
Kurtis Gills
Examiner (ID: 10044, Phone: (571)270-3315 , Office: P/3623 )
| Most Active Art Unit | 3623 |
| Art Unit(s) | 3623, 3624, 3683 |
| Total Applications | 597 |
| Issued Applications | 305 |
| Pending Applications | 71 |
| Abandoned Applications | 241 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10189201
[patent_doc_number] => 09218622
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-22
[patent_title] => 'System and method of decoupling and exposing computing device originated location information'
[patent_app_type] => utility
[patent_app_number] => 13/590340
[patent_app_country] => US
[patent_app_date] => 2012-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5387
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13590340
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/590340 | System and method of decoupling and exposing computing device originated location information | Aug 20, 2012 | Issued |
Array
(
[id] => 10284905
[patent_doc_number] => 20150169903
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-18
[patent_title] => 'PROGRAMMABLE LOGIC CONTROLLER'
[patent_app_type] => utility
[patent_app_number] => 14/405688
[patent_app_country] => US
[patent_app_date] => 2012-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2705
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14405688
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/405688 | Programmable logic controller | Jul 25, 2012 | Issued |
Array
(
[id] => 8416187
[patent_doc_number] => 20120243688
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-09-27
[patent_title] => 'METHOD AND SYSTEM FOR DELETING DATA'
[patent_app_type] => utility
[patent_app_number] => 13/488131
[patent_app_country] => US
[patent_app_date] => 2012-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5043
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13488131
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/488131 | Method and system for deleting data | Jun 3, 2012 | Issued |
Array
(
[id] => 8699050
[patent_doc_number] => 20130061059
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-07
[patent_title] => 'INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 13/372083
[patent_app_country] => US
[patent_app_date] => 2012-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7158
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13372083
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/372083 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | Feb 12, 2012 | Abandoned |
Array
(
[id] => 11877615
[patent_doc_number] => 09749403
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-29
[patent_title] => 'Managing content distribution in a wireless communications environment'
[patent_app_type] => utility
[patent_app_number] => 13/370935
[patent_app_country] => US
[patent_app_date] => 2012-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 4827
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 323
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13370935
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/370935 | Managing content distribution in a wireless communications environment | Feb 9, 2012 | Issued |
Array
(
[id] => 8372473
[patent_doc_number] => 20120221863
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-08-30
[patent_title] => 'AUTHENTICATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/369103
[patent_app_country] => US
[patent_app_date] => 2012-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8108
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13369103
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/369103 | AUTHENTICATION SYSTEM | Feb 7, 2012 | Abandoned |
Array
(
[id] => 11252330
[patent_doc_number] => 09477834
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-25
[patent_title] => 'Maintaining secure data isolated from non-secure access when switching between domains'
[patent_app_type] => utility
[patent_app_number] => 13/368419
[patent_app_country] => US
[patent_app_date] => 2012-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 12
[patent_no_of_words] => 12049
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 329
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13368419
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/368419 | Maintaining secure data isolated from non-secure access when switching between domains | Feb 7, 2012 | Issued |
Array
(
[id] => 8337535
[patent_doc_number] => 20120204225
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-08-09
[patent_title] => 'ONLINE AUTHENTICATION USING AUDIO, IMAGE AND/OR VIDEO'
[patent_app_type] => utility
[patent_app_number] => 13/367592
[patent_app_country] => US
[patent_app_date] => 2012-02-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 15354
[patent_no_of_claims] => 55
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13367592
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/367592 | ONLINE AUTHENTICATION USING AUDIO, IMAGE AND/OR VIDEO | Feb 6, 2012 | Abandoned |
Array
(
[id] => 8855797
[patent_doc_number] => 20130145472
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-06
[patent_title] => 'Preventing Execution of Task Scheduled Malware'
[patent_app_type] => utility
[patent_app_number] => 13/310447
[patent_app_country] => US
[patent_app_date] => 2011-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8614
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13310447
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/310447 | Preventing execution of task scheduled malware | Dec 1, 2011 | Issued |
Array
(
[id] => 10005105
[patent_doc_number] => 09049211
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-06-02
[patent_title] => 'User challenge using geography of previous login'
[patent_app_type] => utility
[patent_app_number] => 13/292925
[patent_app_country] => US
[patent_app_date] => 2011-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8587
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13292925
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/292925 | User challenge using geography of previous login | Nov 8, 2011 | Issued |
Array
(
[id] => 7765415
[patent_doc_number] => 20120033812
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-09
[patent_title] => 'SYSTEM AND METHOD FOR DECOMPRESSING AND MAKING PUBLICALLY AVAILABLE RECEIVED MEDIA CONTENT'
[patent_app_type] => utility
[patent_app_number] => 13/274524
[patent_app_country] => US
[patent_app_date] => 2011-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2967
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0033/20120033812.pdf
[firstpage_image] =>[orig_patent_app_number] => 13274524
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/274524 | SYSTEM AND METHOD FOR DECOMPRESSING AND MAKING PUBLICALLY AVAILABLE RECEIVED MEDIA CONTENT | Oct 16, 2011 | Abandoned |
Array
(
[id] => 8998128
[patent_doc_number] => 08522034
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-27
[patent_title] => 'Systems and methods for transparent configuration authentication of networked devices'
[patent_app_type] => utility
[patent_app_number] => 13/213943
[patent_app_country] => US
[patent_app_date] => 2011-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6835
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13213943
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/213943 | Systems and methods for transparent configuration authentication of networked devices | Aug 18, 2011 | Issued |
Array
(
[id] => 9444570
[patent_doc_number] => 08713706
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-04-29
[patent_title] => 'Method and system for coordinating client and host security modules'
[patent_app_type] => utility
[patent_app_number] => 13/175925
[patent_app_country] => US
[patent_app_date] => 2011-07-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6336
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13175925
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/175925 | Method and system for coordinating client and host security modules | Jul 3, 2011 | Issued |
Array
(
[id] => 8512288
[patent_doc_number] => 20120311696
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-12-06
[patent_title] => 'Override for Policy Enforcement System'
[patent_app_type] => utility
[patent_app_number] => 13/152258
[patent_app_country] => US
[patent_app_date] => 2011-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5202
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13152258
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/152258 | Override for Policy Enforcement System | Jun 1, 2011 | Abandoned |
Array
(
[id] => 8512300
[patent_doc_number] => 20120311708
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-12-06
[patent_title] => 'SYSTEM AND METHOD FOR NON-SIGNATURE BASED DETECTION OF MALICIOUS PROCESSES'
[patent_app_type] => utility
[patent_app_number] => 13/151173
[patent_app_country] => US
[patent_app_date] => 2011-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 9688
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13151173
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/151173 | System and method for non-signature based detection of malicious processes | May 31, 2011 | Issued |
Array
(
[id] => 8358207
[patent_doc_number] => 20120213370
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-08-23
[patent_title] => 'SECURE MANAGEMENT AND PERSONALIZATION OF UNIQUE CODE SIGNING KEYS'
[patent_app_type] => utility
[patent_app_number] => 13/150636
[patent_app_country] => US
[patent_app_date] => 2011-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7218
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13150636
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/150636 | SECURE MANAGEMENT AND PERSONALIZATION OF UNIQUE CODE SIGNING KEYS | May 31, 2011 | Abandoned |
Array
(
[id] => 8751111
[patent_doc_number] => 08416950
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-04-09
[patent_title] => 'Copy protection without non-volatile memory'
[patent_app_type] => utility
[patent_app_number] => 13/082271
[patent_app_country] => US
[patent_app_date] => 2011-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4650
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 228
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13082271
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/082271 | Copy protection without non-volatile memory | Apr 6, 2011 | Issued |
Array
(
[id] => 6105827
[patent_doc_number] => 20110167480
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-07-07
[patent_title] => 'TECHNIQUES FOR SECURE TRANSPARENT SWITCHING BETWEEN MODES OF A VIRTUAL PRIVATE NETWORK (VPN)'
[patent_app_type] => utility
[patent_app_number] => 13/046897
[patent_app_country] => US
[patent_app_date] => 2011-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5722
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0167/20110167480.pdf
[firstpage_image] =>[orig_patent_app_number] => 13046897
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/046897 | Techniques for secure transparent switching between modes of a virtual private network (VPN) | Mar 13, 2011 | Issued |
Array
(
[id] => 8189238
[patent_doc_number] => 20120117384
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-10
[patent_title] => 'METHOD AND SYSTEM FOR DELETING DATA'
[patent_app_type] => utility
[patent_app_number] => 12/942445
[patent_app_country] => US
[patent_app_date] => 2010-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5025
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0117/20120117384.pdf
[firstpage_image] =>[orig_patent_app_number] => 12942445
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/942445 | Method and system for deleting data | Nov 8, 2010 | Issued |
Array
(
[id] => 8059697
[patent_doc_number] => 20120079594
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-03-29
[patent_title] => 'MALWARE AUTO-ANALYSIS SYSTEM AND METHOD USING KERNEL CALLBACK MECHANISM'
[patent_app_type] => utility
[patent_app_number] => 12/942700
[patent_app_country] => US
[patent_app_date] => 2010-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 2501
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0079/20120079594.pdf
[firstpage_image] =>[orig_patent_app_number] => 12942700
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/942700 | MALWARE AUTO-ANALYSIS SYSTEM AND METHOD USING KERNEL CALLBACK MECHANISM | Nov 8, 2010 | Abandoned |