Shah R Zaman
Examiner (ID: 9187, Phone: (571)272-0722 , Office: P/2466 )
Most Active Art Unit | 2466 |
Art Unit(s) | 2466 |
Total Applications | 64 |
Issued Applications | 46 |
Pending Applications | 0 |
Abandoned Applications | 18 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 12161482
[patent_doc_number] => 20180032748
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'MOBILE DEVICE PHOTO DATA PRIVACY'
[patent_app_type] => utility
[patent_app_number] => 15/224265
[patent_app_country] => US
[patent_app_date] => 2016-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8632
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15224265
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/224265 | MOBILE DEVICE PHOTO DATA PRIVACY | Jul 28, 2016 | Abandoned |
Array
(
[id] => 12163559
[patent_doc_number] => 20180034824
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'SYSTEMS AND METHODS OF MANAGING DATA RIGHTS AND SELECTIVE DATA SHARING'
[patent_app_type] => utility
[patent_app_number] => 15/222683
[patent_app_country] => US
[patent_app_date] => 2016-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 18561
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15222683
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/222683 | Systems and methods of managing data rights and selective data sharing | Jul 27, 2016 | Issued |
Array
(
[id] => 11274827
[patent_doc_number] => 20160337374
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-17
[patent_title] => 'ACCESS OF A SERVICE'
[patent_app_type] => utility
[patent_app_number] => 15/218614
[patent_app_country] => US
[patent_app_date] => 2016-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4548
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15218614
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/218614 | ACCESS OF A SERVICE | Jul 24, 2016 | Abandoned |
Array
(
[id] => 11975695
[patent_doc_number] => 20170279849
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-28
[patent_title] => 'CONSTRAINT-AWARE RESOURCE SYNCHRONIZATION ACROSS HYPER-DISTRIBUTED LEARNING SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 15/210974
[patent_app_country] => US
[patent_app_date] => 2016-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10841
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15210974
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/210974 | Constraint-aware resource synchronization across hyper-distributed learning systems | Jul 14, 2016 | Issued |
Array
(
[id] => 15892451
[patent_doc_number] => 10652594
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-12
[patent_title] => Apparatus and methods for presentation of key frames in encrypted content
[patent_app_type] => utility
[patent_app_number] => 15/204610
[patent_app_country] => US
[patent_app_date] => 2016-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 16298
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 219
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15204610
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/204610 | Apparatus and methods for presentation of key frames in encrypted content | Jul 6, 2016 | Issued |
Array
(
[id] => 11545447
[patent_doc_number] => 20170099273
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-06
[patent_title] => 'PERIPHERAL DEVICE, WIRELESS COMMUNICATION CHIP, COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM HAVING APPLICATION PROGRAM STORED THEREIN, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/204170
[patent_app_country] => US
[patent_app_date] => 2016-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 20256
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15204170
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/204170 | Peripheral device, wireless communication chip, computer-readable non-transitory storage medium having application program stored therein, information processing system, and information processing method | Jul 6, 2016 | Issued |
Array
(
[id] => 11477017
[patent_doc_number] => 20170063799
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'SYSTEM AND METHOD FOR ESTABLISHING A COMMUNICATION LINK'
[patent_app_type] => utility
[patent_app_number] => 15/200388
[patent_app_country] => US
[patent_app_date] => 2016-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 41
[patent_figures_cnt] => 41
[patent_no_of_words] => 33541
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15200388
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/200388 | SYSTEM AND METHOD FOR ESTABLISHING A COMMUNICATION LINK | Jun 30, 2016 | Abandoned |
Array
(
[id] => 15387489
[patent_doc_number] => 10534935
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-14
[patent_title] => Migration of trusted security attributes to a security engine co-processor
[patent_app_type] => utility
[patent_app_number] => 15/200935
[patent_app_country] => US
[patent_app_date] => 2016-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 31
[patent_no_of_words] => 29584
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15200935
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/200935 | Migration of trusted security attributes to a security engine co-processor | Jun 30, 2016 | Issued |
Array
(
[id] => 15825261
[patent_doc_number] => 10637838
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-04-28
[patent_title] => Secure interprocess communications between mobile device applications using phone-generated keys
[patent_app_type] => utility
[patent_app_number] => 15/201264
[patent_app_country] => US
[patent_app_date] => 2016-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5007
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15201264
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/201264 | Secure interprocess communications between mobile device applications using phone-generated keys | Jun 30, 2016 | Issued |
Array
(
[id] => 13722255
[patent_doc_number] => 20170372082
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-28
[patent_title] => Methods and a System for Inoculating Inter-Device Communication
[patent_app_type] => utility
[patent_app_number] => 15/192722
[patent_app_country] => US
[patent_app_date] => 2016-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5878
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 60
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15192722
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/192722 | Methods and a system for inoculating inter-device communication | Jun 23, 2016 | Issued |
Array
(
[id] => 11558478
[patent_doc_number] => 20170104723
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-13
[patent_title] => 'Selective Encryption Delineation'
[patent_app_type] => utility
[patent_app_number] => 15/190512
[patent_app_country] => US
[patent_app_date] => 2016-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11047
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15190512
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/190512 | Selective encryption delineation | Jun 22, 2016 | Issued |
Array
(
[id] => 13696847
[patent_doc_number] => 20170359378
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-14
[patent_title] => SYSTEMS AND METHODS FOR ENFORCING DEVICE POLICIES
[patent_app_type] => utility
[patent_app_number] => 15/182408
[patent_app_country] => US
[patent_app_date] => 2016-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8669
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15182408
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/182408 | Systems and methods for enforcing device policies | Jun 13, 2016 | Issued |
Array
(
[id] => 15374635
[patent_doc_number] => 10529040
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-07
[patent_title] => Systems and methods of using geolocation verification
[patent_app_type] => utility
[patent_app_number] => 15/178538
[patent_app_country] => US
[patent_app_date] => 2016-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 8854
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 285
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178538
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/178538 | Systems and methods of using geolocation verification | Jun 8, 2016 | Issued |
Array
(
[id] => 11329010
[patent_doc_number] => 20160359622
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-08
[patent_title] => 'OPTIMIZABLE FULL-PATH ENCRYPTION IN A VIRTUALIZATION ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 15/172952
[patent_app_country] => US
[patent_app_date] => 2016-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9842
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15172952
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/172952 | Optimizable full-path encryption in a virtualization environment | Jun 2, 2016 | Issued |
Array
(
[id] => 12094754
[patent_doc_number] => 20170351847
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-07
[patent_title] => 'SIMPLE OBFUSCATION OF TEXT DATA IN BINARY FILES'
[patent_app_type] => utility
[patent_app_number] => 15/172891
[patent_app_country] => US
[patent_app_date] => 2016-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8073
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15172891
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/172891 | Simple obfuscation of text data in binary files | Jun 2, 2016 | Issued |
Array
(
[id] => 15583015
[patent_doc_number] => 10581914
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-03
[patent_title] => Method and system of mitigating network attacks
[patent_app_type] => utility
[patent_app_number] => 15/173434
[patent_app_country] => US
[patent_app_date] => 2016-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 13
[patent_no_of_words] => 8521
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15173434
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/173434 | Method and system of mitigating network attacks | Jun 2, 2016 | Issued |
Array
(
[id] => 11477041
[patent_doc_number] => 20170063824
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'METHOD AND DEVICE FOR DETERMINING CONTROL AUTHORITY ON USER DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/173190
[patent_app_country] => US
[patent_app_date] => 2016-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5920
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15173190
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/173190 | METHOD AND DEVICE FOR DETERMINING CONTROL AUTHORITY ON USER DEVICE | Jun 2, 2016 | Abandoned |
Array
(
[id] => 11329021
[patent_doc_number] => 20160359633
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-08
[patent_title] => 'SYSTEM AND METHOD FOR PUBLICLY CERTIFYING DATA'
[patent_app_type] => utility
[patent_app_number] => 15/171321
[patent_app_country] => US
[patent_app_date] => 2016-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4814
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15171321
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/171321 | SYSTEM AND METHOD FOR PUBLICLY CERTIFYING DATA | Jun 1, 2016 | Abandoned |
Array
(
[id] => 12992506
[patent_doc_number] => 20170346636
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-30
[patent_title] => COMMUNICATIONS SECURITY SYSTEMS AND METHODS
[patent_app_type] => utility
[patent_app_number] => 15/169245
[patent_app_country] => US
[patent_app_date] => 2016-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13457
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15169245
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/169245 | Communications security systems and methods | May 30, 2016 | Issued |
Array
(
[id] => 11653902
[patent_doc_number] => 20170149807
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-25
[patent_title] => 'Detecting Malicious Instructions on a Virtual Machine'
[patent_app_type] => utility
[patent_app_number] => 15/169282
[patent_app_country] => US
[patent_app_date] => 2016-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13320
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15169282
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/169282 | Detecting malicious instructions on a virtual machine | May 30, 2016 | Issued |