
Abdulhakim Nobahar
Examiner (ID: 11785)
| Most Active Art Unit | 2432 |
| Art Unit(s) | 2496, 2132, 2432 |
| Total Applications | 454 |
| Issued Applications | 327 |
| Pending Applications | 37 |
| Abandoned Applications | 91 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11267301
[patent_doc_number] => 09491623
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-08
[patent_title] => 'System and method for cloning a Wi-Fi access point'
[patent_app_type] => utility
[patent_app_number] => 14/712414
[patent_app_country] => US
[patent_app_date] => 2015-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 12306
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14712414
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/712414 | System and method for cloning a Wi-Fi access point | May 13, 2015 | Issued |
Array
(
[id] => 10576273
[patent_doc_number] => 09298920
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-29
[patent_title] => 'Classifying computer files as malware or whiteware'
[patent_app_type] => utility
[patent_app_number] => 14/705026
[patent_app_country] => US
[patent_app_date] => 2015-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4092
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 301
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705026
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/705026 | Classifying computer files as malware or whiteware | May 5, 2015 | Issued |
Array
(
[id] => 11181735
[patent_doc_number] => 09413746
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-09
[patent_title] => 'Extension point application and configuration of a login module'
[patent_app_type] => utility
[patent_app_number] => 14/666306
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 3383
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14666306
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/666306 | Extension point application and configuration of a login module | Mar 22, 2015 | Issued |
Array
(
[id] => 10552313
[patent_doc_number] => 09276955
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-01
[patent_title] => 'Hardware-logic based flow collector for distributed denial of service (DDoS) attack mitigation'
[patent_app_type] => utility
[patent_app_number] => 14/665523
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4268
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 436
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14665523
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/665523 | Hardware-logic based flow collector for distributed denial of service (DDoS) attack mitigation | Mar 22, 2015 | Issued |
Array
(
[id] => 10538796
[patent_doc_number] => 09264438
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-02-16
[patent_title] => 'Method of advertising using an electronic processor authorization challenge'
[patent_app_type] => utility
[patent_app_number] => 14/551626
[patent_app_country] => US
[patent_app_date] => 2014-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 5571
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 242
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14551626
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/551626 | Method of advertising using an electronic processor authorization challenge | Nov 23, 2014 | Issued |
Array
(
[id] => 10616921
[patent_doc_number] => 09336366
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-10
[patent_title] => 'Method and apparatus for identifying installed software and regulating access to content'
[patent_app_type] => utility
[patent_app_number] => 14/541766
[patent_app_country] => US
[patent_app_date] => 2014-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 11999
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14541766
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/541766 | Method and apparatus for identifying installed software and regulating access to content | Nov 13, 2014 | Issued |
Array
(
[id] => 9897170
[patent_doc_number] => 20150052368
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-19
[patent_title] => 'DIFFERENTIAL POWER ANALYSIS - RESISTANT CRYPTOGRAPHIC PROCESSING'
[patent_app_type] => utility
[patent_app_number] => 14/530905
[patent_app_country] => US
[patent_app_date] => 2014-11-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8783
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14530905
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/530905 | Differential power analysis—resistant cryptographic processing | Nov 2, 2014 | Issued |
Array
(
[id] => 9841285
[patent_doc_number] => 20150033367
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-29
[patent_title] => 'Solution for Continuous Control and Protection of Enterprise Data Based on Authorization Projection'
[patent_app_type] => utility
[patent_app_number] => 14/512052
[patent_app_country] => US
[patent_app_date] => 2014-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3080
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14512052
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/512052 | Solution for continuous control and protection of enterprise data based on authorization projection | Oct 9, 2014 | Issued |
| 14/488697 | HARDWARE-LOGIC BASED FLOW COLLECTOR FOR DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACK MITIGATION | Sep 16, 2014 | Abandoned |
Array
(
[id] => 10473266
[patent_doc_number] => 20150358283
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-10
[patent_title] => 'Firewall Policy Converter'
[patent_app_type] => utility
[patent_app_number] => 14/295912
[patent_app_country] => US
[patent_app_date] => 2014-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5468
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14295912
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/295912 | Firewall policy converter | Jun 3, 2014 | Issued |
Array
(
[id] => 9688241
[patent_doc_number] => 20140245007
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-28
[patent_title] => 'User Authentication System'
[patent_app_type] => utility
[patent_app_number] => 14/270120
[patent_app_country] => US
[patent_app_date] => 2014-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 16810
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14270120
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/270120 | User authentication system | May 4, 2014 | Issued |
Array
(
[id] => 9599467
[patent_doc_number] => 20140196148
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-10
[patent_title] => 'Methods and systems for preventing security breaches'
[patent_app_type] => utility
[patent_app_number] => 14/209093
[patent_app_country] => US
[patent_app_date] => 2014-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5545
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14209093
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/209093 | Methods and systems for preventing security breaches | Mar 12, 2014 | Issued |
Array
(
[id] => 9572171
[patent_doc_number] => 20140189884
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-03
[patent_title] => 'Lengthy Hosting Internet System'
[patent_app_type] => utility
[patent_app_number] => 14/174853
[patent_app_country] => US
[patent_app_date] => 2014-02-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 719
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14174853
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/174853 | Lengthy Hosting Internet System | Feb 6, 2014 | Abandoned |
Array
(
[id] => 10179915
[patent_doc_number] => 09210139
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-08
[patent_title] => 'Secure relay system'
[patent_app_type] => utility
[patent_app_number] => 14/169413
[patent_app_country] => US
[patent_app_date] => 2014-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6526
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14169413
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/169413 | Secure relay system | Jan 30, 2014 | Issued |
Array
(
[id] => 10605072
[patent_doc_number] => 09325647
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-26
[patent_title] => 'Message-handling server and method for handling secure message attachments for a mobile device'
[patent_app_type] => utility
[patent_app_number] => 14/100994
[patent_app_country] => US
[patent_app_date] => 2013-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7386
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14100994
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/100994 | Message-handling server and method for handling secure message attachments for a mobile device | Dec 8, 2013 | Issued |
Array
(
[id] => 9398486
[patent_doc_number] => 20140095892
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-03
[patent_title] => 'DIGITAL INFORMATION PROTECTING METHOD AND APPARATUS, AND COMPUTER ACCESSIBLE RECORDING MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 14/071300
[patent_app_country] => US
[patent_app_date] => 2013-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8782
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14071300
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/071300 | Digital information protecting method and apparatus, and computer accessible recording medium | Nov 3, 2013 | Issued |
Array
(
[id] => 9282939
[patent_doc_number] => 20140032907
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-30
[patent_title] => 'PROTOCOL FOR AUTHENTICATING FUNCTIONALITY IN A PERIPHERAL DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/051364
[patent_app_country] => US
[patent_app_date] => 2013-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8001
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14051364
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/051364 | Protocol for authenticating functionality in a peripheral device | Oct 9, 2013 | Issued |
Array
(
[id] => 10092284
[patent_doc_number] => 09129110
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-08
[patent_title] => 'Classifying computer files as malware or whiteware'
[patent_app_type] => utility
[patent_app_number] => 14/042592
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4059
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 275
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14042592
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/042592 | Classifying computer files as malware or whiteware | Sep 29, 2013 | Issued |
Array
(
[id] => 9372456
[patent_doc_number] => 20140082329
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-20
[patent_title] => 'CONTINUOUS RUN-TIME VALIDATION OF PROGRAM EXECUTION: A PRACTICAL APPROACH'
[patent_app_type] => utility
[patent_app_number] => 14/027362
[patent_app_country] => US
[patent_app_date] => 2013-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 16540
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027362
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/027362 | Continuous run-time validation of program execution: a practical approach | Sep 15, 2013 | Issued |
Array
(
[id] => 11781094
[patent_doc_number] => 09390280
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'System and method for obtaining keys to access protected information'
[patent_app_type] => utility
[patent_app_number] => 14/027425
[patent_app_country] => US
[patent_app_date] => 2013-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 7829
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027425
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/027425 | System and method for obtaining keys to access protected information | Sep 15, 2013 | Issued |