Shah R Zaman
Examiner (ID: 9187, Phone: (571)272-0722 , Office: P/2466 )
Most Active Art Unit | 2466 |
Art Unit(s) | 2466 |
Total Applications | 64 |
Issued Applications | 46 |
Pending Applications | 0 |
Abandoned Applications | 18 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 15600145
[patent_doc_number] => 20200076607
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => HYPERVISOR SUPPORTED SECRETS COMPARTMENT
[patent_app_type] => utility
[patent_app_number] => 16/666245
[patent_app_country] => US
[patent_app_date] => 2019-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11129
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16666245
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/666245 | Hypervisor supported secrets compartment | Oct 27, 2019 | Issued |
Array
(
[id] => 16566000
[patent_doc_number] => 10891369
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-01-12
[patent_title] => Dynamic switching between pointer authentication regimes
[patent_app_type] => utility
[patent_app_number] => 16/664714
[patent_app_country] => US
[patent_app_date] => 2019-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 25
[patent_no_of_words] => 21051
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16664714
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/664714 | Dynamic switching between pointer authentication regimes | Oct 24, 2019 | Issued |
Array
(
[id] => 15778229
[patent_doc_number] => 20200120132
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-16
[patent_title] => METHOD FOR AN OBJECT TO COMMUNICATE WITH A CONNECTED OBJECTS NETWORK TO REPORT THAT A CLONE MAY BE IMPERSONATING THE OBJECT IN THE NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/654602
[patent_app_country] => US
[patent_app_date] => 2019-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3604
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 39
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16654602
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/654602 | Method for an object to communicate with a connected objects network to report that a clone may be impersonating the object in the network | Oct 15, 2019 | Issued |
Array
(
[id] => 17017387
[patent_doc_number] => 11087029
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-08-10
[patent_title] => Encryption engine and decryption engine with glitch randomization to prevent side channel attacks
[patent_app_type] => utility
[patent_app_number] => 16/597591
[patent_app_country] => US
[patent_app_date] => 2019-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 18814
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16597591
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/597591 | Encryption engine and decryption engine with glitch randomization to prevent side channel attacks | Oct 8, 2019 | Issued |
Array
(
[id] => 15720065
[patent_doc_number] => 20200106800
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-02
[patent_title] => Selectively Choosing Between Actual-Attack and Simulation/Evaluation for Validating a Vulnerability of a Network Node During Execution of a Penetration Testing Campaign
[patent_app_type] => utility
[patent_app_number] => 16/566969
[patent_app_country] => US
[patent_app_date] => 2019-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 26682
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 333
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16566969
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/566969 | Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign | Sep 10, 2019 | Issued |
Array
(
[id] => 16690945
[patent_doc_number] => 20210073423
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-11
[patent_title] => MAINTENANCE OF ACCESS FOR SECURITY ENABLEMENT IN A STORAGE DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/568160
[patent_app_country] => US
[patent_app_date] => 2019-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8692
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 75
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16568160
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/568160 | Maintenance of access for security enablement in a storage device | Sep 10, 2019 | Issued |
Array
(
[id] => 16577583
[patent_doc_number] => 20210011984
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-14
[patent_title] => USING SECURE MEMORY ENCLAVES FROM THE CONTEXT OF PROCESS CONTAINERS
[patent_app_type] => utility
[patent_app_number] => 16/565271
[patent_app_country] => US
[patent_app_date] => 2019-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9640
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16565271
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/565271 | Using secure memory enclaves from the context of process containers | Sep 8, 2019 | Issued |
Array
(
[id] => 18606488
[patent_doc_number] => 11747952
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-09-05
[patent_title] => Specialization of a user interface using machine learning
[patent_app_type] => utility
[patent_app_number] => 16/549623
[patent_app_country] => US
[patent_app_date] => 2019-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7244
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16549623
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/549623 | Specialization of a user interface using machine learning | Aug 22, 2019 | Issued |
Array
(
[id] => 16659541
[patent_doc_number] => 20210056178
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-25
[patent_title] => METHOD AND APPARATUS FOR LIMITING A NUMBER OF SIMULTANEOUS USERS OF SOFTWARE
[patent_app_type] => utility
[patent_app_number] => 16/546435
[patent_app_country] => US
[patent_app_date] => 2019-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7274
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16546435
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/546435 | Method and apparatus for limiting a number of simultaneous users of software | Aug 20, 2019 | Issued |
Array
(
[id] => 16952614
[patent_doc_number] => 20210211306
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-08
[patent_title] => SYSTEMS AND METHODS FOR A BUTTERFLY KEY EXCHANGE PROGRAM
[patent_app_type] => utility
[patent_app_number] => 16/634874
[patent_app_country] => US
[patent_app_date] => 2019-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9366
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16634874
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/634874 | Systems and methods for a butterfly key exchange program | Aug 20, 2019 | Issued |
Array
(
[id] => 17517931
[patent_doc_number] => 11297101
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-04-05
[patent_title] => Phishing website detection by checking form differences followed by false credentials submission
[patent_app_type] => utility
[patent_app_number] => 16/544865
[patent_app_country] => US
[patent_app_date] => 2019-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 1833
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 526
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16544865
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/544865 | Phishing website detection by checking form differences followed by false credentials submission | Aug 18, 2019 | Issued |
Array
(
[id] => 15183001
[patent_doc_number] => 20190362092
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-28
[patent_title] => METHODS AND APPARATUS FOR SCALABLE METRICS GATHERING FROM SECURE DATA CENTERS
[patent_app_type] => utility
[patent_app_number] => 16/539921
[patent_app_country] => US
[patent_app_date] => 2019-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6417
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16539921
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/539921 | Methods and apparatus for scalable metrics gathering from secure data centers | Aug 12, 2019 | Issued |
Array
(
[id] => 17629427
[patent_doc_number] => 20220164442
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-05-26
[patent_title] => THREAD MAPPING
[patent_app_type] => utility
[patent_app_number] => 17/602305
[patent_app_country] => US
[patent_app_date] => 2019-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5191
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 58
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17602305
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/602305 | THREAD MAPPING | Aug 11, 2019 | Pending |
Array
(
[id] => 17847123
[patent_doc_number] => 11436501
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-09-06
[patent_title] => Personalization of a user interface using machine learning
[patent_app_type] => utility
[patent_app_number] => 16/536754
[patent_app_country] => US
[patent_app_date] => 2019-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5819
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16536754
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/536754 | Personalization of a user interface using machine learning | Aug 8, 2019 | Issued |
Array
(
[id] => 18644850
[patent_doc_number] => 11768922
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-09-26
[patent_title] => License management device, program execution device and method
[patent_app_type] => utility
[patent_app_number] => 17/262942
[patent_app_country] => US
[patent_app_date] => 2019-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5390
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17262942
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/262942 | License management device, program execution device and method | Aug 1, 2019 | Issued |
Array
(
[id] => 15156337
[patent_doc_number] => 20190356646
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-21
[patent_title] => SIMPLIFIED CONFIGURATION OF A NETWORK DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/527945
[patent_app_country] => US
[patent_app_date] => 2019-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5579
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16527945
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/527945 | Simplified configuration of a network device | Jul 30, 2019 | Issued |
Array
(
[id] => 16600011
[patent_doc_number] => 20210026542
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-28
[patent_title] => MEMORY AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 16/522454
[patent_app_country] => US
[patent_app_date] => 2019-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6516
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16522454
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/522454 | Memory authentication | Jul 24, 2019 | Issued |
Array
(
[id] => 17238627
[patent_doc_number] => 11182507
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-23
[patent_title] => Domain crossing in executing instructions in computer processors
[patent_app_type] => utility
[patent_app_number] => 16/520299
[patent_app_country] => US
[patent_app_date] => 2019-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10262
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16520299
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/520299 | Domain crossing in executing instructions in computer processors | Jul 22, 2019 | Issued |
Array
(
[id] => 17957033
[patent_doc_number] => 11483153
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-25
[patent_title] => Key encapsulation protocols
[patent_app_type] => utility
[patent_app_number] => 17/260576
[patent_app_country] => US
[patent_app_date] => 2019-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 16
[patent_no_of_words] => 14150
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 212
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17260576
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/260576 | Key encapsulation protocols | Jul 16, 2019 | Issued |
Array
(
[id] => 18795676
[patent_doc_number] => 11829458
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-11-28
[patent_title] => Identity recognition system and method, terminal and computer storage medium
[patent_app_type] => utility
[patent_app_number] => 17/043953
[patent_app_country] => US
[patent_app_date] => 2019-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 5342
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17043953
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/043953 | Identity recognition system and method, terminal and computer storage medium | Jul 4, 2019 | Issued |