
Saleh Najjar
Supervisory Patent Examiner (ID: 11375, Phone: (571)272-4006 , Office: P/2492 )
| Most Active Art Unit | 2157 |
| Art Unit(s) | 2315, 2155, 2784, 2157, 2154, 2492, 2758 |
| Total Applications | 519 |
| Issued Applications | 365 |
| Pending Applications | 52 |
| Abandoned Applications | 100 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17264031
[patent_doc_number] => 20210377016
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-02
[patent_title] => KEY ROLLOVER FOR CLIENT SIDE ENCRYPTION IN DEDUPLICATION BACKUP SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 16/888343
[patent_app_country] => US
[patent_app_date] => 2020-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9116
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16888343
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/888343 | KEY ROLLOVER FOR CLIENT SIDE ENCRYPTION IN DEDUPLICATION BACKUP SYSTEMS | May 28, 2020 | Abandoned |
Array
(
[id] => 16454757
[patent_doc_number] => 20200364183
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-19
[patent_title] => DEVICE AND METHOD FOR MANAGING LEDGER DATA ON BLOCKCHAIN
[patent_app_type] => utility
[patent_app_number] => 16/868899
[patent_app_country] => US
[patent_app_date] => 2020-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6175
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16868899
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/868899 | DEVICE AND METHOD FOR MANAGING LEDGER DATA ON BLOCKCHAIN | May 6, 2020 | Abandoned |
Array
(
[id] => 16529925
[patent_doc_number] => 20200404006
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-24
[patent_title] => TELECOMMUNICATIONS DEFENCE SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/752319
[patent_app_country] => US
[patent_app_date] => 2020-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3702
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16752319
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/752319 | TELECOMMUNICATIONS DEFENCE SYSTEM | Jan 23, 2020 | Abandoned |
Array
(
[id] => 16546111
[patent_doc_number] => 20200412526
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-31
[patent_title] => METHOD AND APPARATUS FOR VERIFYING SMART CONTRACTS IN BLOCKCHAIN, AND STORAGE MEDIUM
[patent_app_type] => utility
[patent_app_number] => 16/969752
[patent_app_country] => US
[patent_app_date] => 2019-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6694
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16969752
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/969752 | METHOD AND APPARATUS FOR VERIFYING SMART CONTRACTS IN BLOCKCHAIN, AND STORAGE MEDIUM | Jun 16, 2019 | Abandoned |
Array
(
[id] => 14971535
[patent_doc_number] => 20190313246
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-10
[patent_title] => DEVICE DEFAULT WIFI CREDENTIALS FOR SIMPLIFIED AND SECURE CONFIGURATION OF NETWORKED TRANSDUCERS
[patent_app_type] => utility
[patent_app_number] => 16/376998
[patent_app_country] => US
[patent_app_date] => 2019-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 41871
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16376998
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/376998 | DEVICE DEFAULT WIFI CREDENTIALS FOR SIMPLIFIED AND SECURE CONFIGURATION OF NETWORKED TRANSDUCERS | Apr 4, 2019 | Abandoned |
Array
(
[id] => 15720049
[patent_doc_number] => 20200106792
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-02
[patent_title] => METHOD AND SYSTEM FOR PENETRATION TESTING CLASSIFICATION BASED ON CAPTURED LOG DATA
[patent_app_type] => utility
[patent_app_number] => 16/163954
[patent_app_country] => US
[patent_app_date] => 2018-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6401
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16163954
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/163954 | METHOD AND SYSTEM FOR PENETRATION TESTING CLASSIFICATION BASED ON CAPTURED LOG DATA | Oct 17, 2018 | Abandoned |
Array
(
[id] => 12920332
[patent_doc_number] => 20180198620
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-12
[patent_title] => SYSTEMS AND METHODS FOR ASSURING DATA ON LEASED COMPUTING RESOURCES
[patent_app_type] => utility
[patent_app_number] => 15/868269
[patent_app_country] => US
[patent_app_date] => 2018-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6429
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15868269
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/868269 | SYSTEMS AND METHODS FOR ASSURING DATA ON LEASED COMPUTING RESOURCES | Jan 10, 2018 | Abandoned |
Array
(
[id] => 12647946
[patent_doc_number] => 20180107813
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-19
[patent_title] => User Authentication Persistence
[patent_app_type] => utility
[patent_app_number] => 15/296674
[patent_app_country] => US
[patent_app_date] => 2016-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6362
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15296674
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/296674 | User Authentication Persistence | Oct 17, 2016 | Abandoned |
Array
(
[id] => 10591396
[patent_doc_number] => 09313022
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-12
[patent_title] => 'Homomorphic cryptography modeling in support of privacy policies'
[patent_app_type] => utility
[patent_app_number] => 14/665356
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7281
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14665356
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/665356 | Homomorphic cryptography modeling in support of privacy policies | Mar 22, 2015 | Issued |
Array
(
[id] => 11124482
[patent_doc_number] => 20160321456
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-03
[patent_title] => 'SYSTEMS, METHODS AND ASSOCIATED PROGRAM PRODUCTS TO MINIMIZE, RETRIEVE, SECURE AND SELECTIVELY DISTRIBUTE PERSONAL DATA'
[patent_app_type] => utility
[patent_app_number] => 15/105842
[patent_app_country] => US
[patent_app_date] => 2014-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4529
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15105842
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/105842 | SYSTEMS, METHODS AND ASSOCIATED PROGRAM PRODUCTS TO MINIMIZE, RETRIEVE, SECURE AND SELECTIVELY DISTRIBUTE PERSONAL DATA | Dec 17, 2014 | Abandoned |
Array
(
[id] => 9549088
[patent_doc_number] => 20140173736
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-19
[patent_title] => 'Method and system for detecting webpage Trojan embedded'
[patent_app_type] => utility
[patent_app_number] => 14/187891
[patent_app_country] => US
[patent_app_date] => 2014-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3379
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14187891
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/187891 | Method and system for detecting webpage Trojan embedded | Feb 23, 2014 | Abandoned |
Array
(
[id] => 10271173
[patent_doc_number] => 20150156170
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-04
[patent_title] => 'Security Event Routing In a Distributed Hash Table'
[patent_app_type] => utility
[patent_app_number] => 14/094961
[patent_app_country] => US
[patent_app_date] => 2013-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6281
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14094961
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/094961 | Security Event Routing In a Distributed Hash Table | Dec 2, 2013 | Abandoned |
Array
(
[id] => 10271196
[patent_doc_number] => 20150156193
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-04
[patent_title] => 'CREATING AND MANAGING CERTIFICATES IN A ROLE-BASED CERTIFICATE STORE'
[patent_app_type] => utility
[patent_app_number] => 14/094461
[patent_app_country] => US
[patent_app_date] => 2013-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5735
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14094461
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/094461 | CREATING AND MANAGING CERTIFICATES IN A ROLE-BASED CERTIFICATE STORE | Dec 1, 2013 | Abandoned |
Array
(
[id] => 9549066
[patent_doc_number] => 20140173714
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-19
[patent_title] => 'INFORMATION PROCESSING APPARATUS, AND LOCK EXECUTION METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/094453
[patent_app_country] => US
[patent_app_date] => 2013-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 10702
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14094453
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/094453 | INFORMATION PROCESSING APPARATUS, AND LOCK EXECUTION METHOD | Dec 1, 2013 | Abandoned |
Array
(
[id] => 9282766
[patent_doc_number] => 20140032733
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-30
[patent_title] => 'Policy-Based Application Management'
[patent_app_type] => utility
[patent_app_number] => 14/043902
[patent_app_country] => US
[patent_app_date] => 2013-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 40
[patent_figures_cnt] => 40
[patent_no_of_words] => 65604
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14043902
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/043902 | Policy-Based Application Management | Oct 1, 2013 | Abandoned |
Array
(
[id] => 10977408
[patent_doc_number] => 20140380443
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-25
[patent_title] => 'NETWORK CONNECTION IN A WIRELESS COMMUNICATION DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/925027
[patent_app_country] => US
[patent_app_date] => 2013-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3267
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13925027
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/925027 | NETWORK CONNECTION IN A WIRELESS COMMUNICATION DEVICE | Jun 23, 2013 | Abandoned |
Array
(
[id] => 10225275
[patent_doc_number] => 20150110268
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-23
[patent_title] => 'METHOD FOR CODING AND DECODING INFORMATION ASSOCIATED WITH AN ITEM'
[patent_app_type] => utility
[patent_app_number] => 14/385743
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7735
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14385743
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/385743 | METHOD FOR CODING AND DECODING INFORMATION ASSOCIATED WITH AN ITEM | Mar 14, 2013 | Abandoned |
Array
(
[id] => 9070907
[patent_doc_number] => 20130262663
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-03
[patent_title] => 'SYSTEM AND METHOD FOR PROCESSING SHAREWARE USING A HOST COMPUTER'
[patent_app_type] => utility
[patent_app_number] => 13/600224
[patent_app_country] => US
[patent_app_date] => 2012-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2201
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13600224
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/600224 | SYSTEM AND METHOD FOR PROCESSING SHAREWARE USING A HOST COMPUTER | Aug 30, 2012 | Abandoned |
Array
(
[id] => 8255320
[patent_doc_number] => 20120159650
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-21
[patent_title] => 'APPARATUS AND METHOD FOR RECOGNIZING SECURITY SITUATION AND GENERATING SITUATION INFORMATION BASED ON SPATIAL LINKAGE OF PHYSICAL AND IT SECURITY'
[patent_app_type] => utility
[patent_app_number] => 13/327334
[patent_app_country] => US
[patent_app_date] => 2011-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2970
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0159/20120159650.pdf
[firstpage_image] =>[orig_patent_app_number] => 13327334
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/327334 | APPARATUS AND METHOD FOR RECOGNIZING SECURITY SITUATION AND GENERATING SITUATION INFORMATION BASED ON SPATIAL LINKAGE OF PHYSICAL AND IT SECURITY | Dec 14, 2011 | Abandoned |
Array
(
[id] => 8710293
[patent_doc_number] => 20130067582
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-03-14
[patent_title] => 'SYSTEMS, METHODS AND DEVICES FOR PROVIDING DEVICE AUTHENTICATION, MITIGATION AND RISK ANALYSIS IN THE INTERNET AND CLOUD'
[patent_app_type] => utility
[patent_app_number] => 13/291651
[patent_app_country] => US
[patent_app_date] => 2011-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 5572
[patent_no_of_claims] => 60
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13291651
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/291651 | SYSTEMS, METHODS AND DEVICES FOR PROVIDING DEVICE AUTHENTICATION, MITIGATION AND RISK ANALYSIS IN THE INTERNET AND CLOUD | Nov 7, 2011 | Abandoned |