16, 2014 | Issued |
Array
(
[id] => 10796248
[patent_doc_number] => 20160142405
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-19
[patent_title] => 'AUTHENTICATING A DEVICE BASED ON AVAILABILITY OF OTHER AUTHENTICATION METHODS'
[patent_app_type] => utility
[patent_app_number] => 14/542706
[patent_app_country] => US
[patent_app_date] => 2014-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8330
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14542706
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/542706 | Authenticating a device based on availability of other authentication methods | Nov 16, 2014 | Issued |
Array
(
[id] => 10287291
[patent_doc_number] => 20150172289
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-18
[patent_title] => 'APPARATUS AND METHOD FOR IDENTIFYING ROGUE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/540384
[patent_app_country] => US
[patent_app_date] => 2014-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5057
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14540384
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/540384 | Apparatus and method for identifying rogue device | Nov 12, 2014 | Issued |
Array
(
[id] => 10794178
[patent_doc_number] => 20160140334
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-19
[patent_title] => 'Device Functionality Access Control Using Unique Device Credentials'
[patent_app_type] => utility
[patent_app_number] => 14/540784
[patent_app_country] => US
[patent_app_date] => 2014-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6889
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14540784
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/540784 | Device functionality access control using unique device credentials | Nov 12, 2014 | Issued |
Array
(
[id] => 11279066
[patent_doc_number] => 09495545
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-15
[patent_title] => 'Automatically generate attributes and access policies for securely processing outsourced audit data using attribute-based encryption'
[patent_app_type] => utility
[patent_app_number] => 14/540205
[patent_app_country] => US
[patent_app_date] => 2014-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7153
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 308
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14540205
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/540205 | Automatically generate attributes and access policies for securely processing outsourced audit data using attribute-based encryption | Nov 12, 2014 | Issued |
Array
(
[id] => 11917577
[patent_doc_number] => 09785765
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-10
[patent_title] => 'Systems and methods for differential access control based on secrets'
[patent_app_type] => utility
[patent_app_number] => 14/540491
[patent_app_country] => US
[patent_app_date] => 2014-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5885
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 342
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14540491
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/540491 | Systems and methods for differential access control based on secrets | Nov 12, 2014 | Issued |
Array
(
[id] => 11701003
[patent_doc_number] => 09690919
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-27
[patent_title] => 'Allowing access to applications based on user capacitance'
[patent_app_type] => utility
[patent_app_number] => 14/540011
[patent_app_country] => US
[patent_app_date] => 2014-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 14725
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 285
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14540011
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/540011 | Allowing access to applications based on user capacitance | Nov 11, 2014 | Issued |
Array
(
[id] => 10688529
[patent_doc_number] => 20160034674
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'ALLOWING ACCESS TO APPLICATIONS BASED ON USER HANDLING MEASUREMENTS'
[patent_app_type] => utility
[patent_app_number] => 14/540016
[patent_app_country] => US
[patent_app_date] => 2014-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 14725
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14540016
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/540016 | Allowing access to applications based on user handling measurements | Nov 11, 2014 | Issued |
Array
(
[id] => 10688533
[patent_doc_number] => 20160034678
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'ALLOWING ACCESS TO APPLICATIONS BASED ON CAPTURED IMAGES'
[patent_app_type] => utility
[patent_app_number] => 14/540020
[patent_app_country] => US
[patent_app_date] => 2014-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 14725
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14540020
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/540020 | Allowing access to applications based on captured images | Nov 11, 2014 | Issued |
Array
(
[id] => 11208930
[patent_doc_number] => 09438565
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-06
[patent_title] => 'Cloud service security broker and proxy'
[patent_app_type] => utility
[patent_app_number] => 14/539980
[patent_app_country] => US
[patent_app_date] => 2014-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 11184
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14539980
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/539980 | Cloud service security broker and proxy | Nov 11, 2014 | Issued |
Array
(
[id] => 11228299
[patent_doc_number] => 09456027
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-27
[patent_title] => 'Methods, secure element, server, computer programs and computer program products for improved application management'
[patent_app_type] => utility
[patent_app_number] => 14/512673
[patent_app_country] => US
[patent_app_date] => 2014-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 7375
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14512673
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/512673 | Methods, secure element, server, computer programs and computer program products for improved application management | Oct 12, 2014 | Issued |
Array
(
[id] => 10119594
[patent_doc_number] => 09154492
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-06
[patent_title] => 'Moving target defense against cross-site scripting'
[patent_app_type] => utility
[patent_app_number] => 14/497562
[patent_app_country] => US
[patent_app_date] => 2014-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 10438
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14497562
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/497562 | Moving target defense against cross-site scripting | Sep 25, 2014 | Issued |