
Khaja Ahmad
Examiner (ID: 11537)
| Most Active Art Unit | 2813 |
| Art Unit(s) | 2813 |
| Total Applications | 1268 |
| Issued Applications | 1001 |
| Pending Applications | 108 |
| Abandoned Applications | 198 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 8546382
[patent_doc_number] => 08321685
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-11-27
[patent_title] => 'Method and apparatus for managing confidential information'
[patent_app_type] => utility
[patent_app_number] => 12/777012
[patent_app_country] => US
[patent_app_date] => 2010-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5692
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12777012
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/777012 | Method and apparatus for managing confidential information | May 9, 2010 | Issued |
Array
(
[id] => 8473017
[patent_doc_number] => 08302211
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-10-30
[patent_title] => 'Domain-based application functionality'
[patent_app_type] => utility
[patent_app_number] => 12/772298
[patent_app_country] => US
[patent_app_date] => 2010-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3069
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12772298
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/772298 | Domain-based application functionality | May 2, 2010 | Issued |
Array
(
[id] => 6337614
[patent_doc_number] => 20100199088
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-08-05
[patent_title] => 'Method and System For Securing Digital Assets Using Process-Driven Security Policies'
[patent_app_type] => utility
[patent_app_number] => 12/762028
[patent_app_country] => US
[patent_app_date] => 2010-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 8755
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0199/20100199088.pdf
[firstpage_image] =>[orig_patent_app_number] => 12762028
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/762028 | Method and system for securing digital assets using process-driven security policies | Apr 15, 2010 | Issued |
Array
(
[id] => 4441850
[patent_doc_number] => 07971260
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-06-28
[patent_title] => 'Matching session records of network users with corresponding transaction data'
[patent_app_type] => utility
[patent_app_number] => 12/760989
[patent_app_country] => US
[patent_app_date] => 2010-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 4939
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/971/07971260.pdf
[firstpage_image] =>[orig_patent_app_number] => 12760989
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/760989 | Matching session records of network users with corresponding transaction data | Apr 14, 2010 | Issued |
Array
(
[id] => 9829389
[patent_doc_number] => 08938627
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-20
[patent_title] => 'Multilayer securing structure and method thereof for the protection of cryptographic keys and code'
[patent_app_type] => utility
[patent_app_number] => 13/382814
[patent_app_country] => US
[patent_app_date] => 2010-04-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 15
[patent_no_of_words] => 4004
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13382814
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/382814 | Multilayer securing structure and method thereof for the protection of cryptographic keys and code | Apr 12, 2010 | Issued |
Array
(
[id] => 6479186
[patent_doc_number] => 20100191966
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-29
[patent_title] => 'Method for checking the integrity of data, system and mobile terminal'
[patent_app_type] => utility
[patent_app_number] => 12/798111
[patent_app_country] => US
[patent_app_date] => 2010-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5085
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0191/20100191966.pdf
[firstpage_image] =>[orig_patent_app_number] => 12798111
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/798111 | Method for checking the integrity of data, system and mobile terminal | Mar 28, 2010 | Issued |
Array
(
[id] => 8608614
[patent_doc_number] => 20130013926
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-01-10
[patent_title] => 'Method and Apparatus for Device-to-Device Key Management'
[patent_app_type] => utility
[patent_app_number] => 13/634841
[patent_app_country] => US
[patent_app_date] => 2010-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9867
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13634841
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/634841 | Method and apparatus for device-to-device key management | Mar 23, 2010 | Issued |
Array
(
[id] => 7719441
[patent_doc_number] => 20120008776
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-01-12
[patent_title] => 'WIRELESS COMMUNICATION APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 13/257896
[patent_app_country] => US
[patent_app_date] => 2010-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 10785
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0008/20120008776.pdf
[firstpage_image] =>[orig_patent_app_number] => 13257896
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/257896 | WIRELESS COMMUNICATION APPARATUS | Mar 15, 2010 | Abandoned |
Array
(
[id] => 6094670
[patent_doc_number] => 20110219449
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-08
[patent_title] => 'MALWARE DETECTION METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT'
[patent_app_type] => utility
[patent_app_number] => 12/717325
[patent_app_country] => US
[patent_app_date] => 2010-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7457
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0219/20110219449.pdf
[firstpage_image] =>[orig_patent_app_number] => 12717325
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/717325 | MALWARE DETECTION METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT | Mar 3, 2010 | Abandoned |
Array
(
[id] => 6278537
[patent_doc_number] => 20100119070
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-05-13
[patent_title] => 'Method and System for Mixed Symmetric and Asymmetric Decryption of .ZIP Files'
[patent_app_type] => utility
[patent_app_number] => 12/690499
[patent_app_country] => US
[patent_app_date] => 2010-01-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4494
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0119/20100119070.pdf
[firstpage_image] =>[orig_patent_app_number] => 12690499
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/690499 | Method and System for Mixed Symmetric and Asymmetric Decryption of .ZIP Files | Jan 19, 2010 | Abandoned |
Array
(
[id] => 7684063
[patent_doc_number] => 20100122078
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-05-13
[patent_title] => 'SYSTEMS AND METHODS FOR CREATING A CODE INSPECTION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 12/688945
[patent_app_country] => US
[patent_app_date] => 2010-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5510
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0122/20100122078.pdf
[firstpage_image] =>[orig_patent_app_number] => 12688945
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/688945 | SYSTEMS AND METHODS FOR CREATING A CODE INSPECTION SYSTEM | Jan 17, 2010 | Abandoned |
Array
(
[id] => 7679354
[patent_doc_number] => 20100107233
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-29
[patent_title] => 'METHOD, SYSTEM, AND APPARATUS FOR IDENTIFICATION NUMBER AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 12/651224
[patent_app_country] => US
[patent_app_date] => 2009-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5151
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0107/20100107233.pdf
[firstpage_image] =>[orig_patent_app_number] => 12651224
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/651224 | METHOD, SYSTEM, AND APPARATUS FOR IDENTIFICATION NUMBER AUTHENTICATION | Dec 30, 2009 | Abandoned |
Array
(
[id] => 8183240
[patent_doc_number] => 20120114124
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-10
[patent_title] => 'METHOD FOR COMBINING AUTHENTICATION AND SECRET KEYS MANAGEMENT MECHANISM IN A SENSOR NETWORK'
[patent_app_type] => utility
[patent_app_number] => 13/382651
[patent_app_country] => US
[patent_app_date] => 2009-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3585
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0114/20120114124.pdf
[firstpage_image] =>[orig_patent_app_number] => 13382651
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/382651 | Method for combining authentication and secret keys management mechanism in a sensor network | Dec 28, 2009 | Issued |
Array
(
[id] => 4541617
[patent_doc_number] => 07954148
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-05-31
[patent_title] => 'Encryption and authentication systems and methods'
[patent_app_type] => utility
[patent_app_number] => 12/643940
[patent_app_country] => US
[patent_app_date] => 2009-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 21
[patent_no_of_words] => 17163
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 48
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/954/07954148.pdf
[firstpage_image] =>[orig_patent_app_number] => 12643940
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/643940 | Encryption and authentication systems and methods | Dec 20, 2009 | Issued |
Array
(
[id] => 8400220
[patent_doc_number] => 08270601
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-09-18
[patent_title] => 'Implicit certificate scheme'
[patent_app_type] => utility
[patent_app_number] => 12/627906
[patent_app_country] => US
[patent_app_date] => 2009-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 14484
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12627906
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/627906 | Implicit certificate scheme | Nov 29, 2009 | Issued |
Array
(
[id] => 8400236
[patent_doc_number] => 08270608
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-09-18
[patent_title] => 'Apparatus, system and method for detecting a loss of key stream synchronization in a communication system'
[patent_app_type] => utility
[patent_app_number] => 12/625774
[patent_app_country] => US
[patent_app_date] => 2009-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4477
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12625774
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/625774 | Apparatus, system and method for detecting a loss of key stream synchronization in a communication system | Nov 24, 2009 | Issued |
Array
(
[id] => 8623414
[patent_doc_number] => 08356336
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-01-15
[patent_title] => 'System and method for double-capture/double-redirect to a different location'
[patent_app_type] => utility
[patent_app_number] => 12/619560
[patent_app_country] => US
[patent_app_date] => 2009-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 2951
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12619560
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/619560 | System and method for double-capture/double-redirect to a different location | Nov 15, 2009 | Issued |
Array
(
[id] => 8667519
[patent_doc_number] => 08380992
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-02-19
[patent_title] => 'Device and method for security key exchange and system pertaining to same'
[patent_app_type] => utility
[patent_app_number] => 13/128106
[patent_app_country] => US
[patent_app_date] => 2009-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6805
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13128106
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/128106 | Device and method for security key exchange and system pertaining to same | Nov 5, 2009 | Issued |
Array
(
[id] => 6407170
[patent_doc_number] => 20100166186
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-01
[patent_title] => 'WIRELESS COMMUNICATION METHOD USING WPS'
[patent_app_type] => utility
[patent_app_number] => 12/610467
[patent_app_country] => US
[patent_app_date] => 2009-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 7494
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0166/20100166186.pdf
[firstpage_image] =>[orig_patent_app_number] => 12610467
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/610467 | Wireless communication method using WPS | Nov 1, 2009 | Issued |
Array
(
[id] => 5949741
[patent_doc_number] => 20110107413
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-05
[patent_title] => 'METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING A VIRTUAL PRIVATE GATEWAY BETWEEN USER DEVICES AND VARIOUS NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 12/610746
[patent_app_country] => US
[patent_app_date] => 2009-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5319
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0107/20110107413.pdf
[firstpage_image] =>[orig_patent_app_number] => 12610746
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/610746 | Methods, systems, and computer program products for providing a virtual private gateway between user devices and various networks | Nov 1, 2009 | Issued |