![](/images/general/no_picture/200_user.png)
Naeem U Haq
Examiner (ID: 14201, Phone: (571)272-6758 , Office: P/3625 )
Most Active Art Unit | 3625 |
Art Unit(s) | 3625, 4135, 2165, 3684 |
Total Applications | 747 |
Issued Applications | 394 |
Pending Applications | 77 |
Abandoned Applications | 275 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 9954709
[patent_doc_number] => 09003523
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-07
[patent_title] => 'Systems, methods, and media for outputting data based upon anomaly detection'
[patent_app_type] => utility
[patent_app_number] => 13/891031
[patent_app_country] => US
[patent_app_date] => 2013-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7582
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13891031
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/891031 | Systems, methods, and media for outputting data based upon anomaly detection | May 8, 2013 | Issued |
Array
(
[id] => 10005135
[patent_doc_number] => 09049241
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-02
[patent_title] => 'Peer discovery and secure communication in failover schemes'
[patent_app_type] => utility
[patent_app_number] => 13/855188
[patent_app_country] => US
[patent_app_date] => 2013-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4167
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13855188
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/855188 | Peer discovery and secure communication in failover schemes | Apr 1, 2013 | Issued |
Array
(
[id] => 10016829
[patent_doc_number] => 09059855
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-16
[patent_title] => 'System and method for implementing a trusted dynamic launch and trusted platform module (TPM) using secure enclaves'
[patent_app_type] => utility
[patent_app_number] => 13/843954
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5927
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13843954
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/843954 | System and method for implementing a trusted dynamic launch and trusted platform module (TPM) using secure enclaves | Mar 14, 2013 | Issued |
Array
(
[id] => 10688576
[patent_doc_number] => 20160034721
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'STORAGE SYSTEM AND STORAGE SYSTEM CONTROL METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/655201
[patent_app_country] => US
[patent_app_date] => 2013-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 9996
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14655201
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/655201 | STORAGE SYSTEM AND STORAGE SYSTEM CONTROL METHOD | Mar 10, 2013 | Abandoned |
Array
(
[id] => 10004908
[patent_doc_number] => 09049012
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-02
[patent_title] => 'Secured cryptographic communication system'
[patent_app_type] => utility
[patent_app_number] => 13/788078
[patent_app_country] => US
[patent_app_date] => 2013-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 5732
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13788078
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/788078 | Secured cryptographic communication system | Mar 6, 2013 | Issued |
Array
(
[id] => 9852982
[patent_doc_number] => 08954729
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-10
[patent_title] => 'Creating and using a specific user unique id for security login authentication'
[patent_app_type] => utility
[patent_app_number] => 13/789248
[patent_app_country] => US
[patent_app_date] => 2013-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3442
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13789248
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/789248 | Creating and using a specific user unique id for security login authentication | Mar 6, 2013 | Issued |
Array
(
[id] => 9723481
[patent_doc_number] => 20140259182
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-11
[patent_title] => 'SYSTEM AND METHOD FOR MANAGING MEDIA CONTENT'
[patent_app_type] => utility
[patent_app_number] => 13/786684
[patent_app_country] => US
[patent_app_date] => 2013-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8332
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13786684
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/786684 | SYSTEM AND METHOD FOR MANAGING MEDIA CONTENT | Mar 5, 2013 | Abandoned |
Array
(
[id] => 9688642
[patent_doc_number] => 20140245408
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-28
[patent_title] => 'BIOMETRIC APPROACH TO TRACK CREDENTIALS OF ANONYMOUS USER OF A MOBILE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/783787
[patent_app_country] => US
[patent_app_date] => 2013-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2554
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13783787
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/783787 | BIOMETRIC APPROACH TO TRACK CREDENTIALS OF ANONYMOUS USER OF A MOBILE DEVICE | Mar 3, 2013 | Abandoned |
Array
(
[id] => 9798208
[patent_doc_number] => 20150010147
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-08
[patent_title] => 'CRYPTOGRAPHIC SYSTEM, CRYPTOGRAPHIC METHOD, AND CRYPTOGRAPHIC PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 14/376147
[patent_app_country] => US
[patent_app_date] => 2013-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 41
[patent_figures_cnt] => 41
[patent_no_of_words] => 31071
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14376147
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/376147 | Cryptographic system, cryptographic method, and cryptographic program | Feb 28, 2013 | Issued |
Array
(
[id] => 10486028
[patent_doc_number] => 20150371047
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-24
[patent_title] => 'DETERMINING COVERAGE OF DYNAMIC SECURITY SCANS USING RUNTIME AND STATIC CODE ANALYSES'
[patent_app_type] => utility
[patent_app_number] => 14/764280
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5158
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14764280
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/764280 | Determining coverage of dynamic security scans using runtime and static code analyses | Feb 27, 2013 | Issued |
Array
(
[id] => 10011496
[patent_doc_number] => 09055036
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-09
[patent_title] => 'Method and apparatus for transmitting a user datagram protocol message that is larger than a defined size'
[patent_app_type] => utility
[patent_app_number] => 13/780378
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4293
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780378
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/780378 | Method and apparatus for transmitting a user datagram protocol message that is larger than a defined size | Feb 27, 2013 | Issued |
Array
(
[id] => 10526647
[patent_doc_number] => 09253174
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-02-02
[patent_title] => 'Providing a second factor authorization'
[patent_app_type] => utility
[patent_app_number] => 13/781484
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4128
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13781484
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/781484 | Providing a second factor authorization | Feb 27, 2013 | Issued |
Array
(
[id] => 9645394
[patent_doc_number] => 20140223507
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-07
[patent_title] => 'CLOUD-BASED SECURITY POLICY CONFIGURATION'
[patent_app_type] => utility
[patent_app_number] => 13/759392
[patent_app_country] => US
[patent_app_date] => 2013-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10000
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13759392
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/759392 | Cloud-based security policy configuration | Feb 4, 2013 | Issued |
Array
(
[id] => 9645453
[patent_doc_number] => 20140223566
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-07
[patent_title] => 'SYSTEM AND METHOD FOR AUTOMATIC GENERATION OF HEURISTIC ALGORITHMS FOR MALICIOUS OBJECT IDENTIFICATION'
[patent_app_type] => utility
[patent_app_number] => 13/756685
[patent_app_country] => US
[patent_app_date] => 2013-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5970
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13756685
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/756685 | System and method for automatic generation of heuristic algorithms for malicious object identification | Jan 31, 2013 | Issued |
Array
(
[id] => 8953084
[patent_doc_number] => 20130198865
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-01
[patent_title] => 'TRANSMISSION APPARATUS, TRANSMISSION METHOD, AND RECORDING MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 13/752764
[patent_app_country] => US
[patent_app_date] => 2013-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 8334
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13752764
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/752764 | Transmission apparatus, transmission method, and recording medium | Jan 28, 2013 | Issued |
Array
(
[id] => 11392613
[patent_doc_number] => 09553869
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-24
[patent_title] => 'Method for initializing a memory area that is associated with a smart meter'
[patent_app_type] => utility
[patent_app_number] => 14/376660
[patent_app_country] => US
[patent_app_date] => 2013-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 10758
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14376660
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/376660 | Method for initializing a memory area that is associated with a smart meter | Jan 17, 2013 | Issued |
Array
(
[id] => 9479758
[patent_doc_number] => 20140137221
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-15
[patent_title] => 'IMAGE META DATA DRIVEN DEVICE AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 13/676556
[patent_app_country] => US
[patent_app_date] => 2012-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3096
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13676556
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/676556 | IMAGE META DATA DRIVEN DEVICE AUTHENTICATION | Nov 13, 2012 | Abandoned |
Array
(
[id] => 11234985
[patent_doc_number] => 09462232
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-04
[patent_title] => 'System and method of managing protected video content'
[patent_app_type] => utility
[patent_app_number] => 13/649893
[patent_app_country] => US
[patent_app_date] => 2012-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5456
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13649893
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/649893 | System and method of managing protected video content | Oct 10, 2012 | Issued |
Array
(
[id] => 10067779
[patent_doc_number] => 09106646
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-08-11
[patent_title] => 'Enhanced multi-factor authentication'
[patent_app_type] => utility
[patent_app_number] => 13/613841
[patent_app_country] => US
[patent_app_date] => 2012-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8600
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 238
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13613841
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/613841 | Enhanced multi-factor authentication | Sep 12, 2012 | Issued |
Array
(
[id] => 9841203
[patent_doc_number] => 20150033285
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-29
[patent_title] => 'NON-INTRUSIVE METHOD AND APPARATUS FOR AUTOMATICALLY DISPATCHING SECURITY RULES IN CLOUD ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/353053
[patent_app_country] => US
[patent_app_date] => 2012-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8613
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14353053
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/353053 | Non-intrusive method and apparatus for automatically dispatching security rules in cloud environment | Sep 11, 2012 | Issued |