
Kimberly R. Jordan
Examiner (ID: 14382)
| Most Active Art Unit | 1205 |
| Art Unit(s) | 1617, 1614, 1205, 2899 |
| Total Applications | 742 |
| Issued Applications | 500 |
| Pending Applications | 101 |
| Abandoned Applications | 141 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9992655
[patent_doc_number] => 09037875
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-05-19
[patent_title] => 'Key generation techniques'
[patent_app_type] => utility
[patent_app_number] => 13/863122
[patent_app_country] => US
[patent_app_date] => 2013-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 6823
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13863122
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/863122 | Key generation techniques | Apr 14, 2013 | Issued |
Array
(
[id] => 9332891
[patent_doc_number] => 20140059673
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-27
[patent_title] => 'System and Method for Disabling Secure Access to an Electronic Device Using Detection of a Unique Motion'
[patent_app_type] => utility
[patent_app_number] => 13/840635
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8147
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13840635
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/840635 | System and method for enabling a camera used with an electronic device using detection of a unique motion | Mar 14, 2013 | Issued |
Array
(
[id] => 9452053
[patent_doc_number] => 20140123223
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-01
[patent_title] => 'Resilient Device Authentication System'
[patent_app_type] => utility
[patent_app_number] => 13/829826
[patent_app_country] => US
[patent_app_date] => 2013-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5037
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13829826
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/829826 | Resilient device authentication system | Mar 13, 2013 | Issued |
Array
(
[id] => 9556054
[patent_doc_number] => 08763128
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-06-24
[patent_title] => 'Apparatus and method for detecting malicious files'
[patent_app_type] => utility
[patent_app_number] => 13/777181
[patent_app_country] => US
[patent_app_date] => 2013-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7288
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13777181
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/777181 | Apparatus and method for detecting malicious files | Feb 25, 2013 | Issued |
Array
(
[id] => 10488019
[patent_doc_number] => 20150373040
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-24
[patent_title] => 'SHARING INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 14/764596
[patent_app_country] => US
[patent_app_date] => 2013-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9761
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14764596
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/764596 | SHARING INFORMATION | Jan 30, 2013 | Abandoned |
Array
(
[id] => 10166183
[patent_doc_number] => 09197422
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-24
[patent_title] => 'System and method for differential encryption'
[patent_app_type] => utility
[patent_app_number] => 13/748789
[patent_app_country] => US
[patent_app_date] => 2013-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 4448
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 470
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13748789
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/748789 | System and method for differential encryption | Jan 23, 2013 | Issued |
Array
(
[id] => 8941841
[patent_doc_number] => 20130191638
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-25
[patent_title] => 'SYSTEM AND METHOD FOR SECURE TWO-FACTOR AUTHENTICATED ID-BASED KEY EXCHANGE AND REMOTE LOGIN USING AN INSECURE TOKEN AND SIMPLE SECOND-FACTOR SUCH AS A PIN NUMBER'
[patent_app_type] => utility
[patent_app_number] => 13/749408
[patent_app_country] => US
[patent_app_date] => 2013-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3141
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13749408
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/749408 | System and method for secure two-factor authenticated ID-based key exchange and remote login using an insecure token and simple second-factor such as a PIN number | Jan 23, 2013 | Issued |
Array
(
[id] => 8941835
[patent_doc_number] => 20130191632
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-25
[patent_title] => 'SYSTEM AND METHOD FOR SECURING PRIVATE KEYS ISSUED FROM DISTRIBUTED PRIVATE KEY GENERATOR (D-PKG) NODES'
[patent_app_type] => utility
[patent_app_number] => 13/749398
[patent_app_country] => US
[patent_app_date] => 2013-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8486
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13749398
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/749398 | System and method for securing private keys issued from distributed private key generator (D-PKG) nodes | Jan 23, 2013 | Issued |
Array
(
[id] => 10112861
[patent_doc_number] => 09148285
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-09-29
[patent_title] => 'Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment'
[patent_app_type] => utility
[patent_app_number] => 13/745942
[patent_app_country] => US
[patent_app_date] => 2013-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4113
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13745942
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/745942 | Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment | Jan 20, 2013 | Issued |
Array
(
[id] => 10885536
[patent_doc_number] => 08909938
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-09
[patent_title] => 'System and method for providing secure access to an electronic device using facial biometrics'
[patent_app_type] => utility
[patent_app_number] => 13/722753
[patent_app_country] => US
[patent_app_date] => 2012-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5422
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13722753
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/722753 | System and method for providing secure access to an electronic device using facial biometrics | Dec 19, 2012 | Issued |
Array
(
[id] => 9941091
[patent_doc_number] => 08990926
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-03-24
[patent_title] => 'Method and apparatus for protecting a password of a computer having a non-volatile memory'
[patent_app_type] => utility
[patent_app_number] => 13/709938
[patent_app_country] => US
[patent_app_date] => 2012-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 10900
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13709938
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/709938 | Method and apparatus for protecting a password of a computer having a non-volatile memory | Dec 9, 2012 | Issued |
Array
(
[id] => 10133118
[patent_doc_number] => 09166969
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-20
[patent_title] => 'Session certificates'
[patent_app_type] => utility
[patent_app_number] => 13/706398
[patent_app_country] => US
[patent_app_date] => 2012-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8862
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 266
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13706398
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/706398 | Session certificates | Dec 5, 2012 | Issued |
Array
(
[id] => 8639808
[patent_doc_number] => 20130031611
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-31
[patent_title] => 'CLOUD-ENABLED WEB-ENTRY SYSTEM FOR VISITOR ACCESS CONTROL'
[patent_app_type] => utility
[patent_app_number] => 13/549409
[patent_app_country] => US
[patent_app_date] => 2012-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3138
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13549409
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/549409 | CLOUD-ENABLED WEB-ENTRY SYSTEM FOR VISITOR ACCESS CONTROL | Sep 26, 2012 | Abandoned |
Array
(
[id] => 10119579
[patent_doc_number] => 09154478
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-06
[patent_title] => 'Deterministic user authentication service for communication network'
[patent_app_type] => utility
[patent_app_number] => 13/618862
[patent_app_country] => US
[patent_app_date] => 2012-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 6404
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13618862
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/618862 | Deterministic user authentication service for communication network | Sep 13, 2012 | Issued |
Array
(
[id] => 8568981
[patent_doc_number] => 20120331552
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-12-27
[patent_title] => 'MALWARE AUTOMATED REMOVAL SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/602380
[patent_app_country] => US
[patent_app_date] => 2012-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3879
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13602380
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/602380 | Malware automated removal system and method | Sep 3, 2012 | Issued |
Array
(
[id] => 11686724
[patent_doc_number] => 09684772
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-20
[patent_title] => 'Information processing apparatus, information processing method and program'
[patent_app_type] => utility
[patent_app_number] => 13/556301
[patent_app_country] => US
[patent_app_date] => 2012-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 30
[patent_no_of_words] => 24513
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 301
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13556301
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/556301 | Information processing apparatus, information processing method and program | Jul 23, 2012 | Issued |
Array
(
[id] => 8636616
[patent_doc_number] => 20130028419
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-31
[patent_title] => 'SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY CRYPTOGRAPHIC COMMUNICATIONS'
[patent_app_type] => utility
[patent_app_number] => 13/557112
[patent_app_country] => US
[patent_app_date] => 2012-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5861
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13557112
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/557112 | SYSTEM AND A METHOD FOR USE IN A SYMMETRIC KEY CRYPTOGRAPHIC COMMUNICATIONS | Jul 23, 2012 | Abandoned |
Array
(
[id] => 8639809
[patent_doc_number] => 20130031612
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-31
[patent_title] => 'SERVER APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, AND STORAGE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 13/555974
[patent_app_country] => US
[patent_app_date] => 2012-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 7355
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13555974
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/555974 | SERVER APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, AND STORAGE MEDIUM | Jul 22, 2012 | Abandoned |
Array
(
[id] => 9271026
[patent_doc_number] => 20140025944
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-23
[patent_title] => 'Secure Storage and Signature'
[patent_app_type] => utility
[patent_app_number] => 13/553388
[patent_app_country] => US
[patent_app_date] => 2012-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10566
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13553388
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/553388 | Generating signatures using a secure device | Jul 18, 2012 | Issued |
Array
(
[id] => 8979212
[patent_doc_number] => 20130212642
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-15
[patent_title] => 'Resilient Device Authentication System'
[patent_app_type] => utility
[patent_app_number] => 13/552592
[patent_app_country] => US
[patent_app_date] => 2012-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4777
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13552592
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/552592 | Resilient Device Authentication System | Jul 17, 2012 | Abandoned |