Shah R Zaman
Examiner (ID: 9187, Phone: (571)272-0722 , Office: P/2466 )
Most Active Art Unit | 2466 |
Art Unit(s) | 2466 |
Total Applications | 64 |
Issued Applications | 46 |
Pending Applications | 0 |
Abandoned Applications | 18 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 15578811
[patent_doc_number] => 10579792
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-03
[patent_title] => Extracting malicious instructions on a virtual machine
[patent_app_type] => utility
[patent_app_number] => 15/169248
[patent_app_country] => US
[patent_app_date] => 2016-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12879
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15169248
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/169248 | Extracting malicious instructions on a virtual machine | May 30, 2016 | Issued |
Array
(
[id] => 11651920
[patent_doc_number] => 20170147821
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-25
[patent_title] => 'Detecting Malicious Instructions on a Virtual Machine Using Profiling'
[patent_app_type] => utility
[patent_app_number] => 15/169320
[patent_app_country] => US
[patent_app_date] => 2016-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 13139
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15169320
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/169320 | Detecting malicious instructions on a virtual machine using profiling | May 30, 2016 | Issued |
Array
(
[id] => 11398847
[patent_doc_number] => 20170019385
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-19
[patent_title] => 'METHOD AND APPARATUS FOR MANAGING ENCRYPTION KEYS FOR CLOUD SERVICE'
[patent_app_type] => utility
[patent_app_number] => 15/166556
[patent_app_country] => US
[patent_app_date] => 2016-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8454
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15166556
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/166556 | Method and apparatus for managing encryption keys for cloud service | May 26, 2016 | Issued |
Array
(
[id] => 12987133
[patent_doc_number] => 20170344746
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-30
[patent_title] => UTILIZING LIKELY INVARIANTS FOR RUNTIME PROTECTION OF WEB SERVICES
[patent_app_type] => utility
[patent_app_number] => 15/164116
[patent_app_country] => US
[patent_app_date] => 2016-05-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4234
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15164116
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/164116 | UTILIZING LIKELY INVARIANTS FOR RUNTIME PROTECTION OF WEB SERVICES | May 24, 2016 | Abandoned |
Array
(
[id] => 11682279
[patent_doc_number] => 09680829
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-13
[patent_title] => 'Broadcast-based trust establishment'
[patent_app_type] => utility
[patent_app_number] => 15/158507
[patent_app_country] => US
[patent_app_date] => 2016-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9730
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15158507
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/158507 | Broadcast-based trust establishment | May 17, 2016 | Issued |
Array
(
[id] => 12033010
[patent_doc_number] => 20170323110
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-09
[patent_title] => 'DYNAMICALLY EXCLUDING SENSITIVE INFORMATION FROM SYSTEM SNAPSHOT'
[patent_app_type] => utility
[patent_app_number] => 15/146922
[patent_app_country] => US
[patent_app_date] => 2016-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8149
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15146922
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/146922 | Dynamically excluding sensitive information from system snapshot | May 4, 2016 | Issued |
Array
(
[id] => 15545781
[patent_doc_number] => 10572674
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-25
[patent_title] => Terminal device and method for protecting information thereof
[patent_app_type] => utility
[patent_app_number] => 15/147066
[patent_app_country] => US
[patent_app_date] => 2016-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 32
[patent_no_of_words] => 13296
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15147066
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/147066 | Terminal device and method for protecting information thereof | May 4, 2016 | Issued |
Array
(
[id] => 15674699
[patent_doc_number] => 10601595
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-24
[patent_title] => Secure application attachment
[patent_app_type] => utility
[patent_app_number] => 15/146721
[patent_app_country] => US
[patent_app_date] => 2016-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5344
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 261
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15146721
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/146721 | Secure application attachment | May 3, 2016 | Issued |
Array
(
[id] => 14887509
[patent_doc_number] => 10423799
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-24
[patent_title] => Methods and apparatus for scalable metrics gathering from secure data centers
[patent_app_type] => utility
[patent_app_number] => 15/141250
[patent_app_country] => US
[patent_app_date] => 2016-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6365
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 353
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15141250
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/141250 | Methods and apparatus for scalable metrics gathering from secure data centers | Apr 27, 2016 | Issued |
Array
(
[id] => 15859139
[patent_doc_number] => 10644875
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-05
[patent_title] => Pre-authorization of public key infrastructure
[patent_app_type] => utility
[patent_app_number] => 15/141383
[patent_app_country] => US
[patent_app_date] => 2016-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6977
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 455
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15141383
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/141383 | Pre-authorization of public key infrastructure | Apr 27, 2016 | Issued |
Array
(
[id] => 11035407
[patent_doc_number] => 20160232363
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'CONTROLLING AN ANALYSIS SYSTEM OF BIOLOGICAL SAMPLES'
[patent_app_type] => utility
[patent_app_number] => 15/132723
[patent_app_country] => US
[patent_app_date] => 2016-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10046
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15132723
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/132723 | CONTROLLING AN ANALYSIS SYSTEM OF BIOLOGICAL SAMPLES | Apr 18, 2016 | Abandoned |
Array
(
[id] => 13120963
[patent_doc_number] => 10078836
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-18
[patent_title] => Authorizing access by a third party to a service from a service provider
[patent_app_type] => utility
[patent_app_number] => 15/132284
[patent_app_country] => US
[patent_app_date] => 2016-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 8050
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 388
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15132284
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/132284 | Authorizing access by a third party to a service from a service provider | Apr 18, 2016 | Issued |
Array
(
[id] => 15613137
[patent_doc_number] => 10587653
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-10
[patent_title] => Policy approval layer
[patent_app_type] => utility
[patent_app_number] => 15/091493
[patent_app_country] => US
[patent_app_date] => 2016-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12879
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15091493
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/091493 | Policy approval layer | Apr 4, 2016 | Issued |
Array
(
[id] => 11086263
[patent_doc_number] => 20160283229
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-29
[patent_title] => 'SYSTEMS AND METHODS FOR DETECTING COPIED COMPUTER CODE USING FINGERPRINTS'
[patent_app_type] => utility
[patent_app_number] => 15/079719
[patent_app_country] => US
[patent_app_date] => 2016-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 6239
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15079719
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/079719 | Systems and methods for detecting copied computer code using fingerprints | Mar 23, 2016 | Issued |
Array
(
[id] => 11072425
[patent_doc_number] => 20160269390
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-15
[patent_title] => 'DISPLAY APPARATUS AND CONTROL METHOD FOR DISPLAY APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 15/060435
[patent_app_country] => US
[patent_app_date] => 2016-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7416
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15060435
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/060435 | DISPLAY APPARATUS AND CONTROL METHOD FOR DISPLAY APPARATUS | Mar 2, 2016 | Abandoned |
Array
(
[id] => 11951630
[patent_doc_number] => 20170255781
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-07
[patent_title] => 'METHODS AND APPARATUS FOR PACKET-BASED VALIDATION OF CONTROL-FLOW TRANSFERS FOR HARDWARE CONTROL-FLOW ENFORCEMENT'
[patent_app_type] => utility
[patent_app_number] => 15/060274
[patent_app_country] => US
[patent_app_date] => 2016-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7473
[patent_no_of_claims] => 41
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15060274
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/060274 | Methods and apparatus for packet-based validation of control-flow transfers for hardware control-flow enforcement | Mar 2, 2016 | Issued |
Array
(
[id] => 15521505
[patent_doc_number] => 10567363
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-02-18
[patent_title] => Deterministic reproduction of system state using seeded pseudo-random number generators
[patent_app_type] => utility
[patent_app_number] => 15/060380
[patent_app_country] => US
[patent_app_date] => 2016-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 13337
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15060380
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/060380 | Deterministic reproduction of system state using seeded pseudo-random number generators | Mar 2, 2016 | Issued |
Array
(
[id] => 11064625
[patent_doc_number] => 20160261588
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-08
[patent_title] => 'SECURE NFC TOKEN SUPPORTING ESCALATING AUTHENTICATION OF NFC EXCHANGES'
[patent_app_type] => utility
[patent_app_number] => 15/060054
[patent_app_country] => US
[patent_app_date] => 2016-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5944
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15060054
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/060054 | SECURE NFC TOKEN SUPPORTING ESCALATING AUTHENTICATION OF NFC EXCHANGES | Mar 2, 2016 | Abandoned |
Array
(
[id] => 11638971
[patent_doc_number] => 09660963
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-23
[patent_title] => 'Adaptive encryption optimization'
[patent_app_type] => utility
[patent_app_number] => 15/059007
[patent_app_country] => US
[patent_app_date] => 2016-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7281
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 90
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15059007
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/059007 | Adaptive encryption optimization | Mar 1, 2016 | Issued |
Array
(
[id] => 10985511
[patent_doc_number] => 20160182456
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-23
[patent_title] => 'System and Method to Associate a Private User Identity with a Public User Identity'
[patent_app_type] => utility
[patent_app_number] => 15/054583
[patent_app_country] => US
[patent_app_date] => 2016-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 3247
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15054583
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/054583 | System and method to associate a private user identity with a public user identity | Feb 25, 2016 | Issued |