Search

Ishrat Rashid

Examiner (ID: 16964, Phone: (571)272-5372 , Office: P/2459 )

Most Active Art Unit
2459
Art Unit(s)
2459
Total Applications
206
Issued Applications
90
Pending Applications
41
Abandoned Applications
75

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 15549665 [patent_doc_number] => 10574630 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-02-25 [patent_title] => Methods and apparatus for malware threat research [patent_app_type] => utility [patent_app_number] => 13/372433 [patent_app_country] => US [patent_app_date] => 2012-02-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 15812 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 308 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13372433 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/372433
Methods and apparatus for malware threat research Feb 12, 2012 Issued
Array ( [id] => 8443687 [patent_doc_number] => 20120260304 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-10-11 [patent_title] => 'METHODS AND APPARATUS FOR AGENT-BASED MALWARE MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 13/372439 [patent_app_country] => US [patent_app_date] => 2012-02-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 14829 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13372439 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/372439
METHODS AND APPARATUS FOR AGENT-BASED MALWARE MANAGEMENT Feb 12, 2012 Abandoned
13/371194 SECURITY FOR CLOUD COMPUTING BASED ON DETECTION OF ABNORMAL USE COUPLED WITH USE OF DECOYS Feb 9, 2012 Abandoned
Array ( [id] => 10015461 [patent_doc_number] => 09058475 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-06-16 [patent_title] => 'Account creating and authenticating method' [patent_app_type] => utility [patent_app_number] => 13/369539 [patent_app_country] => US [patent_app_date] => 2012-02-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 11 [patent_no_of_words] => 5572 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 273 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13369539 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/369539
Account creating and authenticating method Feb 8, 2012 Issued
Array ( [id] => 8868491 [patent_doc_number] => 20130152194 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-06-13 [patent_title] => 'SYSTEM, METHOD AND SOFTWARE FOR CONTROLLING ACCESS TO VIRTUAL MACHINE CONSOLES' [patent_app_type] => utility [patent_app_number] => 13/313130 [patent_app_country] => US [patent_app_date] => 2011-12-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3736 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13313130 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/313130
SYSTEM, METHOD AND SOFTWARE FOR CONTROLLING ACCESS TO VIRTUAL MACHINE CONSOLES Dec 6, 2011 Abandoned
Array ( [id] => 9289735 [patent_doc_number] => 08646094 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-02-04 [patent_title] => 'Method and apparatus for preventing unauthorized access to information stored in a non-volatile memory' [patent_app_type] => utility [patent_app_number] => 13/314167 [patent_app_country] => US [patent_app_date] => 2011-12-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 7 [patent_no_of_words] => 4876 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 333 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13314167 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/314167
Method and apparatus for preventing unauthorized access to information stored in a non-volatile memory Dec 6, 2011 Issued
Array ( [id] => 10835090 [patent_doc_number] => 08863292 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-10-14 [patent_title] => 'Interactive analysis of a security specification' [patent_app_type] => utility [patent_app_number] => 13/313757 [patent_app_country] => US [patent_app_date] => 2011-12-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 4483 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 151 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13313757 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/313757
Interactive analysis of a security specification Dec 6, 2011 Issued
Array ( [id] => 10120058 [patent_doc_number] => 09154958 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-06 [patent_title] => 'Security system for cloud computing' [patent_app_type] => utility [patent_app_number] => 13/313882 [patent_app_country] => US [patent_app_date] => 2011-12-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4153 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13313882 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/313882
Security system for cloud computing Dec 6, 2011 Issued
Array ( [id] => 10079243 [patent_doc_number] => 09117091 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-08-25 [patent_title] => 'System and method for securing virtual computing environments' [patent_app_type] => utility [patent_app_number] => 13/882478 [patent_app_country] => US [patent_app_date] => 2011-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 12426 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 69 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13882478 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/882478
System and method for securing virtual computing environments Oct 27, 2011 Issued
Array ( [id] => 8978948 [patent_doc_number] => 20130212378 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-08-15 [patent_title] => 'METHOD FOR MANAGING KEYS IN A MANIPULATION-PROOF MANNER' [patent_app_type] => utility [patent_app_number] => 13/882238 [patent_app_country] => US [patent_app_date] => 2011-10-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4263 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13882238 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/882238
Method for managing keys in a manipulation-proof manner Oct 23, 2011 Issued
Array ( [id] => 8813772 [patent_doc_number] => 20130114815 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-05-09 [patent_title] => 'SECRET SHARING SYSTEM, SHARING APPARATUS, SHARE MANAGEMENT APPARATUS, ACQUISITION APPARATUS, SECRET SHARING METHOD, PROGRAM AND RECORDING MEDIUM' [patent_app_type] => utility [patent_app_number] => 13/810509 [patent_app_country] => US [patent_app_date] => 2011-07-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 29 [patent_figures_cnt] => 29 [patent_no_of_words] => 29632 [patent_no_of_claims] => 33 [patent_no_of_ind_claims] => 9 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13810509 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/810509
Secret sharing system, sharing apparatus, share management apparatus, acquisition apparatus, secret sharing method, program and recording medium Jul 21, 2011 Issued
Array ( [id] => 8661488 [patent_doc_number] => 20130042318 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-02-14 [patent_title] => 'Authentication System and Method Using Arrays' [patent_app_type] => utility [patent_app_number] => 13/639117 [patent_app_country] => US [patent_app_date] => 2011-04-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 7317 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 9 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13639117 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/639117
Authentication System and Method Using Arrays Apr 27, 2011 Abandoned
Array ( [id] => 11797735 [patent_doc_number] => 09407616 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-08-02 [patent_title] => 'Authenticating a device in a network' [patent_app_type] => utility [patent_app_number] => 14/113047 [patent_app_country] => US [patent_app_date] => 2011-04-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 6 [patent_no_of_words] => 8698 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 312 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14113047 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/113047
Authenticating a device in a network Apr 26, 2011 Issued
Array ( [id] => 13949425 [patent_doc_number] => 10210489 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-02-19 [patent_title] => Credential provision and proof system [patent_app_type] => utility [patent_app_number] => 13/640275 [patent_app_country] => US [patent_app_date] => 2011-04-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 9611 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 157 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13640275 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/640275
Credential provision and proof system Apr 7, 2011 Issued
Array ( [id] => 8952741 [patent_doc_number] => 20130198522 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-08-01 [patent_title] => 'SYSTEMS AND METHODS FOR FILE ACCESS AUDITING' [patent_app_type] => utility [patent_app_number] => 13/640034 [patent_app_country] => US [patent_app_date] => 2011-04-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 11862 [patent_no_of_claims] => 45 [patent_no_of_ind_claims] => 12 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13640034 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/640034
Systems and methods for file access auditing Apr 7, 2011 Issued
Array ( [id] => 11552476 [patent_doc_number] => 09621344 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-04-11 [patent_title] => 'Method and system for recovering a security credential' [patent_app_type] => utility [patent_app_number] => 13/081704 [patent_app_country] => US [patent_app_date] => 2011-04-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3669 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 166 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13081704 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/081704
Method and system for recovering a security credential Apr 6, 2011 Issued
Array ( [id] => 9680522 [patent_doc_number] => 08819449 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-08-26 [patent_title] => 'Event counter in a system adapted to the JavaCard language' [patent_app_type] => utility [patent_app_number] => 13/081382 [patent_app_country] => US [patent_app_date] => 2011-04-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 9 [patent_no_of_words] => 4169 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 134 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13081382 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/081382
Event counter in a system adapted to the JavaCard language Apr 5, 2011 Issued
Array ( [id] => 8985144 [patent_doc_number] => 08516274 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-08-20 [patent_title] => 'Method, system and medium for analog encryption in a flash memory' [patent_app_type] => utility [patent_app_number] => 13/081225 [patent_app_country] => US [patent_app_date] => 2011-04-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 9217 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 127 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13081225 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/081225
Method, system and medium for analog encryption in a flash memory Apr 5, 2011 Issued
Array ( [id] => 10041018 [patent_doc_number] => 09081724 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-07-14 [patent_title] => 'Method and device for protecting memory content using first and second addressable storage regions and first and second encryption keys' [patent_app_type] => utility [patent_app_number] => 13/639551 [patent_app_country] => US [patent_app_date] => 2011-04-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 4 [patent_no_of_words] => 5859 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 213 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13639551 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/639551
Method and device for protecting memory content using first and second addressable storage regions and first and second encryption keys Apr 5, 2011 Issued
Array ( [id] => 8443723 [patent_doc_number] => 20120260339 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-10-11 [patent_title] => 'Imposter Prediction Using Historical Interaction Patterns' [patent_app_type] => utility [patent_app_number] => 13/080884 [patent_app_country] => US [patent_app_date] => 2011-04-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7400 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13080884 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/080884
Imposter Prediction Using Historical Interaction Patterns Apr 5, 2011 Abandoned
Menu