Search

Ishrat Rashid

Examiner (ID: 16964, Phone: (571)272-5372 , Office: P/2459 )

Most Active Art Unit
2459
Art Unit(s)
2459
Total Applications
206
Issued Applications
90
Pending Applications
41
Abandoned Applications
75

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10419299 [patent_doc_number] => 20150304310 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-22 [patent_title] => 'REVOCABLE SHREDDING OF SECURITY CREDENTIALS' [patent_app_type] => utility [patent_app_number] => 14/754321 [patent_app_country] => US [patent_app_date] => 2015-06-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7688 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14754321 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/754321
Revocable shredding of security credentials Jun 28, 2015 Issued
Array ( [id] => 11280539 [patent_doc_number] => 09497026 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-11-15 [patent_title] => 'Authorizing removable medium access' [patent_app_type] => utility [patent_app_number] => 14/717842 [patent_app_country] => US [patent_app_date] => 2015-05-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 11 [patent_no_of_words] => 6646 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14717842 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/717842
Authorizing removable medium access May 19, 2015 Issued
Array ( [id] => 10403691 [patent_doc_number] => 20150288701 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-08 [patent_title] => 'INVITATION LINKS WITH ENHANCED PROTECTION' [patent_app_type] => utility [patent_app_number] => 14/674225 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 6473 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674225 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/674225
Invitation links with enhanced protection Mar 30, 2015 Issued
Array ( [id] => 11097888 [patent_doc_number] => 20160294857 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-06 [patent_title] => 'DETERMINING INTERNET-BASED OBJECT INFORMATION USING PUBLIC INTERNET SEARCH' [patent_app_type] => utility [patent_app_number] => 14/674122 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8449 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674122 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/674122
Determining internet-based object information using public internet search Mar 30, 2015 Issued
Array ( [id] => 11616624 [patent_doc_number] => 09654496 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-05-16 [patent_title] => 'Obtaining suspect objects based on detecting suspicious activity' [patent_app_type] => utility [patent_app_number] => 14/674269 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6382 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 102 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674269 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/674269
Obtaining suspect objects based on detecting suspicious activity Mar 30, 2015 Issued
Array ( [id] => 11097879 [patent_doc_number] => 20160294849 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-06 [patent_title] => 'DETECTING SUSPICIOUS FILES RESIDENT ON A NETWORK' [patent_app_type] => utility [patent_app_number] => 14/674113 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 8300 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674113 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/674113
Detecting suspicious files resident on a network Mar 30, 2015 Issued
Array ( [id] => 11095484 [patent_doc_number] => 20160292453 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-06 [patent_title] => 'HEALTH CARE INFORMATION SYSTEM AND METHOD FOR SECURELY STORING AND CONTROLLING ACCESS TO HEALTH CARE DATA' [patent_app_type] => utility [patent_app_number] => 14/673949 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9730 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14673949 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/673949
HEALTH CARE INFORMATION SYSTEM AND METHOD FOR SECURELY STORING AND CONTROLLING ACCESS TO HEALTH CARE DATA Mar 30, 2015 Abandoned
Array ( [id] => 12174121 [patent_doc_number] => 09892265 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-02-13 [patent_title] => 'Protecting virtual machine data in cloud environments' [patent_app_type] => utility [patent_app_number] => 14/674205 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 8203 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 134 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674205 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/674205
Protecting virtual machine data in cloud environments Mar 30, 2015 Issued
Array ( [id] => 11095452 [patent_doc_number] => 20160292421 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-06 [patent_title] => 'DETECTING KEYLOGGING' [patent_app_type] => utility [patent_app_number] => 14/674426 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 8363 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674426 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/674426
Detecting keylogging Mar 30, 2015 Issued
Array ( [id] => 13147751 [patent_doc_number] => 10091222 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-10-02 [patent_title] => Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs [patent_app_type] => utility [patent_app_number] => 14/674251 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 8476 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674251 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/674251
Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs Mar 30, 2015 Issued
Array ( [id] => 12292290 [patent_doc_number] => 09934443 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-04-03 [patent_title] => Methods and systems for detecting head motion during an authentication transaction [patent_app_type] => utility [patent_app_number] => 14/674258 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 19 [patent_no_of_words] => 8845 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 175 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674258 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/674258
Methods and systems for detecting head motion during an authentication transaction Mar 30, 2015 Issued
Array ( [id] => 11097865 [patent_doc_number] => 20160294835 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-10-06 [patent_title] => 'Initiating a Secure Action Via Physical Manipulation' [patent_app_type] => utility [patent_app_number] => 14/673969 [patent_app_country] => US [patent_app_date] => 2015-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5255 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14673969 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/673969
Initiating a Secure Action Via Physical Manipulation Mar 30, 2015 Abandoned
Array ( [id] => 10584612 [patent_doc_number] => 09306744 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-04-05 [patent_title] => 'Video cryptography system and method' [patent_app_type] => utility [patent_app_number] => 14/642747 [patent_app_country] => US [patent_app_date] => 2015-03-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 24 [patent_figures_cnt] => 24 [patent_no_of_words] => 12159 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 217 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14642747 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/642747
Video cryptography system and method Mar 8, 2015 Issued
Array ( [id] => 10357610 [patent_doc_number] => 20150242615 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-08-27 [patent_title] => 'METHODS FOR CONTROLLING THE USE OF INTELLECTUAL PROPERTY IN INDIVIDUAL INTEGRATED CIRCUIT DEVICES' [patent_app_type] => utility [patent_app_number] => 14/632860 [patent_app_country] => US [patent_app_date] => 2015-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10656 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14632860 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/632860
Methods for controlling the use of intellectual property in individual integrated circuit devices Feb 25, 2015 Issued
Array ( [id] => 10719407 [patent_doc_number] => 20160065553 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-03 [patent_title] => 'METHOD, SYSTEM AND RECORDING MEDIUM FOR SERVICE ACCOUNT AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 14/632807 [patent_app_country] => US [patent_app_date] => 2015-02-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 7861 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14632807 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/632807
Method, system and recording medium for service account authentication Feb 25, 2015 Issued
Array ( [id] => 10357615 [patent_doc_number] => 20150242620 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-08-27 [patent_title] => 'METHODS FOR CONTROLLING THE USE OF INTELLECTUAL PROPERTY IN INDIVIDUAL INTEGRATED CIRCUIT DEVICES' [patent_app_type] => utility [patent_app_number] => 14/630901 [patent_app_country] => US [patent_app_date] => 2015-02-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10641 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14630901 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/630901
METHODS FOR CONTROLLING THE USE OF INTELLECTUAL PROPERTY IN INDIVIDUAL INTEGRATED CIRCUIT DEVICES Feb 24, 2015 Abandoned
Array ( [id] => 11397254 [patent_doc_number] => 20170017790 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-01-19 [patent_title] => 'Secured Comparative Processing Method' [patent_app_type] => utility [patent_app_number] => 15/107879 [patent_app_country] => US [patent_app_date] => 2014-12-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3241 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15107879 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/107879
Secured comparative processing method Dec 22, 2014 Issued
Array ( [id] => 10741825 [patent_doc_number] => 20160087976 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-24 [patent_title] => 'TECHNOLOGIES FOR SENSOR ACTION VERIFICATION' [patent_app_type] => utility [patent_app_number] => 14/495059 [patent_app_country] => US [patent_app_date] => 2014-09-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 11599 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14495059 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/495059
Technologies for sensor action verification Sep 23, 2014 Issued
Array ( [id] => 10741640 [patent_doc_number] => 20160087791 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-24 [patent_title] => 'COMPUTATION OF HASH VALUE FOR A MESSAGE BASED ON RECEIVED PORTIONS OF THE MESSAGE' [patent_app_type] => utility [patent_app_number] => 14/494649 [patent_app_country] => US [patent_app_date] => 2014-09-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 5907 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494649 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/494649
COMPUTATION OF HASH VALUE FOR A MESSAGE BASED ON RECEIVED PORTIONS OF THE MESSAGE Sep 23, 2014 Abandoned
Array ( [id] => 10741647 [patent_doc_number] => 20160087798 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-24 [patent_title] => 'COMPUTATION OF HASH VALUE FOR A MESSAGE BASED ON RECEIVED PORTIONS OF THE MESSAGE' [patent_app_type] => utility [patent_app_number] => 14/494654 [patent_app_country] => US [patent_app_date] => 2014-09-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 5905 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494654 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/494654
COMPUTATION OF HASH VALUE FOR A MESSAGE BASED ON RECEIVED PORTIONS OF THE MESSAGE Sep 23, 2014 Abandoned
Menu