
Kimberly R. Jordan
Examiner (ID: 14382)
| Most Active Art Unit | 1205 |
| Art Unit(s) | 1617, 1614, 1205, 2899 |
| Total Applications | 742 |
| Issued Applications | 500 |
| Pending Applications | 101 |
| Abandoned Applications | 141 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 7013584
[patent_doc_number] => 20050066184
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-03-24
[patent_title] => 'Exclusive encryption'
[patent_app_type] => utility
[patent_app_number] => 10/985201
[patent_app_country] => US
[patent_app_date] => 2004-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 11660
[patent_no_of_claims] => 37
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0066/20050066184.pdf
[firstpage_image] =>[orig_patent_app_number] => 10985201
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/985201 | Exclusive encryption | Nov 9, 2004 | Issued |
Array
(
[id] => 5816751
[patent_doc_number] => 20060085842
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-04-20
[patent_title] => 'Method and apparatus for time-based communications port protection'
[patent_app_type] => utility
[patent_app_number] => 10/968704
[patent_app_country] => US
[patent_app_date] => 2004-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2525
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0085/20060085842.pdf
[firstpage_image] =>[orig_patent_app_number] => 10968704
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/968704 | Method and apparatus for time-based communications port protection | Oct 18, 2004 | Issued |
Array
(
[id] => 9198
[patent_doc_number] => 07814317
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2010-10-12
[patent_title] => 'Multiple password documents'
[patent_app_type] => utility
[patent_app_number] => 10/969220
[patent_app_country] => US
[patent_app_date] => 2004-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3511
[patent_no_of_claims] => 52
[patent_no_of_ind_claims] => 52
[patent_words_short_claim] => 12
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/814/07814317.pdf
[firstpage_image] =>[orig_patent_app_number] => 10969220
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/969220 | Multiple password documents | Oct 18, 2004 | Issued |
Array
(
[id] => 587907
[patent_doc_number] => 07467412
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2008-12-16
[patent_title] => 'Data transfer system, data transfer program and video server system'
[patent_app_type] => utility
[patent_app_number] => 10/968601
[patent_app_country] => US
[patent_app_date] => 2004-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 6676
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/467/07467412.pdf
[firstpage_image] =>[orig_patent_app_number] => 10968601
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/968601 | Data transfer system, data transfer program and video server system | Oct 18, 2004 | Issued |
Array
(
[id] => 114819
[patent_doc_number] => 07720219
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2010-05-18
[patent_title] => 'Apparatus and method for implementing a hash algorithm word buffer'
[patent_app_type] => utility
[patent_app_number] => 10/968406
[patent_app_country] => US
[patent_app_date] => 2004-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 17
[patent_no_of_words] => 19756
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/720/07720219.pdf
[firstpage_image] =>[orig_patent_app_number] => 10968406
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/968406 | Apparatus and method for implementing a hash algorithm word buffer | Oct 18, 2004 | Issued |
Array
(
[id] => 27350
[patent_doc_number] => 07802096
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2010-09-21
[patent_title] => 'Fallback key retrieval'
[patent_app_type] => utility
[patent_app_number] => 10/969324
[patent_app_country] => US
[patent_app_date] => 2004-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3520
[patent_no_of_claims] => 68
[patent_no_of_ind_claims] => 68
[patent_words_short_claim] => 12
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/802/07802096.pdf
[firstpage_image] =>[orig_patent_app_number] => 10969324
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/969324 | Fallback key retrieval | Oct 18, 2004 | Issued |
Array
(
[id] => 154528
[patent_doc_number] => 07684563
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2010-03-23
[patent_title] => 'Apparatus and method for implementing a unified hash algorithm pipeline'
[patent_app_type] => utility
[patent_app_number] => 10/968428
[patent_app_country] => US
[patent_app_date] => 2004-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 17
[patent_no_of_words] => 19710
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/684/07684563.pdf
[firstpage_image] =>[orig_patent_app_number] => 10968428
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/968428 | Apparatus and method for implementing a unified hash algorithm pipeline | Oct 18, 2004 | Issued |
Array
(
[id] => 188719
[patent_doc_number] => 07650640
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2010-01-19
[patent_title] => 'Method and system for detecting IA32 targeted buffer overflow attacks'
[patent_app_type] => utility
[patent_app_number] => 10/968225
[patent_app_country] => US
[patent_app_date] => 2004-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5741
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/650/07650640.pdf
[firstpage_image] =>[orig_patent_app_number] => 10968225
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/968225 | Method and system for detecting IA32 targeted buffer overflow attacks | Oct 17, 2004 | Issued |
Array
(
[id] => 7972185
[patent_doc_number] => 07941671
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-05-10
[patent_title] => 'Method and apparatus for accommodating multiple verifier types with limited storage space'
[patent_app_type] => utility
[patent_app_number] => 10/966511
[patent_app_country] => US
[patent_app_date] => 2004-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2796
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/941/07941671.pdf
[firstpage_image] =>[orig_patent_app_number] => 10966511
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/966511 | Method and apparatus for accommodating multiple verifier types with limited storage space | Oct 13, 2004 | Issued |
Array
(
[id] => 6919952
[patent_doc_number] => 20050097352
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-05-05
[patent_title] => 'Embeddable security service module'
[patent_app_type] => utility
[patent_app_number] => 10/961701
[patent_app_country] => US
[patent_app_date] => 2004-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12328
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0097/20050097352.pdf
[firstpage_image] =>[orig_patent_app_number] => 10961701
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/961701 | Embeddable security service module | Oct 7, 2004 | Abandoned |
Array
(
[id] => 166687
[patent_doc_number] => 07673141
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-03-02
[patent_title] => 'Client authentication using a challenge provider'
[patent_app_type] => utility
[patent_app_number] => 10/959102
[patent_app_country] => US
[patent_app_date] => 2004-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6396
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 243
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/673/07673141.pdf
[firstpage_image] =>[orig_patent_app_number] => 10959102
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/959102 | Client authentication using a challenge provider | Oct 6, 2004 | Issued |
Array
(
[id] => 107266
[patent_doc_number] => 07730544
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-06-01
[patent_title] => 'Privileged execution context restricting use of hardware resources by other execution contexts'
[patent_app_type] => utility
[patent_app_number] => 10/959716
[patent_app_country] => US
[patent_app_date] => 2004-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 6404
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/730/07730544.pdf
[firstpage_image] =>[orig_patent_app_number] => 10959716
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/959716 | Privileged execution context restricting use of hardware resources by other execution contexts | Oct 5, 2004 | Issued |
Array
(
[id] => 272454
[patent_doc_number] => 07565694
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2009-07-21
[patent_title] => 'Method and apparatus for preventing network reset attacks'
[patent_app_type] => utility
[patent_app_number] => 10/959225
[patent_app_country] => US
[patent_app_date] => 2004-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6805
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/565/07565694.pdf
[firstpage_image] =>[orig_patent_app_number] => 10959225
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/959225 | Method and apparatus for preventing network reset attacks | Oct 4, 2004 | Issued |
Array
(
[id] => 8763516
[patent_doc_number] => 08424055
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-04-16
[patent_title] => 'Deterministic user authentication service for communication network'
[patent_app_type] => utility
[patent_app_number] => 10/958620
[patent_app_country] => US
[patent_app_date] => 2004-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 6369
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 10958620
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/958620 | Deterministic user authentication service for communication network | Oct 4, 2004 | Issued |
Array
(
[id] => 5728797
[patent_doc_number] => 20060059558
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-03-16
[patent_title] => 'Proactive containment of network security attacks'
[patent_app_type] => utility
[patent_app_number] => 10/942207
[patent_app_country] => US
[patent_app_date] => 2004-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2677
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0059/20060059558.pdf
[firstpage_image] =>[orig_patent_app_number] => 10942207
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/942207 | Proactive containment of network security attacks | Sep 14, 2004 | Abandoned |
Array
(
[id] => 5728580
[patent_doc_number] => 20060059341
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-03-16
[patent_title] => 'Apparatus and method capable of network access'
[patent_app_type] => utility
[patent_app_number] => 10/940212
[patent_app_country] => US
[patent_app_date] => 2004-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2905
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0059/20060059341.pdf
[firstpage_image] =>[orig_patent_app_number] => 10940212
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/940212 | Apparatus and method capable of network access | Sep 13, 2004 | Abandoned |
Array
(
[id] => 79418
[patent_doc_number] => 07752430
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-07-06
[patent_title] => 'Data encryption on the physical layer of a data transmission system'
[patent_app_type] => utility
[patent_app_number] => 10/928135
[patent_app_country] => US
[patent_app_date] => 2004-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 2
[patent_no_of_words] => 2409
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/752/07752430.pdf
[firstpage_image] =>[orig_patent_app_number] => 10928135
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/928135 | Data encryption on the physical layer of a data transmission system | Aug 29, 2004 | Issued |
Array
(
[id] => 5906978
[patent_doc_number] => 20060047972
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-03-02
[patent_title] => 'System and method for applying security to memory reads and writes'
[patent_app_type] => utility
[patent_app_number] => 10/929036
[patent_app_country] => US
[patent_app_date] => 2004-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6529
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0047/20060047972.pdf
[firstpage_image] =>[orig_patent_app_number] => 10929036
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/929036 | System and method for applying security to memory reads and writes | Aug 26, 2004 | Issued |
Array
(
[id] => 8716132
[patent_doc_number] => 08402283
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-03-19
[patent_title] => 'Secure content enabled drive system and method'
[patent_app_type] => utility
[patent_app_number] => 10/910001
[patent_app_country] => US
[patent_app_date] => 2004-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 5407
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 10910001
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/910001 | Secure content enabled drive system and method | Aug 1, 2004 | Issued |
Array
(
[id] => 6943926
[patent_doc_number] => 20050195975
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-09-08
[patent_title] => 'Digital media distribution cryptography using media ticket smart cards'
[patent_app_type] => utility
[patent_app_number] => 10/755624
[patent_app_country] => US
[patent_app_date] => 2004-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10873
[patent_no_of_claims] => 38
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0195/20050195975.pdf
[firstpage_image] =>[orig_patent_app_number] => 10755624
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/755624 | Digital media distribution cryptography using media ticket smart cards | Jul 5, 2004 | Abandoned |