
Kimberly R. Jordan
Examiner (ID: 14382)
| Most Active Art Unit | 1205 |
| Art Unit(s) | 1617, 1614, 1205, 2899 |
| Total Applications | 742 |
| Issued Applications | 500 |
| Pending Applications | 101 |
| Abandoned Applications | 141 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 7679369
[patent_doc_number] => 20100107218
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-29
[patent_title] => 'SECURED COMPARTMENT FOR TRANSACTIONS'
[patent_app_type] => utility
[patent_app_number] => 12/257765
[patent_app_country] => US
[patent_app_date] => 2008-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6594
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0107/20100107218.pdf
[firstpage_image] =>[orig_patent_app_number] => 12257765
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/257765 | Secured compartment for transactions | Oct 23, 2008 | Issued |
Array
(
[id] => 5286827
[patent_doc_number] => 20090100502
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-04-16
[patent_title] => 'PROTECTING AGAINST COUNTERFEIT ELECTRONIC DEVICES'
[patent_app_type] => utility
[patent_app_number] => 12/251139
[patent_app_country] => US
[patent_app_date] => 2008-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5402
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0100/20090100502.pdf
[firstpage_image] =>[orig_patent_app_number] => 12251139
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/251139 | Protecting against counterfeit electronic devices | Oct 13, 2008 | Issued |
Array
(
[id] => 6511061
[patent_doc_number] => 20100095109
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-15
[patent_title] => 'Method for Managing Opaque Presence Indications Within a Presence Access Layer'
[patent_app_type] => utility
[patent_app_number] => 12/251231
[patent_app_country] => US
[patent_app_date] => 2008-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9482
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0095/20100095109.pdf
[firstpage_image] =>[orig_patent_app_number] => 12251231
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/251231 | Method for managing opaque presence indications within a presence access layer | Oct 13, 2008 | Issued |
Array
(
[id] => 9472740
[patent_doc_number] => 08726391
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-05-13
[patent_title] => 'Scheduling malware signature updates in relation to threat awareness and environmental safety'
[patent_app_type] => utility
[patent_app_number] => 12/249801
[patent_app_country] => US
[patent_app_date] => 2008-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 5928
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12249801
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/249801 | Scheduling malware signature updates in relation to threat awareness and environmental safety | Oct 9, 2008 | Issued |
Array
(
[id] => 6370482
[patent_doc_number] => 20100088766
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-08
[patent_title] => 'METHOD AND SYSTEM FOR DETECTING, BLOCKING AND CIRCUMVENTING MAN-IN-THE-MIDDLE ATTACKS EXECUTED VIA PROXY SERVERS'
[patent_app_type] => utility
[patent_app_number] => 12/247602
[patent_app_country] => US
[patent_app_date] => 2008-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12059
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0088/20100088766.pdf
[firstpage_image] =>[orig_patent_app_number] => 12247602
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/247602 | METHOD AND SYSTEM FOR DETECTING, BLOCKING AND CIRCUMVENTING MAN-IN-THE-MIDDLE ATTACKS EXECUTED VIA PROXY SERVERS | Oct 7, 2008 | Abandoned |
Array
(
[id] => 6370318
[patent_doc_number] => 20100088746
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-08
[patent_title] => 'SECURE EBOOK TECHNIQUES'
[patent_app_type] => utility
[patent_app_number] => 12/247230
[patent_app_country] => US
[patent_app_date] => 2008-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3799
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0088/20100088746.pdf
[firstpage_image] =>[orig_patent_app_number] => 12247230
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/247230 | SECURE EBOOK TECHNIQUES | Oct 7, 2008 | Abandoned |
Array
(
[id] => 5302290
[patent_doc_number] => 20090296942
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-03
[patent_title] => 'CONCEPT FOR SECURING AND VALIDATING CLIENT-SIDE STORAGE AND DISTRIBUTION OF ASYNCHRONOUS INCLUDES IN AN APPLICATION SERVER ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 12/128850
[patent_app_country] => US
[patent_app_date] => 2008-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3261
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0296/20090296942.pdf
[firstpage_image] =>[orig_patent_app_number] => 12128850
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/128850 | CONCEPT FOR SECURING AND VALIDATING CLIENT-SIDE STORAGE AND DISTRIBUTION OF ASYNCHRONOUS INCLUDES IN AN APPLICATION SERVER ENVIRONMENT | May 28, 2008 | Abandoned |
Array
(
[id] => 8022647
[patent_doc_number] => 08140842
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-03-20
[patent_title] => 'Client identification and authorization in an asynchronous request dispatching environment'
[patent_app_type] => utility
[patent_app_number] => 12/129417
[patent_app_country] => US
[patent_app_date] => 2008-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2514
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/140/08140842.pdf
[firstpage_image] =>[orig_patent_app_number] => 12129417
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/129417 | Client identification and authorization in an asynchronous request dispatching environment | May 28, 2008 | Issued |
Array
(
[id] => 5587618
[patent_doc_number] => 20090106820
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-04-23
[patent_title] => 'SYSTEM AND METHOD FOR USER AUTHENTICATION BASED ON ODOR RECOGNITION'
[patent_app_type] => utility
[patent_app_number] => 12/128986
[patent_app_country] => US
[patent_app_date] => 2008-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4011
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0106/20090106820.pdf
[firstpage_image] =>[orig_patent_app_number] => 12128986
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/128986 | SYSTEM AND METHOD FOR USER AUTHENTICATION BASED ON ODOR RECOGNITION | May 28, 2008 | Abandoned |
Array
(
[id] => 5306166
[patent_doc_number] => 20090300731
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-03
[patent_title] => 'Remote Publishing and Server Administration'
[patent_app_type] => utility
[patent_app_number] => 12/129404
[patent_app_country] => US
[patent_app_date] => 2008-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4699
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0300/20090300731.pdf
[firstpage_image] =>[orig_patent_app_number] => 12129404
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/129404 | Remote publishing and server administration | May 28, 2008 | Issued |
Array
(
[id] => 10861031
[patent_doc_number] => 08887249
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-11
[patent_title] => 'Protecting against denial of service attacks using guard tables'
[patent_app_type] => utility
[patent_app_number] => 12/128481
[patent_app_country] => US
[patent_app_date] => 2008-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 8150
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 369
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12128481
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/128481 | Protecting against denial of service attacks using guard tables | May 27, 2008 | Issued |
Array
(
[id] => 9486861
[patent_doc_number] => 08732825
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-05-20
[patent_title] => 'Intelligent hashes for centralized malware detection'
[patent_app_type] => utility
[patent_app_number] => 12/128490
[patent_app_country] => US
[patent_app_date] => 2008-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6016
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12128490
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/128490 | Intelligent hashes for centralized malware detection | May 27, 2008 | Issued |
Array
(
[id] => 4712941
[patent_doc_number] => 20080301467
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-12-04
[patent_title] => 'Memory Security Device'
[patent_app_type] => utility
[patent_app_number] => 12/128322
[patent_app_country] => US
[patent_app_date] => 2008-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8769
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0301/20080301467.pdf
[firstpage_image] =>[orig_patent_app_number] => 12128322
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/128322 | Memory Security Device | May 27, 2008 | Abandoned |
Array
(
[id] => 8260225
[patent_doc_number] => 08209738
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-06-26
[patent_title] => 'Analysis of distributed policy rule-sets for compliance with global policy'
[patent_app_type] => utility
[patent_app_number] => 12/128445
[patent_app_country] => US
[patent_app_date] => 2008-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12148
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 252
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12128445
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/128445 | Analysis of distributed policy rule-sets for compliance with global policy | May 27, 2008 | Issued |
Array
(
[id] => 5306148
[patent_doc_number] => 20090300730
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-03
[patent_title] => 'SECURITY MESSAGE PROCESSING'
[patent_app_type] => utility
[patent_app_number] => 12/128391
[patent_app_country] => US
[patent_app_date] => 2008-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15515
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0300/20090300730.pdf
[firstpage_image] =>[orig_patent_app_number] => 12128391
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/128391 | Security message processing | May 27, 2008 | Issued |
Array
(
[id] => 9404734
[patent_doc_number] => 08694798
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-04-08
[patent_title] => 'Generating and securing multiple archive keys'
[patent_app_type] => utility
[patent_app_number] => 12/125826
[patent_app_country] => US
[patent_app_date] => 2008-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6357
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12125826
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/125826 | Generating and securing multiple archive keys | May 21, 2008 | Issued |
Array
(
[id] => 8763251
[patent_doc_number] => 08423789
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-04-16
[patent_title] => 'Key generation techniques'
[patent_app_type] => utility
[patent_app_number] => 12/125670
[patent_app_country] => US
[patent_app_date] => 2008-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 6816
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12125670
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/125670 | Key generation techniques | May 21, 2008 | Issued |
Array
(
[id] => 4729991
[patent_doc_number] => 20080208935
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-08-28
[patent_title] => 'Computer Program Product and Computer System for Controlling Performance of Operations within a Data Processing System or Networks'
[patent_app_type] => utility
[patent_app_number] => 12/116177
[patent_app_country] => US
[patent_app_date] => 2008-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11142
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0208/20080208935.pdf
[firstpage_image] =>[orig_patent_app_number] => 12116177
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/116177 | Computer program product and computer system for controlling performance of operations within a data processing system or networks | May 5, 2008 | Issued |
Array
(
[id] => 8031555
[patent_doc_number] => 08144869
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-03-27
[patent_title] => 'Content protection system, key data generation apparatus, and terminal apparatus'
[patent_app_type] => utility
[patent_app_number] => 12/112670
[patent_app_country] => US
[patent_app_date] => 2008-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 16
[patent_no_of_words] => 12510
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/144/08144869.pdf
[firstpage_image] =>[orig_patent_app_number] => 12112670
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/112670 | Content protection system, key data generation apparatus, and terminal apparatus | Apr 29, 2008 | Issued |
Array
(
[id] => 10145874
[patent_doc_number] => 09178696
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-03
[patent_title] => 'Key management for secure communication'
[patent_app_type] => utility
[patent_app_number] => 12/744986
[patent_app_country] => US
[patent_app_date] => 2007-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 6451
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12744986
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/744986 | Key management for secure communication | Nov 29, 2007 | Issued |