Search

Kimberly R. Jordan

Examiner (ID: 14382)

Most Active Art Unit
1205
Art Unit(s)
1617, 1614, 1205, 2899
Total Applications
742
Issued Applications
500
Pending Applications
101
Abandoned Applications
141

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 7679369 [patent_doc_number] => 20100107218 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-04-29 [patent_title] => 'SECURED COMPARTMENT FOR TRANSACTIONS' [patent_app_type] => utility [patent_app_number] => 12/257765 [patent_app_country] => US [patent_app_date] => 2008-10-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 6594 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0107/20100107218.pdf [firstpage_image] =>[orig_patent_app_number] => 12257765 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/257765
Secured compartment for transactions Oct 23, 2008 Issued
Array ( [id] => 5286827 [patent_doc_number] => 20090100502 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-04-16 [patent_title] => 'PROTECTING AGAINST COUNTERFEIT ELECTRONIC DEVICES' [patent_app_type] => utility [patent_app_number] => 12/251139 [patent_app_country] => US [patent_app_date] => 2008-10-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5402 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0100/20090100502.pdf [firstpage_image] =>[orig_patent_app_number] => 12251139 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/251139
Protecting against counterfeit electronic devices Oct 13, 2008 Issued
Array ( [id] => 6511061 [patent_doc_number] => 20100095109 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-04-15 [patent_title] => 'Method for Managing Opaque Presence Indications Within a Presence Access Layer' [patent_app_type] => utility [patent_app_number] => 12/251231 [patent_app_country] => US [patent_app_date] => 2008-10-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9482 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0095/20100095109.pdf [firstpage_image] =>[orig_patent_app_number] => 12251231 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/251231
Method for managing opaque presence indications within a presence access layer Oct 13, 2008 Issued
Array ( [id] => 9472740 [patent_doc_number] => 08726391 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-05-13 [patent_title] => 'Scheduling malware signature updates in relation to threat awareness and environmental safety' [patent_app_type] => utility [patent_app_number] => 12/249801 [patent_app_country] => US [patent_app_date] => 2008-10-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 5928 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 189 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12249801 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/249801
Scheduling malware signature updates in relation to threat awareness and environmental safety Oct 9, 2008 Issued
Array ( [id] => 6370482 [patent_doc_number] => 20100088766 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-04-08 [patent_title] => 'METHOD AND SYSTEM FOR DETECTING, BLOCKING AND CIRCUMVENTING MAN-IN-THE-MIDDLE ATTACKS EXECUTED VIA PROXY SERVERS' [patent_app_type] => utility [patent_app_number] => 12/247602 [patent_app_country] => US [patent_app_date] => 2008-10-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 12059 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0088/20100088766.pdf [firstpage_image] =>[orig_patent_app_number] => 12247602 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/247602
METHOD AND SYSTEM FOR DETECTING, BLOCKING AND CIRCUMVENTING MAN-IN-THE-MIDDLE ATTACKS EXECUTED VIA PROXY SERVERS Oct 7, 2008 Abandoned
Array ( [id] => 6370318 [patent_doc_number] => 20100088746 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-04-08 [patent_title] => 'SECURE EBOOK TECHNIQUES' [patent_app_type] => utility [patent_app_number] => 12/247230 [patent_app_country] => US [patent_app_date] => 2008-10-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 3799 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0088/20100088746.pdf [firstpage_image] =>[orig_patent_app_number] => 12247230 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/247230
SECURE EBOOK TECHNIQUES Oct 7, 2008 Abandoned
Array ( [id] => 5302290 [patent_doc_number] => 20090296942 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-12-03 [patent_title] => 'CONCEPT FOR SECURING AND VALIDATING CLIENT-SIDE STORAGE AND DISTRIBUTION OF ASYNCHRONOUS INCLUDES IN AN APPLICATION SERVER ENVIRONMENT' [patent_app_type] => utility [patent_app_number] => 12/128850 [patent_app_country] => US [patent_app_date] => 2008-05-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3261 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0296/20090296942.pdf [firstpage_image] =>[orig_patent_app_number] => 12128850 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/128850
CONCEPT FOR SECURING AND VALIDATING CLIENT-SIDE STORAGE AND DISTRIBUTION OF ASYNCHRONOUS INCLUDES IN AN APPLICATION SERVER ENVIRONMENT May 28, 2008 Abandoned
Array ( [id] => 8022647 [patent_doc_number] => 08140842 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-03-20 [patent_title] => 'Client identification and authorization in an asynchronous request dispatching environment' [patent_app_type] => utility [patent_app_number] => 12/129417 [patent_app_country] => US [patent_app_date] => 2008-05-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2514 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 225 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/140/08140842.pdf [firstpage_image] =>[orig_patent_app_number] => 12129417 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/129417
Client identification and authorization in an asynchronous request dispatching environment May 28, 2008 Issued
Array ( [id] => 5587618 [patent_doc_number] => 20090106820 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-04-23 [patent_title] => 'SYSTEM AND METHOD FOR USER AUTHENTICATION BASED ON ODOR RECOGNITION' [patent_app_type] => utility [patent_app_number] => 12/128986 [patent_app_country] => US [patent_app_date] => 2008-05-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4011 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0106/20090106820.pdf [firstpage_image] =>[orig_patent_app_number] => 12128986 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/128986
SYSTEM AND METHOD FOR USER AUTHENTICATION BASED ON ODOR RECOGNITION May 28, 2008 Abandoned
Array ( [id] => 5306166 [patent_doc_number] => 20090300731 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-12-03 [patent_title] => 'Remote Publishing and Server Administration' [patent_app_type] => utility [patent_app_number] => 12/129404 [patent_app_country] => US [patent_app_date] => 2008-05-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4699 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0300/20090300731.pdf [firstpage_image] =>[orig_patent_app_number] => 12129404 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/129404
Remote publishing and server administration May 28, 2008 Issued
Array ( [id] => 10861031 [patent_doc_number] => 08887249 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-11-11 [patent_title] => 'Protecting against denial of service attacks using guard tables' [patent_app_type] => utility [patent_app_number] => 12/128481 [patent_app_country] => US [patent_app_date] => 2008-05-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 10 [patent_no_of_words] => 8150 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 369 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12128481 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/128481
Protecting against denial of service attacks using guard tables May 27, 2008 Issued
Array ( [id] => 9486861 [patent_doc_number] => 08732825 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-05-20 [patent_title] => 'Intelligent hashes for centralized malware detection' [patent_app_type] => utility [patent_app_number] => 12/128490 [patent_app_country] => US [patent_app_date] => 2008-05-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6016 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 174 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12128490 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/128490
Intelligent hashes for centralized malware detection May 27, 2008 Issued
Array ( [id] => 4712941 [patent_doc_number] => 20080301467 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-12-04 [patent_title] => 'Memory Security Device' [patent_app_type] => utility [patent_app_number] => 12/128322 [patent_app_country] => US [patent_app_date] => 2008-05-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 8769 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0301/20080301467.pdf [firstpage_image] =>[orig_patent_app_number] => 12128322 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/128322
Memory Security Device May 27, 2008 Abandoned
Array ( [id] => 8260225 [patent_doc_number] => 08209738 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-06-26 [patent_title] => 'Analysis of distributed policy rule-sets for compliance with global policy' [patent_app_type] => utility [patent_app_number] => 12/128445 [patent_app_country] => US [patent_app_date] => 2008-05-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 12148 [patent_no_of_claims] => 34 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 252 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12128445 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/128445
Analysis of distributed policy rule-sets for compliance with global policy May 27, 2008 Issued
Array ( [id] => 5306148 [patent_doc_number] => 20090300730 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-12-03 [patent_title] => 'SECURITY MESSAGE PROCESSING' [patent_app_type] => utility [patent_app_number] => 12/128391 [patent_app_country] => US [patent_app_date] => 2008-05-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 15515 [patent_no_of_claims] => 31 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0300/20090300730.pdf [firstpage_image] =>[orig_patent_app_number] => 12128391 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/128391
Security message processing May 27, 2008 Issued
Array ( [id] => 9404734 [patent_doc_number] => 08694798 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-04-08 [patent_title] => 'Generating and securing multiple archive keys' [patent_app_type] => utility [patent_app_number] => 12/125826 [patent_app_country] => US [patent_app_date] => 2008-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6357 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 96 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12125826 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/125826
Generating and securing multiple archive keys May 21, 2008 Issued
Array ( [id] => 8763251 [patent_doc_number] => 08423789 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-04-16 [patent_title] => 'Key generation techniques' [patent_app_type] => utility [patent_app_number] => 12/125670 [patent_app_country] => US [patent_app_date] => 2008-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 13 [patent_no_of_words] => 6816 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 128 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12125670 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/125670
Key generation techniques May 21, 2008 Issued
Array ( [id] => 4729991 [patent_doc_number] => 20080208935 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-08-28 [patent_title] => 'Computer Program Product and Computer System for Controlling Performance of Operations within a Data Processing System or Networks' [patent_app_type] => utility [patent_app_number] => 12/116177 [patent_app_country] => US [patent_app_date] => 2008-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 11142 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0208/20080208935.pdf [firstpage_image] =>[orig_patent_app_number] => 12116177 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/116177
Computer program product and computer system for controlling performance of operations within a data processing system or networks May 5, 2008 Issued
Array ( [id] => 8031555 [patent_doc_number] => 08144869 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-03-27 [patent_title] => 'Content protection system, key data generation apparatus, and terminal apparatus' [patent_app_type] => utility [patent_app_number] => 12/112670 [patent_app_country] => US [patent_app_date] => 2008-04-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 16 [patent_no_of_words] => 12510 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 186 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/144/08144869.pdf [firstpage_image] =>[orig_patent_app_number] => 12112670 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/112670
Content protection system, key data generation apparatus, and terminal apparatus Apr 29, 2008 Issued
Array ( [id] => 10145874 [patent_doc_number] => 09178696 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-03 [patent_title] => 'Key management for secure communication' [patent_app_type] => utility [patent_app_number] => 12/744986 [patent_app_country] => US [patent_app_date] => 2007-11-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 6451 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 121 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12744986 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/744986
Key management for secure communication Nov 29, 2007 Issued
Menu