Search

Abdulhakim Nobahar

Examiner (ID: 11785)

Most Active Art Unit
2432
Art Unit(s)
2496, 2132, 2432
Total Applications
454
Issued Applications
327
Pending Applications
37
Abandoned Applications
91

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11267301 [patent_doc_number] => 09491623 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-11-08 [patent_title] => 'System and method for cloning a Wi-Fi access point' [patent_app_type] => utility [patent_app_number] => 14/712414 [patent_app_country] => US [patent_app_date] => 2015-05-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 12306 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 218 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14712414 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/712414
System and method for cloning a Wi-Fi access point May 13, 2015 Issued
Array ( [id] => 10576273 [patent_doc_number] => 09298920 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-03-29 [patent_title] => 'Classifying computer files as malware or whiteware' [patent_app_type] => utility [patent_app_number] => 14/705026 [patent_app_country] => US [patent_app_date] => 2015-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4092 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 301 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705026 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/705026
Classifying computer files as malware or whiteware May 5, 2015 Issued
Array ( [id] => 11181735 [patent_doc_number] => 09413746 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-08-09 [patent_title] => 'Extension point application and configuration of a login module' [patent_app_type] => utility [patent_app_number] => 14/666306 [patent_app_country] => US [patent_app_date] => 2015-03-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 3 [patent_no_of_words] => 3383 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 160 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14666306 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/666306
Extension point application and configuration of a login module Mar 22, 2015 Issued
Array ( [id] => 10552313 [patent_doc_number] => 09276955 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-03-01 [patent_title] => 'Hardware-logic based flow collector for distributed denial of service (DDoS) attack mitigation' [patent_app_type] => utility [patent_app_number] => 14/665523 [patent_app_country] => US [patent_app_date] => 2015-03-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4268 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 436 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14665523 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/665523
Hardware-logic based flow collector for distributed denial of service (DDoS) attack mitigation Mar 22, 2015 Issued
Array ( [id] => 10538796 [patent_doc_number] => 09264438 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-02-16 [patent_title] => 'Method of advertising using an electronic processor authorization challenge' [patent_app_type] => utility [patent_app_number] => 14/551626 [patent_app_country] => US [patent_app_date] => 2014-11-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 5571 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 242 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14551626 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/551626
Method of advertising using an electronic processor authorization challenge Nov 23, 2014 Issued
Array ( [id] => 10616921 [patent_doc_number] => 09336366 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-05-10 [patent_title] => 'Method and apparatus for identifying installed software and regulating access to content' [patent_app_type] => utility [patent_app_number] => 14/541766 [patent_app_country] => US [patent_app_date] => 2014-11-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 11999 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14541766 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/541766
Method and apparatus for identifying installed software and regulating access to content Nov 13, 2014 Issued
Array ( [id] => 9897170 [patent_doc_number] => 20150052368 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-19 [patent_title] => 'DIFFERENTIAL POWER ANALYSIS - RESISTANT CRYPTOGRAPHIC PROCESSING' [patent_app_type] => utility [patent_app_number] => 14/530905 [patent_app_country] => US [patent_app_date] => 2014-11-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 8783 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14530905 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/530905
Differential power analysis—resistant cryptographic processing Nov 2, 2014 Issued
Array ( [id] => 9841285 [patent_doc_number] => 20150033367 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-29 [patent_title] => 'Solution for Continuous Control and Protection of Enterprise Data Based on Authorization Projection' [patent_app_type] => utility [patent_app_number] => 14/512052 [patent_app_country] => US [patent_app_date] => 2014-10-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3080 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14512052 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/512052
Solution for continuous control and protection of enterprise data based on authorization projection Oct 9, 2014 Issued
14/488697 HARDWARE-LOGIC BASED FLOW COLLECTOR FOR DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACK MITIGATION Sep 16, 2014 Abandoned
Array ( [id] => 10473266 [patent_doc_number] => 20150358283 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-10 [patent_title] => 'Firewall Policy Converter' [patent_app_type] => utility [patent_app_number] => 14/295912 [patent_app_country] => US [patent_app_date] => 2014-06-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5468 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14295912 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/295912
Firewall policy converter Jun 3, 2014 Issued
Array ( [id] => 9688241 [patent_doc_number] => 20140245007 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-08-28 [patent_title] => 'User Authentication System' [patent_app_type] => utility [patent_app_number] => 14/270120 [patent_app_country] => US [patent_app_date] => 2014-05-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 16810 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14270120 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/270120
User authentication system May 4, 2014 Issued
Array ( [id] => 9599467 [patent_doc_number] => 20140196148 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-10 [patent_title] => 'Methods and systems for preventing security breaches' [patent_app_type] => utility [patent_app_number] => 14/209093 [patent_app_country] => US [patent_app_date] => 2014-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5545 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14209093 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/209093
Methods and systems for preventing security breaches Mar 12, 2014 Issued
Array ( [id] => 9572171 [patent_doc_number] => 20140189884 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-03 [patent_title] => 'Lengthy Hosting Internet System' [patent_app_type] => utility [patent_app_number] => 14/174853 [patent_app_country] => US [patent_app_date] => 2014-02-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 719 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14174853 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/174853
Lengthy Hosting Internet System Feb 6, 2014 Abandoned
Array ( [id] => 10179915 [patent_doc_number] => 09210139 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-08 [patent_title] => 'Secure relay system' [patent_app_type] => utility [patent_app_number] => 14/169413 [patent_app_country] => US [patent_app_date] => 2014-01-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6526 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 154 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14169413 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/169413
Secure relay system Jan 30, 2014 Issued
Array ( [id] => 10605072 [patent_doc_number] => 09325647 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-04-26 [patent_title] => 'Message-handling server and method for handling secure message attachments for a mobile device' [patent_app_type] => utility [patent_app_number] => 14/100994 [patent_app_country] => US [patent_app_date] => 2013-12-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7386 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 187 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14100994 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/100994
Message-handling server and method for handling secure message attachments for a mobile device Dec 8, 2013 Issued
Array ( [id] => 9398486 [patent_doc_number] => 20140095892 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-04-03 [patent_title] => 'DIGITAL INFORMATION PROTECTING METHOD AND APPARATUS, AND COMPUTER ACCESSIBLE RECORDING MEDIUM' [patent_app_type] => utility [patent_app_number] => 14/071300 [patent_app_country] => US [patent_app_date] => 2013-11-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 8782 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14071300 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/071300
Digital information protecting method and apparatus, and computer accessible recording medium Nov 3, 2013 Issued
Array ( [id] => 9282939 [patent_doc_number] => 20140032907 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-01-30 [patent_title] => 'PROTOCOL FOR AUTHENTICATING FUNCTIONALITY IN A PERIPHERAL DEVICE' [patent_app_type] => utility [patent_app_number] => 14/051364 [patent_app_country] => US [patent_app_date] => 2013-10-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8001 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14051364 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/051364
Protocol for authenticating functionality in a peripheral device Oct 9, 2013 Issued
Array ( [id] => 10092284 [patent_doc_number] => 09129110 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-09-08 [patent_title] => 'Classifying computer files as malware or whiteware' [patent_app_type] => utility [patent_app_number] => 14/042592 [patent_app_country] => US [patent_app_date] => 2013-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4059 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 275 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14042592 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/042592
Classifying computer files as malware or whiteware Sep 29, 2013 Issued
Array ( [id] => 9372456 [patent_doc_number] => 20140082329 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-03-20 [patent_title] => 'CONTINUOUS RUN-TIME VALIDATION OF PROGRAM EXECUTION: A PRACTICAL APPROACH' [patent_app_type] => utility [patent_app_number] => 14/027362 [patent_app_country] => US [patent_app_date] => 2013-09-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 16540 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027362 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/027362
Continuous run-time validation of program execution: a practical approach Sep 15, 2013 Issued
Array ( [id] => 11781094 [patent_doc_number] => 09390280 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-07-12 [patent_title] => 'System and method for obtaining keys to access protected information' [patent_app_type] => utility [patent_app_number] => 14/027425 [patent_app_country] => US [patent_app_date] => 2013-09-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 7829 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 184 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027425 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/027425
System and method for obtaining keys to access protected information Sep 15, 2013 Issued
Menu