Search

Kurtis Gills

Examiner (ID: 10044, Phone: (571)270-3315 , Office: P/3623 )

Most Active Art Unit
3623
Art Unit(s)
3623, 3624, 3683
Total Applications
597
Issued Applications
305
Pending Applications
71
Abandoned Applications
241

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10189201 [patent_doc_number] => 09218622 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-22 [patent_title] => 'System and method of decoupling and exposing computing device originated location information' [patent_app_type] => utility [patent_app_number] => 13/590340 [patent_app_country] => US [patent_app_date] => 2012-08-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5387 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 226 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13590340 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/590340
System and method of decoupling and exposing computing device originated location information Aug 20, 2012 Issued
Array ( [id] => 10284905 [patent_doc_number] => 20150169903 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-06-18 [patent_title] => 'PROGRAMMABLE LOGIC CONTROLLER' [patent_app_type] => utility [patent_app_number] => 14/405688 [patent_app_country] => US [patent_app_date] => 2012-07-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 2705 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14405688 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/405688
Programmable logic controller Jul 25, 2012 Issued
Array ( [id] => 8416187 [patent_doc_number] => 20120243688 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-09-27 [patent_title] => 'METHOD AND SYSTEM FOR DELETING DATA' [patent_app_type] => utility [patent_app_number] => 13/488131 [patent_app_country] => US [patent_app_date] => 2012-06-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5043 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13488131 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/488131
Method and system for deleting data Jun 3, 2012 Issued
Array ( [id] => 8699050 [patent_doc_number] => 20130061059 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-03-07 [patent_title] => 'INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM' [patent_app_type] => utility [patent_app_number] => 13/372083 [patent_app_country] => US [patent_app_date] => 2012-02-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 7158 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13372083 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/372083
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM Feb 12, 2012 Abandoned
Array ( [id] => 11877615 [patent_doc_number] => 09749403 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-08-29 [patent_title] => 'Managing content distribution in a wireless communications environment' [patent_app_type] => utility [patent_app_number] => 13/370935 [patent_app_country] => US [patent_app_date] => 2012-02-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 4827 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 323 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13370935 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/370935
Managing content distribution in a wireless communications environment Feb 9, 2012 Issued
Array ( [id] => 8372473 [patent_doc_number] => 20120221863 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-08-30 [patent_title] => 'AUTHENTICATION SYSTEM' [patent_app_type] => utility [patent_app_number] => 13/369103 [patent_app_country] => US [patent_app_date] => 2012-02-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8108 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13369103 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/369103
AUTHENTICATION SYSTEM Feb 7, 2012 Abandoned
Array ( [id] => 11252330 [patent_doc_number] => 09477834 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-10-25 [patent_title] => 'Maintaining secure data isolated from non-secure access when switching between domains' [patent_app_type] => utility [patent_app_number] => 13/368419 [patent_app_country] => US [patent_app_date] => 2012-02-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 12 [patent_no_of_words] => 12049 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 329 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13368419 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/368419
Maintaining secure data isolated from non-secure access when switching between domains Feb 7, 2012 Issued
Array ( [id] => 8337535 [patent_doc_number] => 20120204225 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-08-09 [patent_title] => 'ONLINE AUTHENTICATION USING AUDIO, IMAGE AND/OR VIDEO' [patent_app_type] => utility [patent_app_number] => 13/367592 [patent_app_country] => US [patent_app_date] => 2012-02-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 15354 [patent_no_of_claims] => 55 [patent_no_of_ind_claims] => 9 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13367592 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/367592
ONLINE AUTHENTICATION USING AUDIO, IMAGE AND/OR VIDEO Feb 6, 2012 Abandoned
Array ( [id] => 8855797 [patent_doc_number] => 20130145472 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-06-06 [patent_title] => 'Preventing Execution of Task Scheduled Malware' [patent_app_type] => utility [patent_app_number] => 13/310447 [patent_app_country] => US [patent_app_date] => 2011-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8614 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13310447 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/310447
Preventing execution of task scheduled malware Dec 1, 2011 Issued
Array ( [id] => 10005105 [patent_doc_number] => 09049211 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-06-02 [patent_title] => 'User challenge using geography of previous login' [patent_app_type] => utility [patent_app_number] => 13/292925 [patent_app_country] => US [patent_app_date] => 2011-11-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 8587 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 220 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13292925 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/292925
User challenge using geography of previous login Nov 8, 2011 Issued
Array ( [id] => 7765415 [patent_doc_number] => 20120033812 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-02-09 [patent_title] => 'SYSTEM AND METHOD FOR DECOMPRESSING AND MAKING PUBLICALLY AVAILABLE RECEIVED MEDIA CONTENT' [patent_app_type] => utility [patent_app_number] => 13/274524 [patent_app_country] => US [patent_app_date] => 2011-10-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2967 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0033/20120033812.pdf [firstpage_image] =>[orig_patent_app_number] => 13274524 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/274524
SYSTEM AND METHOD FOR DECOMPRESSING AND MAKING PUBLICALLY AVAILABLE RECEIVED MEDIA CONTENT Oct 16, 2011 Abandoned
Array ( [id] => 8998128 [patent_doc_number] => 08522034 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-08-27 [patent_title] => 'Systems and methods for transparent configuration authentication of networked devices' [patent_app_type] => utility [patent_app_number] => 13/213943 [patent_app_country] => US [patent_app_date] => 2011-08-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6835 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 152 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13213943 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/213943
Systems and methods for transparent configuration authentication of networked devices Aug 18, 2011 Issued
Array ( [id] => 9444570 [patent_doc_number] => 08713706 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-04-29 [patent_title] => 'Method and system for coordinating client and host security modules' [patent_app_type] => utility [patent_app_number] => 13/175925 [patent_app_country] => US [patent_app_date] => 2011-07-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6336 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 143 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13175925 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/175925
Method and system for coordinating client and host security modules Jul 3, 2011 Issued
Array ( [id] => 8512288 [patent_doc_number] => 20120311696 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-12-06 [patent_title] => 'Override for Policy Enforcement System' [patent_app_type] => utility [patent_app_number] => 13/152258 [patent_app_country] => US [patent_app_date] => 2011-06-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5202 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13152258 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/152258
Override for Policy Enforcement System Jun 1, 2011 Abandoned
Array ( [id] => 8512300 [patent_doc_number] => 20120311708 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-12-06 [patent_title] => 'SYSTEM AND METHOD FOR NON-SIGNATURE BASED DETECTION OF MALICIOUS PROCESSES' [patent_app_type] => utility [patent_app_number] => 13/151173 [patent_app_country] => US [patent_app_date] => 2011-06-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 9688 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13151173 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/151173
System and method for non-signature based detection of malicious processes May 31, 2011 Issued
Array ( [id] => 8358207 [patent_doc_number] => 20120213370 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-08-23 [patent_title] => 'SECURE MANAGEMENT AND PERSONALIZATION OF UNIQUE CODE SIGNING KEYS' [patent_app_type] => utility [patent_app_number] => 13/150636 [patent_app_country] => US [patent_app_date] => 2011-06-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7218 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13150636 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/150636
SECURE MANAGEMENT AND PERSONALIZATION OF UNIQUE CODE SIGNING KEYS May 31, 2011 Abandoned
Array ( [id] => 8751111 [patent_doc_number] => 08416950 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-04-09 [patent_title] => 'Copy protection without non-volatile memory' [patent_app_type] => utility [patent_app_number] => 13/082271 [patent_app_country] => US [patent_app_date] => 2011-04-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4650 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 228 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13082271 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/082271
Copy protection without non-volatile memory Apr 6, 2011 Issued
Array ( [id] => 6105827 [patent_doc_number] => 20110167480 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-07-07 [patent_title] => 'TECHNIQUES FOR SECURE TRANSPARENT SWITCHING BETWEEN MODES OF A VIRTUAL PRIVATE NETWORK (VPN)' [patent_app_type] => utility [patent_app_number] => 13/046897 [patent_app_country] => US [patent_app_date] => 2011-03-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5722 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0167/20110167480.pdf [firstpage_image] =>[orig_patent_app_number] => 13046897 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/046897
Techniques for secure transparent switching between modes of a virtual private network (VPN) Mar 13, 2011 Issued
Array ( [id] => 8189238 [patent_doc_number] => 20120117384 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-05-10 [patent_title] => 'METHOD AND SYSTEM FOR DELETING DATA' [patent_app_type] => utility [patent_app_number] => 12/942445 [patent_app_country] => US [patent_app_date] => 2010-11-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5025 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0117/20120117384.pdf [firstpage_image] =>[orig_patent_app_number] => 12942445 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/942445
Method and system for deleting data Nov 8, 2010 Issued
Array ( [id] => 8059697 [patent_doc_number] => 20120079594 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-03-29 [patent_title] => 'MALWARE AUTO-ANALYSIS SYSTEM AND METHOD USING KERNEL CALLBACK MECHANISM' [patent_app_type] => utility [patent_app_number] => 12/942700 [patent_app_country] => US [patent_app_date] => 2010-11-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 2501 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0079/20120079594.pdf [firstpage_image] =>[orig_patent_app_number] => 12942700 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/942700
MALWARE AUTO-ANALYSIS SYSTEM AND METHOD USING KERNEL CALLBACK MECHANISM Nov 8, 2010 Abandoned
Menu