Search

Shahbaz Nazrul

Examiner (ID: 11312, Phone: (571)270-1467 , Office: P/2661 )

Most Active Art Unit
2661
Art Unit(s)
2661, 2638, 2696, 2697, 2622
Total Applications
876
Issued Applications
768
Pending Applications
77
Abandoned Applications
64

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 5896470 [patent_doc_number] => 20060005009 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-01-05 [patent_title] => 'Method, system and program product for verifying an attribute of a computing device' [patent_app_type] => utility [patent_app_number] => 10/881870 [patent_app_country] => US [patent_app_date] => 2004-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5194 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0005/20060005009.pdf [firstpage_image] =>[orig_patent_app_number] => 10881870 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/881870
Method, system and program product for verifying an attribute of a computing device Jun 29, 2004 Abandoned
Array ( [id] => 5896123 [patent_doc_number] => 20060004662 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-01-05 [patent_title] => 'Method and system for a PKI-based delegation process' [patent_app_type] => utility [patent_app_number] => 10/881978 [patent_app_country] => US [patent_app_date] => 2004-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 13079 [patent_no_of_claims] => 45 [patent_no_of_ind_claims] => 18 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0004/20060004662.pdf [firstpage_image] =>[orig_patent_app_number] => 10881978 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/881978
Method and system for a PKI-based delegation process Jun 29, 2004 Issued
Array ( [id] => 5896708 [patent_doc_number] => 20060005247 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-01-05 [patent_title] => 'Method and system for detecting when an outgoing communication contains certain content' [patent_app_type] => utility [patent_app_number] => 10/881867 [patent_app_country] => US [patent_app_date] => 2004-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 6497 [patent_no_of_claims] => 50 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0005/20060005247.pdf [firstpage_image] =>[orig_patent_app_number] => 10881867 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/881867
Method and system for detecting when an outgoing communication contains certain content Jun 29, 2004 Issued
Array ( [id] => 4445778 [patent_doc_number] => 07929689 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-04-19 [patent_title] => 'Call signs' [patent_app_type] => utility [patent_app_number] => 10/882079 [patent_app_country] => US [patent_app_date] => 2004-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9799 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/929/07929689.pdf [firstpage_image] =>[orig_patent_app_number] => 10882079 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/882079
Call signs Jun 29, 2004 Issued
Array ( [id] => 7047273 [patent_doc_number] => 20050251868 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-11-10 [patent_title] => 'Theft deterrence method and system' [patent_app_type] => utility [patent_app_number] => 10/840467 [patent_app_country] => US [patent_app_date] => 2004-05-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3157 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0251/20050251868.pdf [firstpage_image] =>[orig_patent_app_number] => 10840467 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/840467
Theft deterrence method and system May 4, 2004 Abandoned
Array ( [id] => 7069847 [patent_doc_number] => 20050245232 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-11-03 [patent_title] => 'Emergency response mission support platform' [patent_app_type] => utility [patent_app_number] => 10/836370 [patent_app_country] => US [patent_app_date] => 2004-04-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6324 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0245/20050245232.pdf [firstpage_image] =>[orig_patent_app_number] => 10836370 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/836370
Emergency response mission support platform Apr 29, 2004 Abandoned
Array ( [id] => 7242931 [patent_doc_number] => 20050257268 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-11-17 [patent_title] => 'Security center' [patent_app_type] => utility [patent_app_number] => 10/836391 [patent_app_country] => US [patent_app_date] => 2004-04-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 7648 [patent_no_of_claims] => 33 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0257/20050257268.pdf [firstpage_image] =>[orig_patent_app_number] => 10836391 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/836391
Security center Apr 28, 2004 Abandoned
Array ( [id] => 7746966 [patent_doc_number] => 08108937 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-01-31 [patent_title] => 'Robustly regulating access to executable class registry entries' [patent_app_type] => utility [patent_app_number] => 10/832788 [patent_app_country] => US [patent_app_date] => 2004-04-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 2840 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 121 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/108/08108937.pdf [firstpage_image] =>[orig_patent_app_number] => 10832788 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/832788
Robustly regulating access to executable class registry entries Apr 25, 2004 Issued
Array ( [id] => 6952575 [patent_doc_number] => 20050227670 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-10-13 [patent_title] => 'Methods and systems for providing voice over internet protocol communications via an intranet' [patent_app_type] => utility [patent_app_number] => 10/819175 [patent_app_country] => US [patent_app_date] => 2004-04-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2269 [patent_no_of_claims] => 34 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0227/20050227670.pdf [firstpage_image] =>[orig_patent_app_number] => 10819175 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/819175
Methods and systems for providing voice over internet protocol communications via an intranet Apr 6, 2004 Abandoned
Array ( [id] => 7112832 [patent_doc_number] => 20050210288 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-09-22 [patent_title] => 'Method and apparatus for eliminating dual authentication for enterprise access via wireless LAN services' [patent_app_type] => utility [patent_app_number] => 10/805889 [patent_app_country] => US [patent_app_date] => 2004-03-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6171 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0210/20050210288.pdf [firstpage_image] =>[orig_patent_app_number] => 10805889 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/805889
Method and apparatus for eliminating dual authentication for enterprise access via wireless LAN services Mar 21, 2004 Abandoned
Array ( [id] => 7457348 [patent_doc_number] => 20040187009 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-09-23 [patent_title] => 'Information providing device, method, program and recording medium, and user authentication device, method, program and recording medium' [patent_app_type] => new [patent_app_number] => 10/803896 [patent_app_country] => US [patent_app_date] => 2004-03-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 27 [patent_figures_cnt] => 27 [patent_no_of_words] => 17027 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 109 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0187/20040187009.pdf [firstpage_image] =>[orig_patent_app_number] => 10803896 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/803896
Information providing device, method, program and recording medium, and user authentication device, method, program and recording medium Mar 18, 2004 Issued
Array ( [id] => 6992130 [patent_doc_number] => 20050091167 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-04-28 [patent_title] => 'Interdiction of unauthorized copying in a decentralized network' [patent_app_type] => utility [patent_app_number] => 10/803784 [patent_app_country] => US [patent_app_date] => 2004-03-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 5848 [patent_no_of_claims] => 70 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0091/20050091167.pdf [firstpage_image] =>[orig_patent_app_number] => 10803784 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/803784
Interdiction of unauthorized copying in a decentralized network Mar 17, 2004 Abandoned
Array ( [id] => 7381781 [patent_doc_number] => 20040179686 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-09-16 [patent_title] => 'Method of reconstructing a secret, shared secret reconstruction apparatus, and secret reconstruction system' [patent_app_type] => new [patent_app_number] => 10/798578 [patent_app_country] => US [patent_app_date] => 2004-03-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 22 [patent_figures_cnt] => 22 [patent_no_of_words] => 23874 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0179/20040179686.pdf [firstpage_image] =>[orig_patent_app_number] => 10798578 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/798578
Method of reconstructing a secret, shared secret reconstruction apparatus, and secret reconstruction system Mar 11, 2004 Issued
Array ( [id] => 7177931 [patent_doc_number] => 20050204139 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-09-15 [patent_title] => 'Service broker security' [patent_app_type] => utility [patent_app_number] => 10/797767 [patent_app_country] => US [patent_app_date] => 2004-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 7358 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0204/20050204139.pdf [firstpage_image] =>[orig_patent_app_number] => 10797767 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/797767
Service broker security Mar 9, 2004 Abandoned
Array ( [id] => 6913996 [patent_doc_number] => 20050177754 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-08-11 [patent_title] => 'Password management peripheral system and method' [patent_app_type] => utility [patent_app_number] => 10/774878 [patent_app_country] => US [patent_app_date] => 2004-02-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2899 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0177/20050177754.pdf [firstpage_image] =>[orig_patent_app_number] => 10774878 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/774878
Password management peripheral system and method Feb 8, 2004 Abandoned
Array ( [id] => 8285934 [patent_doc_number] => 08220055 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-07-10 [patent_title] => 'Behavior blocking utilizing positive behavior system and method' [patent_app_type] => utility [patent_app_number] => 10/774177 [patent_app_country] => US [patent_app_date] => 2004-02-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 4266 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 119 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 10774177 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/774177
Behavior blocking utilizing positive behavior system and method Feb 5, 2004 Issued
Array ( [id] => 7431916 [patent_doc_number] => 20040184602 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2004-09-23 [patent_title] => 'Implementations of AES algorithm for reducing hardware with improved efficiency' [patent_app_type] => new [patent_app_number] => 10/764504 [patent_app_country] => US [patent_app_date] => 2004-01-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 24 [patent_figures_cnt] => 24 [patent_no_of_words] => 10545 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 87 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0184/20040184602.pdf [firstpage_image] =>[orig_patent_app_number] => 10764504 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/764504
Implementations of AES algorithm for reducing hardware with improved efficiency Jan 26, 2004 Issued
Array ( [id] => 6992467 [patent_doc_number] => 20050091504 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-04-28 [patent_title] => 'Storage apparatus and access management method therefor' [patent_app_type] => utility [patent_app_number] => 10/765289 [patent_app_country] => US [patent_app_date] => 2004-01-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7927 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0091/20050091504.pdf [firstpage_image] =>[orig_patent_app_number] => 10765289 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/765289
Storage apparatus and access management method therefor Jan 25, 2004 Abandoned
Array ( [id] => 213529 [patent_doc_number] => 07624449 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2009-11-24 [patent_title] => 'Countering polymorphic malicious computer code through code optimization' [patent_app_type] => utility [patent_app_number] => 10/763673 [patent_app_country] => US [patent_app_date] => 2004-01-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 12130 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 125 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/624/07624449.pdf [firstpage_image] =>[orig_patent_app_number] => 10763673 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/763673
Countering polymorphic malicious computer code through code optimization Jan 21, 2004 Issued
Array ( [id] => 6999512 [patent_doc_number] => 20050138263 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2005-06-23 [patent_title] => 'Method and apparatus to retain system control when a buffer overflow attack occurs' [patent_app_type] => utility [patent_app_number] => 10/746667 [patent_app_country] => US [patent_app_date] => 2003-12-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2489 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0138/20050138263.pdf [firstpage_image] =>[orig_patent_app_number] => 10746667 [rel_patent_id] =>[rel_patent_doc_number] =>)
10/746667
Method and apparatus to retain system control when a buffer overflow attack occurs Dec 22, 2003 Abandoned
Menu