
Kimberly R. Jordan
Examiner (ID: 14382)
| Most Active Art Unit | 1205 |
| Art Unit(s) | 1617, 1614, 1205, 2899 |
| Total Applications | 742 |
| Issued Applications | 500 |
| Pending Applications | 101 |
| Abandoned Applications | 141 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9618570
[patent_doc_number] => 20140208426
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-24
[patent_title] => 'SYSTEMS AND METHODS FOR DYNAMIC CLOUD-BASED MALWARE BEHAVIOR ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 14/225557
[patent_app_country] => US
[patent_app_date] => 2014-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 15208
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14225557
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/225557 | Systems and methods for dynamic cloud-based malware behavior analysis | Mar 25, 2014 | Issued |
Array
(
[id] => 11253995
[patent_doc_number] => 09479514
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-25
[patent_title] => 'Method and system for controlling access to wireless apparatuses'
[patent_app_type] => utility
[patent_app_number] => 14/901666
[patent_app_country] => US
[patent_app_date] => 2014-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8406
[patent_no_of_claims] => 41
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 49
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14901666
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/901666 | Method and system for controlling access to wireless apparatuses | Mar 17, 2014 | Issued |
Array
(
[id] => 11905159
[patent_doc_number] => 09774611
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-09-26
[patent_title] => 'Dynamically deploying a network traffic filter'
[patent_app_type] => utility
[patent_app_number] => 14/204864
[patent_app_country] => US
[patent_app_date] => 2014-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10262
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 327
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14204864
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/204864 | Dynamically deploying a network traffic filter | Mar 10, 2014 | Issued |
Array
(
[id] => 11294785
[patent_doc_number] => 20160344717
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-24
[patent_title] => 'COMMUNICATING BETWEEN A CLUSTER AND A NODE EXTERNAL TO THE CLUSTER'
[patent_app_type] => utility
[patent_app_number] => 15/114507
[patent_app_country] => US
[patent_app_date] => 2014-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 2679
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15114507
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/114507 | COMMUNICATING BETWEEN A CLUSTER AND A NODE EXTERNAL TO THE CLUSTER | Jan 30, 2014 | Abandoned |
Array
(
[id] => 9493150
[patent_doc_number] => 20140143556
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-22
[patent_title] => 'Meta-Complete Data Storage'
[patent_app_type] => utility
[patent_app_number] => 14/164823
[patent_app_country] => US
[patent_app_date] => 2014-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7216
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14164823
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/164823 | Meta-complete data storage | Jan 26, 2014 | Issued |
Array
(
[id] => 9452105
[patent_doc_number] => 20140123275
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-01
[patent_title] => 'SYSTEM AND METHOD FOR DISABLING SECURE ACCESS TO AN ELECTRONIC DEVICE USING DETECTION OF A PREDETERMINED DEVICE ORIENTATION'
[patent_app_type] => utility
[patent_app_number] => 14/150422
[patent_app_country] => US
[patent_app_date] => 2014-01-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8332
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14150422
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/150422 | System and method for disabling secure access to an electronic device using detection of a predetermined device orientation | Jan 7, 2014 | Issued |
Array
(
[id] => 11445491
[patent_doc_number] => 20170046513
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'FIRMWARE AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 15/114101
[patent_app_country] => US
[patent_app_date] => 2013-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3540
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15114101
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/114101 | FIRMWARE AUTHENTICATION | Dec 15, 2013 | Abandoned |
Array
(
[id] => 9853003
[patent_doc_number] => 08954750
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-10
[patent_title] => 'Secure PIN entry device'
[patent_app_type] => utility
[patent_app_number] => 14/088756
[patent_app_country] => US
[patent_app_date] => 2013-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6211
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14088756
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/088756 | Secure PIN entry device | Nov 24, 2013 | Issued |
Array
(
[id] => 10465204
[patent_doc_number] => 20150350219
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'PROFILE CHANGE MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 14/648311
[patent_app_country] => US
[patent_app_date] => 2013-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4753
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14648311
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/648311 | PROFILE CHANGE MANAGEMENT | Nov 18, 2013 | Abandoned |
Array
(
[id] => 10112859
[patent_doc_number] => 09148283
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-29
[patent_title] => 'Storing encrypted objects'
[patent_app_type] => utility
[patent_app_number] => 14/067162
[patent_app_country] => US
[patent_app_date] => 2013-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13195
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 287
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14067162
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/067162 | Storing encrypted objects | Oct 29, 2013 | Issued |
Array
(
[id] => 10596361
[patent_doc_number] => 09317449
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-19
[patent_title] => 'Secure key access with one-time programmable memory and applications thereof'
[patent_app_type] => utility
[patent_app_number] => 14/048391
[patent_app_country] => US
[patent_app_date] => 2013-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 19
[patent_no_of_words] => 10739
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14048391
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/048391 | Secure key access with one-time programmable memory and applications thereof | Oct 7, 2013 | Issued |
Array
(
[id] => 16774973
[patent_doc_number] => 10986103
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-20
[patent_title] => Signal tokens indicative of malware
[patent_app_type] => utility
[patent_app_number] => 14/905496
[patent_app_country] => US
[patent_app_date] => 2013-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 4561
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14905496
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/905496 | Signal tokens indicative of malware | Jul 30, 2013 | Issued |
Array
(
[id] => 10119413
[patent_doc_number] => 09154310
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-10-06
[patent_title] => 'Resilient device authentication system'
[patent_app_type] => utility
[patent_app_number] => 13/947071
[patent_app_country] => US
[patent_app_date] => 2013-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 14
[patent_no_of_words] => 4795
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13947071
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/947071 | Resilient device authentication system | Jul 20, 2013 | Issued |
Array
(
[id] => 12967366
[patent_doc_number] => 09875351
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-23
[patent_title] => Methods, apparatuses, and computer program products for hiding access to information in an image
[patent_app_type] => utility
[patent_app_number] => 14/904024
[patent_app_country] => US
[patent_app_date] => 2013-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 14258
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14904024
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/904024 | Methods, apparatuses, and computer program products for hiding access to information in an image | Jul 15, 2013 | Issued |
Array
(
[id] => 10557904
[patent_doc_number] => 09282113
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-08
[patent_title] => 'Denial of service (DoS) attack detection systems and methods'
[patent_app_type] => utility
[patent_app_number] => 13/929020
[patent_app_country] => US
[patent_app_date] => 2013-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 15
[patent_no_of_words] => 9130
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 324
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13929020
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/929020 | Denial of service (DoS) attack detection systems and methods | Jun 26, 2013 | Issued |
Array
(
[id] => 11208991
[patent_doc_number] => 09438626
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-09-06
[patent_title] => 'Risk scoring for internet protocol networks'
[patent_app_type] => utility
[patent_app_number] => 13/920500
[patent_app_country] => US
[patent_app_date] => 2013-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 5941
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 305
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13920500
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/920500 | Risk scoring for internet protocol networks | Jun 17, 2013 | Issued |
Array
(
[id] => 10970125
[patent_doc_number] => 20140373158
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-18
[patent_title] => 'DETECTING SECURITY VULNERABILITIES ON COMPUTING DEVICES'
[patent_app_type] => utility
[patent_app_number] => 13/920540
[patent_app_country] => US
[patent_app_date] => 2013-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3331
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13920540
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/920540 | DETECTING SECURITY VULNERABILITIES ON COMPUTING DEVICES | Jun 17, 2013 | Abandoned |
Array
(
[id] => 10584820
[patent_doc_number] => 09306957
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-05
[patent_title] => 'Proactive security system for distributed computer networks'
[patent_app_type] => utility
[patent_app_number] => 13/918274
[patent_app_country] => US
[patent_app_date] => 2013-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3693
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13918274
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/918274 | Proactive security system for distributed computer networks | Jun 13, 2013 | Issued |
Array
(
[id] => 10970094
[patent_doc_number] => 20140373127
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-18
[patent_title] => 'METHOD FOR DOMAIN CONTROL VALIDATION'
[patent_app_type] => utility
[patent_app_number] => 13/918699
[patent_app_country] => US
[patent_app_date] => 2013-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6097
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13918699
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/918699 | Method for domain control validation | Jun 13, 2013 | Issued |
Array
(
[id] => 11266869
[patent_doc_number] => 09491185
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-08
[patent_title] => 'Proactive containment of network security attacks'
[patent_app_type] => utility
[patent_app_number] => 13/893007
[patent_app_country] => US
[patent_app_date] => 2013-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2719
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13893007
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/893007 | Proactive containment of network security attacks | May 12, 2013 | Issued |