Shah R Zaman
Examiner (ID: 9187, Phone: (571)272-0722 , Office: P/2466 )
Most Active Art Unit | 2466 |
Art Unit(s) | 2466 |
Total Applications | 64 |
Issued Applications | 46 |
Pending Applications | 0 |
Abandoned Applications | 18 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 10861043
[patent_doc_number] => 08887261
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-11-11
[patent_title] => 'System for and method of authenticating media manager and obtaining a digital transmission content protection (DTCP) certificate'
[patent_app_type] => utility
[patent_app_number] => 12/963976
[patent_app_country] => US
[patent_app_date] => 2010-12-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9343
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12963976
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/963976 | System for and method of authenticating media manager and obtaining a digital transmission content protection (DTCP) certificate | Dec 8, 2010 | Issued |
Array
(
[id] => 9236261
[patent_doc_number] => 08601577
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-12-03
[patent_title] => 'Using configured error codes to enable spam blocking downstream from a mail transfer agent'
[patent_app_type] => utility
[patent_app_number] => 12/963435
[patent_app_country] => US
[patent_app_date] => 2010-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3550
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12963435
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/963435 | Using configured error codes to enable spam blocking downstream from a mail transfer agent | Dec 7, 2010 | Issued |
Array
(
[id] => 6592640
[patent_doc_number] => 20100274919
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-10-28
[patent_title] => 'BANDWIDTH ALLOCATION TO SUPPORT FAST BUFFERING'
[patent_app_type] => utility
[patent_app_number] => 12/829495
[patent_app_country] => US
[patent_app_date] => 2010-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 4543
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0274/20100274919.pdf
[firstpage_image] =>[orig_patent_app_number] => 12829495
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/829495 | BANDWIDTH ALLOCATION TO SUPPORT FAST BUFFERING | Jul 1, 2010 | Abandoned |
Array
(
[id] => 6365874
[patent_doc_number] => 20100333185
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-12-30
[patent_title] => 'GENERATING SECURITY MATERIAL'
[patent_app_type] => utility
[patent_app_number] => 12/795994
[patent_app_country] => US
[patent_app_date] => 2010-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4875
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0333/20100333185.pdf
[firstpage_image] =>[orig_patent_app_number] => 12795994
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/795994 | Generating security material | Jun 7, 2010 | Issued |
Array
(
[id] => 6608003
[patent_doc_number] => 20100310068
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-12-09
[patent_title] => 'METHOD FOR MONITORING EXECUTION OF DATA PROCESSING PROGRAM INSTRUCTIONS IN A SECURITY MODULE'
[patent_app_type] => utility
[patent_app_number] => 12/796383
[patent_app_country] => US
[patent_app_date] => 2010-06-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7025
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0310/20100310068.pdf
[firstpage_image] =>[orig_patent_app_number] => 12796383
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/796383 | Method for monitoring execution of data processing program instructions in a security module | Jun 7, 2010 | Issued |
Array
(
[id] => 6189316
[patent_doc_number] => 20110126010
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-26
[patent_title] => 'SERVER, SYSTEM AND METHOD FOR MANAGING IDENTITY'
[patent_app_type] => utility
[patent_app_number] => 12/795254
[patent_app_country] => US
[patent_app_date] => 2010-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7267
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0126/20110126010.pdf
[firstpage_image] =>[orig_patent_app_number] => 12795254
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/795254 | SERVER, SYSTEM AND METHOD FOR MANAGING IDENTITY | Jun 6, 2010 | Abandoned |
12/795133 | Malicious Script Detection Using Context-Dependent Script Emulation | Jun 6, 2010 | Abandoned |
Array
(
[id] => 7653359
[patent_doc_number] => 20110302628
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-08
[patent_title] => 'METHOD AND APPARATUS FOR PREVENTING AND ANALYZING NETWORK INTRUSION'
[patent_app_type] => utility
[patent_app_number] => 12/794080
[patent_app_country] => US
[patent_app_date] => 2010-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5393
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0302/20110302628.pdf
[firstpage_image] =>[orig_patent_app_number] => 12794080
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/794080 | Method and apparatus for preventing and analyzing network intrusion | Jun 3, 2010 | Issued |
Array
(
[id] => 6366070
[patent_doc_number] => 20100333213
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-12-30
[patent_title] => 'Systems and Methods for Determining Authorization to Operate Licensed Software Based on a Client Device Fingerprint'
[patent_app_type] => utility
[patent_app_number] => 12/792461
[patent_app_country] => US
[patent_app_date] => 2010-06-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4734
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0333/20100333213.pdf
[firstpage_image] =>[orig_patent_app_number] => 12792461
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/792461 | Systems and Methods for Determining Authorization to Operate Licensed Software Based on a Client Device Fingerprint | Jun 1, 2010 | Abandoned |
Array
(
[id] => 6413852
[patent_doc_number] => 20100306533
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-12-02
[patent_title] => 'SYSTEM, METHOD, AND APPARATA FOR SECURE COMMUNICATIONS USING AN ELECTRICAL GRID NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/790285
[patent_app_country] => US
[patent_app_date] => 2010-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 19493
[patent_no_of_claims] => 86
[patent_no_of_ind_claims] => 11
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0306/20100306533.pdf
[firstpage_image] =>[orig_patent_app_number] => 12790285
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/790285 | System, method, and apparata for secure communications using an electrical grid network | May 27, 2010 | Issued |
Array
(
[id] => 6189321
[patent_doc_number] => 20110126014
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-26
[patent_title] => 'Event Triggered Pairing of Wireless Communication Devices Based on Time Measurements'
[patent_app_type] => utility
[patent_app_number] => 12/789534
[patent_app_country] => US
[patent_app_date] => 2010-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4568
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0126/20110126014.pdf
[firstpage_image] =>[orig_patent_app_number] => 12789534
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/789534 | Event Triggered Pairing of Wireless Communication Devices Based on Time Measurements | May 27, 2010 | Abandoned |
Array
(
[id] => 7582634
[patent_doc_number] => 20110296517
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-01
[patent_title] => 'METHOD AND APPARATUS FOR PROVIDING REACTIVE AUTHORIZATION'
[patent_app_type] => utility
[patent_app_number] => 12/790358
[patent_app_country] => US
[patent_app_date] => 2010-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 15628
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0296/20110296517.pdf
[firstpage_image] =>[orig_patent_app_number] => 12790358
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/790358 | Method and apparatus for providing reactive authorization | May 27, 2010 | Issued |
Array
(
[id] => 7582614
[patent_doc_number] => 20110296497
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-01
[patent_title] => 'Delegation-Based Authorization'
[patent_app_type] => utility
[patent_app_number] => 12/789277
[patent_app_country] => US
[patent_app_date] => 2010-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5421
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0296/20110296497.pdf
[firstpage_image] =>[orig_patent_app_number] => 12789277
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/789277 | Delegation-based authorization | May 26, 2010 | Issued |
Array
(
[id] => 6584828
[patent_doc_number] => 20100235614
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-16
[patent_title] => 'INDUSTRIAL CONTROL DEVICE CONFIGURATION AND DISCOVERY'
[patent_app_type] => utility
[patent_app_number] => 12/787943
[patent_app_country] => US
[patent_app_date] => 2010-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7844
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20100235614.pdf
[firstpage_image] =>[orig_patent_app_number] => 12787943
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/787943 | INDUSTRIAL CONTROL DEVICE CONFIGURATION AND DISCOVERY | May 25, 2010 | Abandoned |
Array
(
[id] => 9156782
[patent_doc_number] => 08589696
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-11-19
[patent_title] => 'Biometric identification method'
[patent_app_type] => utility
[patent_app_number] => 13/321050
[patent_app_country] => US
[patent_app_date] => 2010-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 21
[patent_no_of_words] => 36252
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 1856
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13321050
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/321050 | Biometric identification method | May 17, 2010 | Issued |
Array
(
[id] => 6530329
[patent_doc_number] => 20100217819
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-08-26
[patent_title] => 'System and Method to Associate a Private User Identity with a Public User Identity'
[patent_app_type] => utility
[patent_app_number] => 12/771491
[patent_app_country] => US
[patent_app_date] => 2010-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 3058
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0217/20100217819.pdf
[firstpage_image] =>[orig_patent_app_number] => 12771491
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/771491 | System and method to associate a private user identity with a public user identity | Apr 29, 2010 | Issued |
Array
(
[id] => 6094609
[patent_doc_number] => 20110219425
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-08
[patent_title] => 'ACCESS CONTROL USING ROLES AND MULTI-DIMENSIONAL CONSTRAINTS'
[patent_app_type] => utility
[patent_app_number] => 12/719025
[patent_app_country] => US
[patent_app_date] => 2010-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5843
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0219/20110219425.pdf
[firstpage_image] =>[orig_patent_app_number] => 12719025
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/719025 | ACCESS CONTROL USING ROLES AND MULTI-DIMENSIONAL CONSTRAINTS | Mar 7, 2010 | Abandoned |
Array
(
[id] => 6094633
[patent_doc_number] => 20110219437
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-08
[patent_title] => 'AUTHENTICATION INFORMATION CHANGE FACILITY'
[patent_app_type] => utility
[patent_app_number] => 12/718968
[patent_app_country] => US
[patent_app_date] => 2010-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 15100
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0219/20110219437.pdf
[firstpage_image] =>[orig_patent_app_number] => 12718968
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/718968 | Authentication information change facility | Mar 5, 2010 | Issued |
Array
(
[id] => 6280997
[patent_doc_number] => 20100257373
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-10-07
[patent_title] => 'CRYPTOGRAPHIC PROCESSOR AND IC CARD'
[patent_app_type] => utility
[patent_app_number] => 12/715558
[patent_app_country] => US
[patent_app_date] => 2010-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8087
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0257/20100257373.pdf
[firstpage_image] =>[orig_patent_app_number] => 12715558
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/715558 | CRYPTOGRAPHIC PROCESSOR AND IC CARD | Mar 1, 2010 | Abandoned |
Array
(
[id] => 9029623
[patent_doc_number] => 08539220
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-09-17
[patent_title] => 'Secure computation using a server module'
[patent_app_type] => utility
[patent_app_number] => 12/713206
[patent_app_country] => US
[patent_app_date] => 2010-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 19
[patent_no_of_words] => 9710
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12713206
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/713206 | Secure computation using a server module | Feb 25, 2010 | Issued |