Ishrat Rashid
Examiner (ID: 16964, Phone: (571)272-5372 , Office: P/2459 )
Most Active Art Unit | 2459 |
Art Unit(s) | 2459 |
Total Applications | 206 |
Issued Applications | 90 |
Pending Applications | 41 |
Abandoned Applications | 75 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 15549665
[patent_doc_number] => 10574630
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-25
[patent_title] => Methods and apparatus for malware threat research
[patent_app_type] => utility
[patent_app_number] => 13/372433
[patent_app_country] => US
[patent_app_date] => 2012-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 15812
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 308
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13372433
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/372433 | Methods and apparatus for malware threat research | Feb 12, 2012 | Issued |
Array
(
[id] => 8443687
[patent_doc_number] => 20120260304
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-11
[patent_title] => 'METHODS AND APPARATUS FOR AGENT-BASED MALWARE MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 13/372439
[patent_app_country] => US
[patent_app_date] => 2012-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 14829
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13372439
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/372439 | METHODS AND APPARATUS FOR AGENT-BASED MALWARE MANAGEMENT | Feb 12, 2012 | Abandoned |
13/371194 | SECURITY FOR CLOUD COMPUTING BASED ON DETECTION OF ABNORMAL USE COUPLED WITH USE OF DECOYS | Feb 9, 2012 | Abandoned |
Array
(
[id] => 10015461
[patent_doc_number] => 09058475
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-16
[patent_title] => 'Account creating and authenticating method'
[patent_app_type] => utility
[patent_app_number] => 13/369539
[patent_app_country] => US
[patent_app_date] => 2012-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 11
[patent_no_of_words] => 5572
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13369539
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/369539 | Account creating and authenticating method | Feb 8, 2012 | Issued |
Array
(
[id] => 8868491
[patent_doc_number] => 20130152194
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-13
[patent_title] => 'SYSTEM, METHOD AND SOFTWARE FOR CONTROLLING ACCESS TO VIRTUAL MACHINE CONSOLES'
[patent_app_type] => utility
[patent_app_number] => 13/313130
[patent_app_country] => US
[patent_app_date] => 2011-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3736
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13313130
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/313130 | SYSTEM, METHOD AND SOFTWARE FOR CONTROLLING ACCESS TO VIRTUAL MACHINE CONSOLES | Dec 6, 2011 | Abandoned |
Array
(
[id] => 9289735
[patent_doc_number] => 08646094
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-04
[patent_title] => 'Method and apparatus for preventing unauthorized access to information stored in a non-volatile memory'
[patent_app_type] => utility
[patent_app_number] => 13/314167
[patent_app_country] => US
[patent_app_date] => 2011-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 4876
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 333
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13314167
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/314167 | Method and apparatus for preventing unauthorized access to information stored in a non-volatile memory | Dec 6, 2011 | Issued |
Array
(
[id] => 10835090
[patent_doc_number] => 08863292
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-10-14
[patent_title] => 'Interactive analysis of a security specification'
[patent_app_type] => utility
[patent_app_number] => 13/313757
[patent_app_country] => US
[patent_app_date] => 2011-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 4483
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13313757
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/313757 | Interactive analysis of a security specification | Dec 6, 2011 | Issued |
Array
(
[id] => 10120058
[patent_doc_number] => 09154958
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-06
[patent_title] => 'Security system for cloud computing'
[patent_app_type] => utility
[patent_app_number] => 13/313882
[patent_app_country] => US
[patent_app_date] => 2011-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4153
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13313882
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/313882 | Security system for cloud computing | Dec 6, 2011 | Issued |
Array
(
[id] => 10079243
[patent_doc_number] => 09117091
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-25
[patent_title] => 'System and method for securing virtual computing environments'
[patent_app_type] => utility
[patent_app_number] => 13/882478
[patent_app_country] => US
[patent_app_date] => 2011-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 12426
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 69
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13882478
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/882478 | System and method for securing virtual computing environments | Oct 27, 2011 | Issued |
Array
(
[id] => 8978948
[patent_doc_number] => 20130212378
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-15
[patent_title] => 'METHOD FOR MANAGING KEYS IN A MANIPULATION-PROOF MANNER'
[patent_app_type] => utility
[patent_app_number] => 13/882238
[patent_app_country] => US
[patent_app_date] => 2011-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4263
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13882238
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/882238 | Method for managing keys in a manipulation-proof manner | Oct 23, 2011 | Issued |
Array
(
[id] => 8813772
[patent_doc_number] => 20130114815
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-09
[patent_title] => 'SECRET SHARING SYSTEM, SHARING APPARATUS, SHARE MANAGEMENT APPARATUS, ACQUISITION APPARATUS, SECRET SHARING METHOD, PROGRAM AND RECORDING MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 13/810509
[patent_app_country] => US
[patent_app_date] => 2011-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 29
[patent_figures_cnt] => 29
[patent_no_of_words] => 29632
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13810509
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/810509 | Secret sharing system, sharing apparatus, share management apparatus, acquisition apparatus, secret sharing method, program and recording medium | Jul 21, 2011 | Issued |
Array
(
[id] => 8661488
[patent_doc_number] => 20130042318
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-02-14
[patent_title] => 'Authentication System and Method Using Arrays'
[patent_app_type] => utility
[patent_app_number] => 13/639117
[patent_app_country] => US
[patent_app_date] => 2011-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 7317
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13639117
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/639117 | Authentication System and Method Using Arrays | Apr 27, 2011 | Abandoned |
Array
(
[id] => 11797735
[patent_doc_number] => 09407616
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-02
[patent_title] => 'Authenticating a device in a network'
[patent_app_type] => utility
[patent_app_number] => 14/113047
[patent_app_country] => US
[patent_app_date] => 2011-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 8698
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 312
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14113047
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/113047 | Authenticating a device in a network | Apr 26, 2011 | Issued |
Array
(
[id] => 13949425
[patent_doc_number] => 10210489
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-02-19
[patent_title] => Credential provision and proof system
[patent_app_type] => utility
[patent_app_number] => 13/640275
[patent_app_country] => US
[patent_app_date] => 2011-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9611
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13640275
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/640275 | Credential provision and proof system | Apr 7, 2011 | Issued |
Array
(
[id] => 8952741
[patent_doc_number] => 20130198522
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-01
[patent_title] => 'SYSTEMS AND METHODS FOR FILE ACCESS AUDITING'
[patent_app_type] => utility
[patent_app_number] => 13/640034
[patent_app_country] => US
[patent_app_date] => 2011-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 11862
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 12
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13640034
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/640034 | Systems and methods for file access auditing | Apr 7, 2011 | Issued |
Array
(
[id] => 11552476
[patent_doc_number] => 09621344
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-11
[patent_title] => 'Method and system for recovering a security credential'
[patent_app_type] => utility
[patent_app_number] => 13/081704
[patent_app_country] => US
[patent_app_date] => 2011-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3669
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13081704
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/081704 | Method and system for recovering a security credential | Apr 6, 2011 | Issued |
Array
(
[id] => 9680522
[patent_doc_number] => 08819449
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-08-26
[patent_title] => 'Event counter in a system adapted to the JavaCard language'
[patent_app_type] => utility
[patent_app_number] => 13/081382
[patent_app_country] => US
[patent_app_date] => 2011-04-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 4169
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13081382
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/081382 | Event counter in a system adapted to the JavaCard language | Apr 5, 2011 | Issued |
Array
(
[id] => 8985144
[patent_doc_number] => 08516274
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-20
[patent_title] => 'Method, system and medium for analog encryption in a flash memory'
[patent_app_type] => utility
[patent_app_number] => 13/081225
[patent_app_country] => US
[patent_app_date] => 2011-04-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 9217
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13081225
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/081225 | Method, system and medium for analog encryption in a flash memory | Apr 5, 2011 | Issued |
Array
(
[id] => 10041018
[patent_doc_number] => 09081724
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-14
[patent_title] => 'Method and device for protecting memory content using first and second addressable storage regions and first and second encryption keys'
[patent_app_type] => utility
[patent_app_number] => 13/639551
[patent_app_country] => US
[patent_app_date] => 2011-04-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 5859
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13639551
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/639551 | Method and device for protecting memory content using first and second addressable storage regions and first and second encryption keys | Apr 5, 2011 | Issued |
Array
(
[id] => 8443723
[patent_doc_number] => 20120260339
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-11
[patent_title] => 'Imposter Prediction Using Historical Interaction Patterns'
[patent_app_type] => utility
[patent_app_number] => 13/080884
[patent_app_country] => US
[patent_app_date] => 2011-04-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7400
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13080884
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/080884 | Imposter Prediction Using Historical Interaction Patterns | Apr 5, 2011 | Abandoned |