Search

Khaja Ahmad

Examiner (ID: 11537)

Most Active Art Unit
2813
Art Unit(s)
2813
Total Applications
1268
Issued Applications
1001
Pending Applications
108
Abandoned Applications
198

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 8546382 [patent_doc_number] => 08321685 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-11-27 [patent_title] => 'Method and apparatus for managing confidential information' [patent_app_type] => utility [patent_app_number] => 12/777012 [patent_app_country] => US [patent_app_date] => 2010-05-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5692 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 146 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12777012 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/777012
Method and apparatus for managing confidential information May 9, 2010 Issued
Array ( [id] => 8473017 [patent_doc_number] => 08302211 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-10-30 [patent_title] => 'Domain-based application functionality' [patent_app_type] => utility [patent_app_number] => 12/772298 [patent_app_country] => US [patent_app_date] => 2010-05-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3069 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 113 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12772298 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/772298
Domain-based application functionality May 2, 2010 Issued
Array ( [id] => 6337614 [patent_doc_number] => 20100199088 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-08-05 [patent_title] => 'Method and System For Securing Digital Assets Using Process-Driven Security Policies' [patent_app_type] => utility [patent_app_number] => 12/762028 [patent_app_country] => US [patent_app_date] => 2010-04-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 8755 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0199/20100199088.pdf [firstpage_image] =>[orig_patent_app_number] => 12762028 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/762028
Method and system for securing digital assets using process-driven security policies Apr 15, 2010 Issued
Array ( [id] => 4441850 [patent_doc_number] => 07971260 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-06-28 [patent_title] => 'Matching session records of network users with corresponding transaction data' [patent_app_type] => utility [patent_app_number] => 12/760989 [patent_app_country] => US [patent_app_date] => 2010-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 4939 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 147 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/971/07971260.pdf [firstpage_image] =>[orig_patent_app_number] => 12760989 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/760989
Matching session records of network users with corresponding transaction data Apr 14, 2010 Issued
Array ( [id] => 9829389 [patent_doc_number] => 08938627 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-01-20 [patent_title] => 'Multilayer securing structure and method thereof for the protection of cryptographic keys and code' [patent_app_type] => utility [patent_app_number] => 13/382814 [patent_app_country] => US [patent_app_date] => 2010-04-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 15 [patent_no_of_words] => 4004 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 143 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13382814 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/382814
Multilayer securing structure and method thereof for the protection of cryptographic keys and code Apr 12, 2010 Issued
Array ( [id] => 6479186 [patent_doc_number] => 20100191966 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-29 [patent_title] => 'Method for checking the integrity of data, system and mobile terminal' [patent_app_type] => utility [patent_app_number] => 12/798111 [patent_app_country] => US [patent_app_date] => 2010-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5085 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0191/20100191966.pdf [firstpage_image] =>[orig_patent_app_number] => 12798111 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/798111
Method for checking the integrity of data, system and mobile terminal Mar 28, 2010 Issued
Array ( [id] => 8608614 [patent_doc_number] => 20130013926 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-01-10 [patent_title] => 'Method and Apparatus for Device-to-Device Key Management' [patent_app_type] => utility [patent_app_number] => 13/634841 [patent_app_country] => US [patent_app_date] => 2010-03-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9867 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13634841 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/634841
Method and apparatus for device-to-device key management Mar 23, 2010 Issued
Array ( [id] => 7719441 [patent_doc_number] => 20120008776 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-01-12 [patent_title] => 'WIRELESS COMMUNICATION APPARATUS' [patent_app_type] => utility [patent_app_number] => 13/257896 [patent_app_country] => US [patent_app_date] => 2010-03-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 10785 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0008/20120008776.pdf [firstpage_image] =>[orig_patent_app_number] => 13257896 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/257896
WIRELESS COMMUNICATION APPARATUS Mar 15, 2010 Abandoned
Array ( [id] => 6094670 [patent_doc_number] => 20110219449 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-09-08 [patent_title] => 'MALWARE DETECTION METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT' [patent_app_type] => utility [patent_app_number] => 12/717325 [patent_app_country] => US [patent_app_date] => 2010-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7457 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0219/20110219449.pdf [firstpage_image] =>[orig_patent_app_number] => 12717325 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/717325
MALWARE DETECTION METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT Mar 3, 2010 Abandoned
Array ( [id] => 6278537 [patent_doc_number] => 20100119070 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-05-13 [patent_title] => 'Method and System for Mixed Symmetric and Asymmetric Decryption of .ZIP Files' [patent_app_type] => utility [patent_app_number] => 12/690499 [patent_app_country] => US [patent_app_date] => 2010-01-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4494 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0119/20100119070.pdf [firstpage_image] =>[orig_patent_app_number] => 12690499 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/690499
Method and System for Mixed Symmetric and Asymmetric Decryption of .ZIP Files Jan 19, 2010 Abandoned
Array ( [id] => 7684063 [patent_doc_number] => 20100122078 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-05-13 [patent_title] => 'SYSTEMS AND METHODS FOR CREATING A CODE INSPECTION SYSTEM' [patent_app_type] => utility [patent_app_number] => 12/688945 [patent_app_country] => US [patent_app_date] => 2010-01-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5510 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0122/20100122078.pdf [firstpage_image] =>[orig_patent_app_number] => 12688945 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/688945
SYSTEMS AND METHODS FOR CREATING A CODE INSPECTION SYSTEM Jan 17, 2010 Abandoned
Array ( [id] => 7679354 [patent_doc_number] => 20100107233 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-04-29 [patent_title] => 'METHOD, SYSTEM, AND APPARATUS FOR IDENTIFICATION NUMBER AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 12/651224 [patent_app_country] => US [patent_app_date] => 2009-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5151 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0107/20100107233.pdf [firstpage_image] =>[orig_patent_app_number] => 12651224 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/651224
METHOD, SYSTEM, AND APPARATUS FOR IDENTIFICATION NUMBER AUTHENTICATION Dec 30, 2009 Abandoned
Array ( [id] => 8183240 [patent_doc_number] => 20120114124 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-05-10 [patent_title] => 'METHOD FOR COMBINING AUTHENTICATION AND SECRET KEYS MANAGEMENT MECHANISM IN A SENSOR NETWORK' [patent_app_type] => utility [patent_app_number] => 13/382651 [patent_app_country] => US [patent_app_date] => 2009-12-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3585 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0114/20120114124.pdf [firstpage_image] =>[orig_patent_app_number] => 13382651 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/382651
Method for combining authentication and secret keys management mechanism in a sensor network Dec 28, 2009 Issued
Array ( [id] => 4541617 [patent_doc_number] => 07954148 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-05-31 [patent_title] => 'Encryption and authentication systems and methods' [patent_app_type] => utility [patent_app_number] => 12/643940 [patent_app_country] => US [patent_app_date] => 2009-12-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 21 [patent_no_of_words] => 17163 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 48 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/954/07954148.pdf [firstpage_image] =>[orig_patent_app_number] => 12643940 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/643940
Encryption and authentication systems and methods Dec 20, 2009 Issued
Array ( [id] => 8400220 [patent_doc_number] => 08270601 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-09-18 [patent_title] => 'Implicit certificate scheme' [patent_app_type] => utility [patent_app_number] => 12/627906 [patent_app_country] => US [patent_app_date] => 2009-11-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 14484 [patent_no_of_claims] => 33 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 81 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12627906 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/627906
Implicit certificate scheme Nov 29, 2009 Issued
Array ( [id] => 8400236 [patent_doc_number] => 08270608 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-09-18 [patent_title] => 'Apparatus, system and method for detecting a loss of key stream synchronization in a communication system' [patent_app_type] => utility [patent_app_number] => 12/625774 [patent_app_country] => US [patent_app_date] => 2009-11-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4477 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 150 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12625774 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/625774
Apparatus, system and method for detecting a loss of key stream synchronization in a communication system Nov 24, 2009 Issued
Array ( [id] => 8623414 [patent_doc_number] => 08356336 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-01-15 [patent_title] => 'System and method for double-capture/double-redirect to a different location' [patent_app_type] => utility [patent_app_number] => 12/619560 [patent_app_country] => US [patent_app_date] => 2009-11-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 3 [patent_no_of_words] => 2951 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 229 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12619560 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/619560
System and method for double-capture/double-redirect to a different location Nov 15, 2009 Issued
Array ( [id] => 8667519 [patent_doc_number] => 08380992 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-02-19 [patent_title] => 'Device and method for security key exchange and system pertaining to same' [patent_app_type] => utility [patent_app_number] => 13/128106 [patent_app_country] => US [patent_app_date] => 2009-11-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6805 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 136 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13128106 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/128106
Device and method for security key exchange and system pertaining to same Nov 5, 2009 Issued
Array ( [id] => 6407170 [patent_doc_number] => 20100166186 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-01 [patent_title] => 'WIRELESS COMMUNICATION METHOD USING WPS' [patent_app_type] => utility [patent_app_number] => 12/610467 [patent_app_country] => US [patent_app_date] => 2009-11-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 7494 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0166/20100166186.pdf [firstpage_image] =>[orig_patent_app_number] => 12610467 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/610467
Wireless communication method using WPS Nov 1, 2009 Issued
Array ( [id] => 5949741 [patent_doc_number] => 20110107413 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-05 [patent_title] => 'METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING A VIRTUAL PRIVATE GATEWAY BETWEEN USER DEVICES AND VARIOUS NETWORKS' [patent_app_type] => utility [patent_app_number] => 12/610746 [patent_app_country] => US [patent_app_date] => 2009-11-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5319 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0107/20110107413.pdf [firstpage_image] =>[orig_patent_app_number] => 12610746 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/610746
Methods, systems, and computer program products for providing a virtual private gateway between user devices and various networks Nov 1, 2009 Issued
Menu