Search

Kimberly R. Jordan

Examiner (ID: 14382)

Most Active Art Unit
1205
Art Unit(s)
1617, 1614, 1205, 2899
Total Applications
742
Issued Applications
500
Pending Applications
101
Abandoned Applications
141

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9618570 [patent_doc_number] => 20140208426 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-24 [patent_title] => 'SYSTEMS AND METHODS FOR DYNAMIC CLOUD-BASED MALWARE BEHAVIOR ANALYSIS' [patent_app_type] => utility [patent_app_number] => 14/225557 [patent_app_country] => US [patent_app_date] => 2014-03-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 28 [patent_figures_cnt] => 28 [patent_no_of_words] => 15208 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14225557 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/225557
Systems and methods for dynamic cloud-based malware behavior analysis Mar 25, 2014 Issued
Array ( [id] => 11253995 [patent_doc_number] => 09479514 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-10-25 [patent_title] => 'Method and system for controlling access to wireless apparatuses' [patent_app_type] => utility [patent_app_number] => 14/901666 [patent_app_country] => US [patent_app_date] => 2014-03-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 8406 [patent_no_of_claims] => 41 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 49 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14901666 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/901666
Method and system for controlling access to wireless apparatuses Mar 17, 2014 Issued
Array ( [id] => 11905159 [patent_doc_number] => 09774611 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-09-26 [patent_title] => 'Dynamically deploying a network traffic filter' [patent_app_type] => utility [patent_app_number] => 14/204864 [patent_app_country] => US [patent_app_date] => 2014-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10262 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 327 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14204864 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/204864
Dynamically deploying a network traffic filter Mar 10, 2014 Issued
Array ( [id] => 11294785 [patent_doc_number] => 20160344717 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-11-24 [patent_title] => 'COMMUNICATING BETWEEN A CLUSTER AND A NODE EXTERNAL TO THE CLUSTER' [patent_app_type] => utility [patent_app_number] => 15/114507 [patent_app_country] => US [patent_app_date] => 2014-01-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 2679 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15114507 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/114507
COMMUNICATING BETWEEN A CLUSTER AND A NODE EXTERNAL TO THE CLUSTER Jan 30, 2014 Abandoned
Array ( [id] => 9493150 [patent_doc_number] => 20140143556 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-05-22 [patent_title] => 'Meta-Complete Data Storage' [patent_app_type] => utility [patent_app_number] => 14/164823 [patent_app_country] => US [patent_app_date] => 2014-01-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7216 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14164823 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/164823
Meta-complete data storage Jan 26, 2014 Issued
Array ( [id] => 9452105 [patent_doc_number] => 20140123275 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-05-01 [patent_title] => 'SYSTEM AND METHOD FOR DISABLING SECURE ACCESS TO AN ELECTRONIC DEVICE USING DETECTION OF A PREDETERMINED DEVICE ORIENTATION' [patent_app_type] => utility [patent_app_number] => 14/150422 [patent_app_country] => US [patent_app_date] => 2014-01-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8332 [patent_no_of_claims] => 45 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14150422 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/150422
System and method for disabling secure access to an electronic device using detection of a predetermined device orientation Jan 7, 2014 Issued
Array ( [id] => 11445491 [patent_doc_number] => 20170046513 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-02-16 [patent_title] => 'FIRMWARE AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 15/114101 [patent_app_country] => US [patent_app_date] => 2013-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3540 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15114101 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/114101
FIRMWARE AUTHENTICATION Dec 15, 2013 Abandoned
Array ( [id] => 9853003 [patent_doc_number] => 08954750 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-02-10 [patent_title] => 'Secure PIN entry device' [patent_app_type] => utility [patent_app_number] => 14/088756 [patent_app_country] => US [patent_app_date] => 2013-11-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6211 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 151 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14088756 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/088756
Secure PIN entry device Nov 24, 2013 Issued
Array ( [id] => 10465204 [patent_doc_number] => 20150350219 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-03 [patent_title] => 'PROFILE CHANGE MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 14/648311 [patent_app_country] => US [patent_app_date] => 2013-11-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 4753 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14648311 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/648311
PROFILE CHANGE MANAGEMENT Nov 18, 2013 Abandoned
Array ( [id] => 10112859 [patent_doc_number] => 09148283 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-09-29 [patent_title] => 'Storing encrypted objects' [patent_app_type] => utility [patent_app_number] => 14/067162 [patent_app_country] => US [patent_app_date] => 2013-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 13195 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 287 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14067162 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/067162
Storing encrypted objects Oct 29, 2013 Issued
Array ( [id] => 10596361 [patent_doc_number] => 09317449 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-04-19 [patent_title] => 'Secure key access with one-time programmable memory and applications thereof' [patent_app_type] => utility [patent_app_number] => 14/048391 [patent_app_country] => US [patent_app_date] => 2013-10-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 19 [patent_no_of_words] => 10739 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 121 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14048391 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/048391
Secure key access with one-time programmable memory and applications thereof Oct 7, 2013 Issued
Array ( [id] => 16774973 [patent_doc_number] => 10986103 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-04-20 [patent_title] => Signal tokens indicative of malware [patent_app_type] => utility [patent_app_number] => 14/905496 [patent_app_country] => US [patent_app_date] => 2013-07-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 4561 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 145 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14905496 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/905496
Signal tokens indicative of malware Jul 30, 2013 Issued
Array ( [id] => 10119413 [patent_doc_number] => 09154310 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-10-06 [patent_title] => 'Resilient device authentication system' [patent_app_type] => utility [patent_app_number] => 13/947071 [patent_app_country] => US [patent_app_date] => 2013-07-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 14 [patent_no_of_words] => 4795 [patent_no_of_claims] => 36 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 147 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13947071 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/947071
Resilient device authentication system Jul 20, 2013 Issued
Array ( [id] => 12967366 [patent_doc_number] => 09875351 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-01-23 [patent_title] => Methods, apparatuses, and computer program products for hiding access to information in an image [patent_app_type] => utility [patent_app_number] => 14/904024 [patent_app_country] => US [patent_app_date] => 2013-07-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 14258 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 211 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14904024 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/904024
Methods, apparatuses, and computer program products for hiding access to information in an image Jul 15, 2013 Issued
Array ( [id] => 10557904 [patent_doc_number] => 09282113 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-03-08 [patent_title] => 'Denial of service (DoS) attack detection systems and methods' [patent_app_type] => utility [patent_app_number] => 13/929020 [patent_app_country] => US [patent_app_date] => 2013-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 15 [patent_no_of_words] => 9130 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 324 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13929020 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/929020
Denial of service (DoS) attack detection systems and methods Jun 26, 2013 Issued
Array ( [id] => 11208991 [patent_doc_number] => 09438626 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-09-06 [patent_title] => 'Risk scoring for internet protocol networks' [patent_app_type] => utility [patent_app_number] => 13/920500 [patent_app_country] => US [patent_app_date] => 2013-06-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 6 [patent_no_of_words] => 5941 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 305 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13920500 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/920500
Risk scoring for internet protocol networks Jun 17, 2013 Issued
Array ( [id] => 10970125 [patent_doc_number] => 20140373158 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-18 [patent_title] => 'DETECTING SECURITY VULNERABILITIES ON COMPUTING DEVICES' [patent_app_type] => utility [patent_app_number] => 13/920540 [patent_app_country] => US [patent_app_date] => 2013-06-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3331 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13920540 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/920540
DETECTING SECURITY VULNERABILITIES ON COMPUTING DEVICES Jun 17, 2013 Abandoned
Array ( [id] => 10584820 [patent_doc_number] => 09306957 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-04-05 [patent_title] => 'Proactive security system for distributed computer networks' [patent_app_type] => utility [patent_app_number] => 13/918274 [patent_app_country] => US [patent_app_date] => 2013-06-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3693 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 193 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13918274 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/918274
Proactive security system for distributed computer networks Jun 13, 2013 Issued
Array ( [id] => 10970094 [patent_doc_number] => 20140373127 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-18 [patent_title] => 'METHOD FOR DOMAIN CONTROL VALIDATION' [patent_app_type] => utility [patent_app_number] => 13/918699 [patent_app_country] => US [patent_app_date] => 2013-06-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6097 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13918699 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/918699
Method for domain control validation Jun 13, 2013 Issued
Array ( [id] => 11266869 [patent_doc_number] => 09491185 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-11-08 [patent_title] => 'Proactive containment of network security attacks' [patent_app_type] => utility [patent_app_number] => 13/893007 [patent_app_country] => US [patent_app_date] => 2013-05-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2719 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13893007 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/893007
Proactive containment of network security attacks May 12, 2013 Issued
Menu