Ishrat Rashid
Examiner (ID: 16964, Phone: (571)272-5372 , Office: P/2459 )
Most Active Art Unit | 2459 |
Art Unit(s) | 2459 |
Total Applications | 206 |
Issued Applications | 90 |
Pending Applications | 41 |
Abandoned Applications | 75 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 10419299
[patent_doc_number] => 20150304310
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-22
[patent_title] => 'REVOCABLE SHREDDING OF SECURITY CREDENTIALS'
[patent_app_type] => utility
[patent_app_number] => 14/754321
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7688
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14754321
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/754321 | Revocable shredding of security credentials | Jun 28, 2015 | Issued |
Array
(
[id] => 11280539
[patent_doc_number] => 09497026
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-15
[patent_title] => 'Authorizing removable medium access'
[patent_app_type] => utility
[patent_app_number] => 14/717842
[patent_app_country] => US
[patent_app_date] => 2015-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 11
[patent_no_of_words] => 6646
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14717842
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/717842 | Authorizing removable medium access | May 19, 2015 | Issued |
Array
(
[id] => 10403691
[patent_doc_number] => 20150288701
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'INVITATION LINKS WITH ENHANCED PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 14/674225
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 6473
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674225
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674225 | Invitation links with enhanced protection | Mar 30, 2015 | Issued |
Array
(
[id] => 11097888
[patent_doc_number] => 20160294857
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'DETERMINING INTERNET-BASED OBJECT INFORMATION USING PUBLIC INTERNET SEARCH'
[patent_app_type] => utility
[patent_app_number] => 14/674122
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8449
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674122
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674122 | Determining internet-based object information using public internet search | Mar 30, 2015 | Issued |
Array
(
[id] => 11616624
[patent_doc_number] => 09654496
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-05-16
[patent_title] => 'Obtaining suspect objects based on detecting suspicious activity'
[patent_app_type] => utility
[patent_app_number] => 14/674269
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6382
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674269
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674269 | Obtaining suspect objects based on detecting suspicious activity | Mar 30, 2015 | Issued |
Array
(
[id] => 11097879
[patent_doc_number] => 20160294849
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'DETECTING SUSPICIOUS FILES RESIDENT ON A NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/674113
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8300
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674113
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674113 | Detecting suspicious files resident on a network | Mar 30, 2015 | Issued |
Array
(
[id] => 11095484
[patent_doc_number] => 20160292453
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'HEALTH CARE INFORMATION SYSTEM AND METHOD FOR SECURELY STORING AND CONTROLLING ACCESS TO HEALTH CARE DATA'
[patent_app_type] => utility
[patent_app_number] => 14/673949
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9730
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14673949
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/673949 | HEALTH CARE INFORMATION SYSTEM AND METHOD FOR SECURELY STORING AND CONTROLLING ACCESS TO HEALTH CARE DATA | Mar 30, 2015 | Abandoned |
Array
(
[id] => 12174121
[patent_doc_number] => 09892265
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-02-13
[patent_title] => 'Protecting virtual machine data in cloud environments'
[patent_app_type] => utility
[patent_app_number] => 14/674205
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8203
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674205
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674205 | Protecting virtual machine data in cloud environments | Mar 30, 2015 | Issued |
Array
(
[id] => 11095452
[patent_doc_number] => 20160292421
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'DETECTING KEYLOGGING'
[patent_app_type] => utility
[patent_app_number] => 14/674426
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8363
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674426
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674426 | Detecting keylogging | Mar 30, 2015 | Issued |
Array
(
[id] => 13147751
[patent_doc_number] => 10091222
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-10-02
[patent_title] => Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs
[patent_app_type] => utility
[patent_app_number] => 14/674251
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8476
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674251
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674251 | Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs | Mar 30, 2015 | Issued |
Array
(
[id] => 12292290
[patent_doc_number] => 09934443
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-03
[patent_title] => Methods and systems for detecting head motion during an authentication transaction
[patent_app_type] => utility
[patent_app_number] => 14/674258
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 19
[patent_no_of_words] => 8845
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14674258
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/674258 | Methods and systems for detecting head motion during an authentication transaction | Mar 30, 2015 | Issued |
Array
(
[id] => 11097865
[patent_doc_number] => 20160294835
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'Initiating a Secure Action Via Physical Manipulation'
[patent_app_type] => utility
[patent_app_number] => 14/673969
[patent_app_country] => US
[patent_app_date] => 2015-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5255
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14673969
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/673969 | Initiating a Secure Action Via Physical Manipulation | Mar 30, 2015 | Abandoned |
Array
(
[id] => 10584612
[patent_doc_number] => 09306744
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-05
[patent_title] => 'Video cryptography system and method'
[patent_app_type] => utility
[patent_app_number] => 14/642747
[patent_app_country] => US
[patent_app_date] => 2015-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 12159
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14642747
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/642747 | Video cryptography system and method | Mar 8, 2015 | Issued |
Array
(
[id] => 10357610
[patent_doc_number] => 20150242615
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'METHODS FOR CONTROLLING THE USE OF INTELLECTUAL PROPERTY IN INDIVIDUAL INTEGRATED CIRCUIT DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/632860
[patent_app_country] => US
[patent_app_date] => 2015-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10656
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14632860
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/632860 | Methods for controlling the use of intellectual property in individual integrated circuit devices | Feb 25, 2015 | Issued |
Array
(
[id] => 10719407
[patent_doc_number] => 20160065553
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'METHOD, SYSTEM AND RECORDING MEDIUM FOR SERVICE ACCOUNT AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/632807
[patent_app_country] => US
[patent_app_date] => 2015-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7861
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14632807
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/632807 | Method, system and recording medium for service account authentication | Feb 25, 2015 | Issued |
Array
(
[id] => 10357615
[patent_doc_number] => 20150242620
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'METHODS FOR CONTROLLING THE USE OF INTELLECTUAL PROPERTY IN INDIVIDUAL INTEGRATED CIRCUIT DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/630901
[patent_app_country] => US
[patent_app_date] => 2015-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10641
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14630901
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/630901 | METHODS FOR CONTROLLING THE USE OF INTELLECTUAL PROPERTY IN INDIVIDUAL INTEGRATED CIRCUIT DEVICES | Feb 24, 2015 | Abandoned |
Array
(
[id] => 11397254
[patent_doc_number] => 20170017790
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-19
[patent_title] => 'Secured Comparative Processing Method'
[patent_app_type] => utility
[patent_app_number] => 15/107879
[patent_app_country] => US
[patent_app_date] => 2014-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3241
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15107879
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/107879 | Secured comparative processing method | Dec 22, 2014 | Issued |
Array
(
[id] => 10741825
[patent_doc_number] => 20160087976
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'TECHNOLOGIES FOR SENSOR ACTION VERIFICATION'
[patent_app_type] => utility
[patent_app_number] => 14/495059
[patent_app_country] => US
[patent_app_date] => 2014-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11599
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14495059
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/495059 | Technologies for sensor action verification | Sep 23, 2014 | Issued |
Array
(
[id] => 10741640
[patent_doc_number] => 20160087791
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'COMPUTATION OF HASH VALUE FOR A MESSAGE BASED ON RECEIVED PORTIONS OF THE MESSAGE'
[patent_app_type] => utility
[patent_app_number] => 14/494649
[patent_app_country] => US
[patent_app_date] => 2014-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5907
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494649
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494649 | COMPUTATION OF HASH VALUE FOR A MESSAGE BASED ON RECEIVED PORTIONS OF THE MESSAGE | Sep 23, 2014 | Abandoned |
Array
(
[id] => 10741647
[patent_doc_number] => 20160087798
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'COMPUTATION OF HASH VALUE FOR A MESSAGE BASED ON RECEIVED PORTIONS OF THE MESSAGE'
[patent_app_type] => utility
[patent_app_number] => 14/494654
[patent_app_country] => US
[patent_app_date] => 2014-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5905
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14494654
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/494654 | COMPUTATION OF HASH VALUE FOR A MESSAGE BASED ON RECEIVED PORTIONS OF THE MESSAGE | Sep 23, 2014 | Abandoned |