Search

Naeem U Haq

Examiner (ID: 14201, Phone: (571)272-6758 , Office: P/3625 )

Most Active Art Unit
3625
Art Unit(s)
3625, 4135, 2165, 3684
Total Applications
747
Issued Applications
394
Pending Applications
77
Abandoned Applications
275

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9954709 [patent_doc_number] => 09003523 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-04-07 [patent_title] => 'Systems, methods, and media for outputting data based upon anomaly detection' [patent_app_type] => utility [patent_app_number] => 13/891031 [patent_app_country] => US [patent_app_date] => 2013-05-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 7582 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 118 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13891031 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/891031
Systems, methods, and media for outputting data based upon anomaly detection May 8, 2013 Issued
Array ( [id] => 10005135 [patent_doc_number] => 09049241 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-06-02 [patent_title] => 'Peer discovery and secure communication in failover schemes' [patent_app_type] => utility [patent_app_number] => 13/855188 [patent_app_country] => US [patent_app_date] => 2013-04-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 4167 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 190 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13855188 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/855188
Peer discovery and secure communication in failover schemes Apr 1, 2013 Issued
Array ( [id] => 10016829 [patent_doc_number] => 09059855 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-06-16 [patent_title] => 'System and method for implementing a trusted dynamic launch and trusted platform module (TPM) using secure enclaves' [patent_app_type] => utility [patent_app_number] => 13/843954 [patent_app_country] => US [patent_app_date] => 2013-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5927 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 119 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13843954 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/843954
System and method for implementing a trusted dynamic launch and trusted platform module (TPM) using secure enclaves Mar 14, 2013 Issued
Array ( [id] => 10688576 [patent_doc_number] => 20160034721 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-04 [patent_title] => 'STORAGE SYSTEM AND STORAGE SYSTEM CONTROL METHOD' [patent_app_type] => utility [patent_app_number] => 14/655201 [patent_app_country] => US [patent_app_date] => 2013-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 9996 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14655201 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/655201
STORAGE SYSTEM AND STORAGE SYSTEM CONTROL METHOD Mar 10, 2013 Abandoned
Array ( [id] => 10004908 [patent_doc_number] => 09049012 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-06-02 [patent_title] => 'Secured cryptographic communication system' [patent_app_type] => utility [patent_app_number] => 13/788078 [patent_app_country] => US [patent_app_date] => 2013-03-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 9 [patent_no_of_words] => 5732 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 155 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13788078 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/788078
Secured cryptographic communication system Mar 6, 2013 Issued
Array ( [id] => 9852982 [patent_doc_number] => 08954729 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-02-10 [patent_title] => 'Creating and using a specific user unique id for security login authentication' [patent_app_type] => utility [patent_app_number] => 13/789248 [patent_app_country] => US [patent_app_date] => 2013-03-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3442 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 163 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13789248 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/789248
Creating and using a specific user unique id for security login authentication Mar 6, 2013 Issued
Array ( [id] => 9723481 [patent_doc_number] => 20140259182 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-09-11 [patent_title] => 'SYSTEM AND METHOD FOR MANAGING MEDIA CONTENT' [patent_app_type] => utility [patent_app_number] => 13/786684 [patent_app_country] => US [patent_app_date] => 2013-03-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8332 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13786684 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/786684
SYSTEM AND METHOD FOR MANAGING MEDIA CONTENT Mar 5, 2013 Abandoned
Array ( [id] => 9688642 [patent_doc_number] => 20140245408 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-08-28 [patent_title] => 'BIOMETRIC APPROACH TO TRACK CREDENTIALS OF ANONYMOUS USER OF A MOBILE DEVICE' [patent_app_type] => utility [patent_app_number] => 13/783787 [patent_app_country] => US [patent_app_date] => 2013-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2554 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13783787 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/783787
BIOMETRIC APPROACH TO TRACK CREDENTIALS OF ANONYMOUS USER OF A MOBILE DEVICE Mar 3, 2013 Abandoned
Array ( [id] => 9798208 [patent_doc_number] => 20150010147 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-08 [patent_title] => 'CRYPTOGRAPHIC SYSTEM, CRYPTOGRAPHIC METHOD, AND CRYPTOGRAPHIC PROGRAM' [patent_app_type] => utility [patent_app_number] => 14/376147 [patent_app_country] => US [patent_app_date] => 2013-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 41 [patent_figures_cnt] => 41 [patent_no_of_words] => 31071 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14376147 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/376147
Cryptographic system, cryptographic method, and cryptographic program Feb 28, 2013 Issued
Array ( [id] => 10486028 [patent_doc_number] => 20150371047 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-24 [patent_title] => 'DETERMINING COVERAGE OF DYNAMIC SECURITY SCANS USING RUNTIME AND STATIC CODE ANALYSES' [patent_app_type] => utility [patent_app_number] => 14/764280 [patent_app_country] => US [patent_app_date] => 2013-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5158 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14764280 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/764280
Determining coverage of dynamic security scans using runtime and static code analyses Feb 27, 2013 Issued
Array ( [id] => 10011496 [patent_doc_number] => 09055036 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-06-09 [patent_title] => 'Method and apparatus for transmitting a user datagram protocol message that is larger than a defined size' [patent_app_type] => utility [patent_app_number] => 13/780378 [patent_app_country] => US [patent_app_date] => 2013-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4293 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780378 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/780378
Method and apparatus for transmitting a user datagram protocol message that is larger than a defined size Feb 27, 2013 Issued
Array ( [id] => 10526647 [patent_doc_number] => 09253174 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-02-02 [patent_title] => 'Providing a second factor authorization' [patent_app_type] => utility [patent_app_number] => 13/781484 [patent_app_country] => US [patent_app_date] => 2013-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4128 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 132 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13781484 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/781484
Providing a second factor authorization Feb 27, 2013 Issued
Array ( [id] => 9645394 [patent_doc_number] => 20140223507 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-08-07 [patent_title] => 'CLOUD-BASED SECURITY POLICY CONFIGURATION' [patent_app_type] => utility [patent_app_number] => 13/759392 [patent_app_country] => US [patent_app_date] => 2013-02-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10000 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13759392 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/759392
Cloud-based security policy configuration Feb 4, 2013 Issued
Array ( [id] => 9645453 [patent_doc_number] => 20140223566 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-08-07 [patent_title] => 'SYSTEM AND METHOD FOR AUTOMATIC GENERATION OF HEURISTIC ALGORITHMS FOR MALICIOUS OBJECT IDENTIFICATION' [patent_app_type] => utility [patent_app_number] => 13/756685 [patent_app_country] => US [patent_app_date] => 2013-02-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5970 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13756685 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/756685
System and method for automatic generation of heuristic algorithms for malicious object identification Jan 31, 2013 Issued
Array ( [id] => 8953084 [patent_doc_number] => 20130198865 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-08-01 [patent_title] => 'TRANSMISSION APPARATUS, TRANSMISSION METHOD, AND RECORDING MEDIUM' [patent_app_type] => utility [patent_app_number] => 13/752764 [patent_app_country] => US [patent_app_date] => 2013-01-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 8334 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13752764 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/752764
Transmission apparatus, transmission method, and recording medium Jan 28, 2013 Issued
Array ( [id] => 11392613 [patent_doc_number] => 09553869 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-01-24 [patent_title] => 'Method for initializing a memory area that is associated with a smart meter' [patent_app_type] => utility [patent_app_number] => 14/376660 [patent_app_country] => US [patent_app_date] => 2013-01-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 10758 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 154 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14376660 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/376660
Method for initializing a memory area that is associated with a smart meter Jan 17, 2013 Issued
Array ( [id] => 9479758 [patent_doc_number] => 20140137221 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-05-15 [patent_title] => 'IMAGE META DATA DRIVEN DEVICE AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 13/676556 [patent_app_country] => US [patent_app_date] => 2012-11-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3096 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13676556 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/676556
IMAGE META DATA DRIVEN DEVICE AUTHENTICATION Nov 13, 2012 Abandoned
Array ( [id] => 11234985 [patent_doc_number] => 09462232 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-10-04 [patent_title] => 'System and method of managing protected video content' [patent_app_type] => utility [patent_app_number] => 13/649893 [patent_app_country] => US [patent_app_date] => 2012-10-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5456 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 177 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13649893 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/649893
System and method of managing protected video content Oct 10, 2012 Issued
Array ( [id] => 10067779 [patent_doc_number] => 09106646 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-08-11 [patent_title] => 'Enhanced multi-factor authentication' [patent_app_type] => utility [patent_app_number] => 13/613841 [patent_app_country] => US [patent_app_date] => 2012-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 8600 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 238 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13613841 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/613841
Enhanced multi-factor authentication Sep 12, 2012 Issued
Array ( [id] => 9841203 [patent_doc_number] => 20150033285 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-29 [patent_title] => 'NON-INTRUSIVE METHOD AND APPARATUS FOR AUTOMATICALLY DISPATCHING SECURITY RULES IN CLOUD ENVIRONMENT' [patent_app_type] => utility [patent_app_number] => 14/353053 [patent_app_country] => US [patent_app_date] => 2012-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8613 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14353053 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/353053
Non-intrusive method and apparatus for automatically dispatching security rules in cloud environment Sep 11, 2012 Issued
Menu