
Abu S. Sholeman
Examiner (ID: 4200, Phone: (571)270-7314 , Office: P/2495 )
| Most Active Art Unit | 2495 |
| Art Unit(s) | 2495, 2496, 2437 |
| Total Applications | 835 |
| Issued Applications | 619 |
| Pending Applications | 73 |
| Abandoned Applications | 164 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14556323
[patent_doc_number] => 10346623
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-07-09
[patent_title] => Service defense techniques
[patent_app_type] => utility
[patent_app_number] => 14/675347
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11076
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14675347
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/675347 | Service defense techniques | Mar 30, 2015 | Issued |
Array
(
[id] => 11097873
[patent_doc_number] => 20160294843
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'DIGITAL CONTENT ACCESS CONTROL'
[patent_app_type] => utility
[patent_app_number] => 14/675366
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10767
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14675366
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/675366 | Digital content access control | Mar 30, 2015 | Issued |
Array
(
[id] => 11086740
[patent_doc_number] => 20160283707
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-29
[patent_title] => 'METHOD OF UNLOCKING TOUCHSCREEN USING SEQUENTIAL GESTURES'
[patent_app_type] => utility
[patent_app_number] => 14/664920
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 1938
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14664920
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/664920 | METHOD OF UNLOCKING TOUCHSCREEN USING SEQUENTIAL GESTURES | Mar 22, 2015 | Abandoned |
Array
(
[id] => 10310247
[patent_doc_number] => 20150195248
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-09
[patent_title] => 'Computer or microchip controlled by a firewall-protected master controlling microprocessor and firmware'
[patent_app_type] => utility
[patent_app_number] => 14/661521
[patent_app_country] => US
[patent_app_date] => 2015-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 31
[patent_no_of_words] => 33047
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14661521
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/661521 | Computer or microchip controlled by a firewall-protected master controlling microprocessor and firmware | Mar 17, 2015 | Issued |
Array
(
[id] => 10310271
[patent_doc_number] => 20150195273
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-09
[patent_title] => 'UPDATING STORED PASSWORDS'
[patent_app_type] => utility
[patent_app_number] => 14/659618
[patent_app_country] => US
[patent_app_date] => 2015-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5220
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14659618
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/659618 | Updating stored passwords | Mar 16, 2015 | Issued |
Array
(
[id] => 11072414
[patent_doc_number] => 20160269378
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-15
[patent_title] => 'First Artificial Intelligence Methods and Systems for Asset Trendspotting (PNN), Cyber Security (DeepCyber), and Portable Big Data Cloud (MCPS)'
[patent_app_type] => utility
[patent_app_number] => 14/658156
[patent_app_country] => US
[patent_app_date] => 2015-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 38
[patent_figures_cnt] => 38
[patent_no_of_words] => 5038
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 15
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14658156
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/658156 | First Artificial Intelligence Methods and Systems for Asset Trendspotting (PNN), Cyber Security (DeepCyber), and Portable Big Data Cloud (MCPS) | Mar 13, 2015 | Abandoned |
Array
(
[id] => 11072457
[patent_doc_number] => 20160269421
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-15
[patent_title] => 'Method for network security using statistical object identification'
[patent_app_type] => utility
[patent_app_number] => 14/544987
[patent_app_country] => US
[patent_app_date] => 2015-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 8021
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14544987
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/544987 | Method for network security using statistical object identification | Mar 10, 2015 | Abandoned |
Array
(
[id] => 10349713
[patent_doc_number] => 20150234718
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-20
[patent_title] => 'SYSTEM AND METHOD FOR KERNEL ROOTKIT PROTECTION IN A HYPERVISOR ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/629574
[patent_app_country] => US
[patent_app_date] => 2015-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6154
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14629574
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/629574 | System and method for kernel rootkit protection in a hypervisor environment | Feb 23, 2015 | Issued |
Array
(
[id] => 11234581
[patent_doc_number] => 09461826
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-04
[patent_title] => 'Tamper-protected hardware and method for using same'
[patent_app_type] => utility
[patent_app_number] => 14/624180
[patent_app_country] => US
[patent_app_date] => 2015-02-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 22
[patent_no_of_words] => 43469
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14624180
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/624180 | Tamper-protected hardware and method for using same | Feb 16, 2015 | Issued |
Array
(
[id] => 10166425
[patent_doc_number] => 09197664
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-11-24
[patent_title] => 'System and method for malware containment'
[patent_app_type] => utility
[patent_app_number] => 14/620060
[patent_app_country] => US
[patent_app_date] => 2015-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9680
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620060
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/620060 | System and method for malware containment | Feb 10, 2015 | Issued |
Array
(
[id] => 10584837
[patent_doc_number] => 09306974
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-04-05
[patent_title] => 'System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits'
[patent_app_type] => utility
[patent_app_number] => 14/620055
[patent_app_country] => US
[patent_app_date] => 2015-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 13518
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620055
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/620055 | System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits | Feb 10, 2015 | Issued |
Array
(
[id] => 10666092
[patent_doc_number] => 20160012235
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-14
[patent_title] => 'ANALYSIS AND DISPLAY OF CYBERSECURITY RISKS FOR ENTERPRISE DATA'
[patent_app_type] => utility
[patent_app_number] => 14/619063
[patent_app_country] => US
[patent_app_date] => 2015-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 23381
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14619063
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/619063 | ANALYSIS AND DISPLAY OF CYBERSECURITY RISKS FOR ENTERPRISE DATA | Feb 9, 2015 | |
Array
(
[id] => 11272911
[patent_doc_number] => 20160335459
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'MULTI-LEVEL SECURITY DOMAIN SEPARATION USING SOFT-CORE PROCESSOR EMBEDDED IN AN FPGA'
[patent_app_type] => utility
[patent_app_number] => 14/603215
[patent_app_country] => US
[patent_app_date] => 2015-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4857
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14603215
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/603215 | Multi-level security domain separation using soft-core processor embedded in an FPGA | Jan 21, 2015 | Issued |
Array
(
[id] => 11490167
[patent_doc_number] => 09596246
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-14
[patent_title] => 'Provisioning access to customer organization data in a multi-tenant system'
[patent_app_type] => utility
[patent_app_number] => 14/600525
[patent_app_country] => US
[patent_app_date] => 2015-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 13858
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14600525
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/600525 | Provisioning access to customer organization data in a multi-tenant system | Jan 19, 2015 | Issued |
Array
(
[id] => 10250284
[patent_doc_number] => 20150135280
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-14
[patent_title] => 'Managing Social Network Accessibility Based on Age'
[patent_app_type] => utility
[patent_app_number] => 14/599443
[patent_app_country] => US
[patent_app_date] => 2015-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11377
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14599443
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/599443 | Managing social network accessibility based on age | Jan 15, 2015 | Issued |
Array
(
[id] => 12950863
[patent_doc_number] => 09836414
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-12-05
[patent_title] => Apparatus and method for hardware-based secure data processing using buffer memory address range rules
[patent_app_type] => utility
[patent_app_number] => 14/572520
[patent_app_country] => US
[patent_app_date] => 2014-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 4675
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14572520
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/572520 | Apparatus and method for hardware-based secure data processing using buffer memory address range rules | Dec 15, 2014 | Issued |
Array
(
[id] => 10203770
[patent_doc_number] => 20150088759
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'Tokenizing Sensitive Data'
[patent_app_type] => utility
[patent_app_number] => 14/563076
[patent_app_country] => US
[patent_app_date] => 2014-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 4859
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14563076
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/563076 | Tokenizing sensitive data | Dec 7, 2014 | Issued |
Array
(
[id] => 10258543
[patent_doc_number] => 20150143540
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-21
[patent_title] => 'SYSTEM AND METHOD FOR SELECTIVELY REDACTING INFORMATION IN ELECTRONIC DOCUMENTS'
[patent_app_type] => utility
[patent_app_number] => 14/540549
[patent_app_country] => US
[patent_app_date] => 2014-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5743
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14540549
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/540549 | SYSTEM AND METHOD FOR SELECTIVELY REDACTING INFORMATION IN ELECTRONIC DOCUMENTS | Nov 12, 2014 | Abandoned |
Array
(
[id] => 15252131
[patent_doc_number] => 10511601
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-12-17
[patent_title] => Security control method for social network user, social application device and terminal
[patent_app_type] => utility
[patent_app_number] => 15/510311
[patent_app_country] => US
[patent_app_date] => 2014-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 4495
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15510311
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/510311 | Security control method for social network user, social application device and terminal | Nov 12, 2014 | Issued |
Array
(
[id] => 9860230
[patent_doc_number] => 20150040247
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-05
[patent_title] => 'METHOD AND APPARATUS FOR INFORMATION CARRIER AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/517848
[patent_app_country] => US
[patent_app_date] => 2014-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7522
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14517848
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/517848 | Method and apparatus for information carrier authentication | Oct 17, 2014 | Issued |