
Mushfique Siddique
Examiner (ID: 15822, Phone: (571)270-0424 , Office: P/2825 )
| Most Active Art Unit | 2825 |
| Art Unit(s) | 2825 |
| Total Applications | 863 |
| Issued Applications | 710 |
| Pending Applications | 83 |
| Abandoned Applications | 86 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10232652
[patent_doc_number] => 20150117646
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-30
[patent_title] => 'SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE INCLUDING AN ENTROPY FILTER'
[patent_app_type] => utility
[patent_app_number] => 14/069133
[patent_app_country] => US
[patent_app_date] => 2013-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5836
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14069133
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/069133 | SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE INCLUDING AN ENTROPY FILTER | Oct 30, 2013 | Abandoned |
Array
(
[id] => 10232649
[patent_doc_number] => 20150117643
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-30
[patent_title] => 'SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE COMBINING DATA FROM MULTIPLE SENSORS'
[patent_app_type] => utility
[patent_app_number] => 14/069142
[patent_app_country] => US
[patent_app_date] => 2013-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5836
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14069142
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/069142 | SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE COMBINING DATA FROM MULTIPLE SENSORS | Oct 30, 2013 | Abandoned |
Array
(
[id] => 10232650
[patent_doc_number] => 20150117644
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-30
[patent_title] => 'SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE BASED ON A USER ACTION'
[patent_app_type] => utility
[patent_app_number] => 14/069165
[patent_app_country] => US
[patent_app_date] => 2013-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5836
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14069165
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/069165 | SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE BASED ON A USER ACTION | Oct 30, 2013 | Abandoned |
Array
(
[id] => 10232642
[patent_doc_number] => 20150117637
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-30
[patent_title] => 'SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE SELECTING DATA FROM MULTIPLE SENSORS'
[patent_app_type] => utility
[patent_app_number] => 14/069155
[patent_app_country] => US
[patent_app_date] => 2013-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5836
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14069155
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/069155 | SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE SELECTING DATA FROM MULTIPLE SENSORS | Oct 30, 2013 | Abandoned |
Array
(
[id] => 10232647
[patent_doc_number] => 20150117642
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-30
[patent_title] => 'SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE USING AN ENTROPY POOL'
[patent_app_type] => utility
[patent_app_number] => 14/069127
[patent_app_country] => US
[patent_app_date] => 2013-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5836
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14069127
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/069127 | SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE USING AN ENTROPY POOL | Oct 30, 2013 | Abandoned |
Array
(
[id] => 10232643
[patent_doc_number] => 20150117636
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-30
[patent_title] => 'SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/067581
[patent_app_country] => US
[patent_app_date] => 2013-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5791
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14067581
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/067581 | SYSTEM AND METHOD FOR PERFORMING A SECURE CRYPTOGRAPHIC OPERATION ON A MOBILE DEVICE | Oct 29, 2013 | Abandoned |
Array
(
[id] => 10410938
[patent_doc_number] => 20150295947
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-15
[patent_title] => 'METHOD AND SYSTEM FOR VERIFYING THE SECURITY OF AN APPLICATION WITH A VIEW TO THE USE THEREOF ON A USER DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/438646
[patent_app_country] => US
[patent_app_date] => 2013-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6898
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14438646
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/438646 | METHOD AND SYSTEM FOR VERIFYING THE SECURITY OF AN APPLICATION WITH A VIEW TO THE USE THEREOF ON A USER DEVICE | Oct 28, 2013 | Abandoned |
Array
(
[id] => 10598775
[patent_doc_number] => 09319882
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-19
[patent_title] => 'Method for mutual authentication between a terminal and a remote server by means of a third-party portal'
[patent_app_type] => utility
[patent_app_number] => 14/439167
[patent_app_country] => US
[patent_app_date] => 2013-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 3326
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 238
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14439167
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/439167 | Method for mutual authentication between a terminal and a remote server by means of a third-party portal | Oct 24, 2013 | Issued |
Array
(
[id] => 10464940
[patent_doc_number] => 20150349955
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'METHOD FOR RAPIDLY GENERATING COORDINATE POINT IN EMBEDDED SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/423506
[patent_app_country] => US
[patent_app_date] => 2013-10-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 14370
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14423506
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/423506 | Method for rapidly generating coordinate point in embedded system | Oct 21, 2013 | Issued |
Array
(
[id] => 10618547
[patent_doc_number] => 09338004
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-10
[patent_title] => 'Method and system for smart card chip personalization'
[patent_app_type] => utility
[patent_app_number] => 14/432426
[patent_app_country] => US
[patent_app_date] => 2013-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 2782
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 296
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14432426
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/432426 | Method and system for smart card chip personalization | Oct 7, 2013 | Issued |
Array
(
[id] => 10441583
[patent_doc_number] => 20150326595
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'USER LOGIN MONITORING DEVICE AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/647338
[patent_app_country] => US
[patent_app_date] => 2013-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5943
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14647338
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/647338 | User login monitoring device and method | Sep 21, 2013 | Issued |
Array
(
[id] => 9808270
[patent_doc_number] => 20150020215
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-15
[patent_title] => 'CELL LEVEL DATA ACCESSIBILITY'
[patent_app_type] => utility
[patent_app_number] => 13/942076
[patent_app_country] => US
[patent_app_date] => 2013-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5694
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13942076
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/942076 | Cell level data accessibility | Jul 14, 2013 | Issued |
Array
(
[id] => 10009797
[patent_doc_number] => 09053318
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-09
[patent_title] => 'Anti-cloning system and method'
[patent_app_type] => utility
[patent_app_number] => 13/939488
[patent_app_country] => US
[patent_app_date] => 2013-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8868
[patent_no_of_claims] => 60
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13939488
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/939488 | Anti-cloning system and method | Jul 10, 2013 | Issued |
Array
(
[id] => 10036372
[patent_doc_number] => 09077703
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-07-07
[patent_title] => 'Systems and methods for protecting user accounts'
[patent_app_type] => utility
[patent_app_number] => 13/938615
[patent_app_country] => US
[patent_app_date] => 2013-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10972
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13938615
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/938615 | Systems and methods for protecting user accounts | Jul 9, 2013 | Issued |
Array
(
[id] => 11288020
[patent_doc_number] => 09503891
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-22
[patent_title] => 'Authentication method of wireless mesh network'
[patent_app_type] => utility
[patent_app_number] => 13/937714
[patent_app_country] => US
[patent_app_date] => 2013-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3774
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13937714
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/937714 | Authentication method of wireless mesh network | Jul 8, 2013 | Issued |
Array
(
[id] => 10079232
[patent_doc_number] => 09117080
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-08-25
[patent_title] => 'Process evaluation for malware detection in virtual machines'
[patent_app_type] => utility
[patent_app_number] => 13/936058
[patent_app_country] => US
[patent_app_date] => 2013-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 10074
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 220
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13936058
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/936058 | Process evaluation for malware detection in virtual machines | Jul 4, 2013 | Issued |
Array
(
[id] => 9137475
[patent_doc_number] => 20130298190
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-07
[patent_title] => 'SYSTEMS AND METHODS FOR MANAGING APPLICATION SECURITY PROFILES'
[patent_app_type] => utility
[patent_app_number] => 13/935320
[patent_app_country] => US
[patent_app_date] => 2013-07-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 34598
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13935320
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/935320 | Systems and methods for managing application security profiles | Jul 2, 2013 | Issued |
Array
(
[id] => 9801062
[patent_doc_number] => 20150013006
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-08
[patent_title] => 'COMPROMISED INSIDER HONEY POTS USING REVERSE HONEY TOKENS'
[patent_app_type] => utility
[patent_app_number] => 13/934099
[patent_app_country] => US
[patent_app_date] => 2013-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 15173
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13934099
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/934099 | Compromised insider honey pots using reverse honey tokens | Jul 1, 2013 | Issued |
Array
(
[id] => 9968159
[patent_doc_number] => 09015795
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-21
[patent_title] => 'Reputation-based auditing of enterprise application authorization models'
[patent_app_type] => utility
[patent_app_number] => 13/932265
[patent_app_country] => US
[patent_app_date] => 2013-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9363
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 246
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13932265
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/932265 | Reputation-based auditing of enterprise application authorization models | Jun 30, 2013 | Issued |
Array
(
[id] => 11585049
[patent_doc_number] => 09639693
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-02
[patent_title] => 'Techniques for detecting a security vulnerability'
[patent_app_type] => utility
[patent_app_number] => 13/931426
[patent_app_country] => US
[patent_app_date] => 2013-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7502
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13931426
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/931426 | Techniques for detecting a security vulnerability | Jun 27, 2013 | Issued |