
Shahbaz Nazrul
Examiner (ID: 11312, Phone: (571)270-1467 , Office: P/2661 )
| Most Active Art Unit | 2661 |
| Art Unit(s) | 2661, 2638, 2696, 2697, 2622 |
| Total Applications | 876 |
| Issued Applications | 768 |
| Pending Applications | 77 |
| Abandoned Applications | 64 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 5896470
[patent_doc_number] => 20060005009
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-01-05
[patent_title] => 'Method, system and program product for verifying an attribute of a computing device'
[patent_app_type] => utility
[patent_app_number] => 10/881870
[patent_app_country] => US
[patent_app_date] => 2004-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5194
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0005/20060005009.pdf
[firstpage_image] =>[orig_patent_app_number] => 10881870
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/881870 | Method, system and program product for verifying an attribute of a computing device | Jun 29, 2004 | Abandoned |
Array
(
[id] => 5896123
[patent_doc_number] => 20060004662
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-01-05
[patent_title] => 'Method and system for a PKI-based delegation process'
[patent_app_type] => utility
[patent_app_number] => 10/881978
[patent_app_country] => US
[patent_app_date] => 2004-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13079
[patent_no_of_claims] => 45
[patent_no_of_ind_claims] => 18
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0004/20060004662.pdf
[firstpage_image] =>[orig_patent_app_number] => 10881978
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/881978 | Method and system for a PKI-based delegation process | Jun 29, 2004 | Issued |
Array
(
[id] => 5896708
[patent_doc_number] => 20060005247
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2006-01-05
[patent_title] => 'Method and system for detecting when an outgoing communication contains certain content'
[patent_app_type] => utility
[patent_app_number] => 10/881867
[patent_app_country] => US
[patent_app_date] => 2004-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6497
[patent_no_of_claims] => 50
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0005/20060005247.pdf
[firstpage_image] =>[orig_patent_app_number] => 10881867
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/881867 | Method and system for detecting when an outgoing communication contains certain content | Jun 29, 2004 | Issued |
Array
(
[id] => 4445778
[patent_doc_number] => 07929689
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-04-19
[patent_title] => 'Call signs'
[patent_app_type] => utility
[patent_app_number] => 10/882079
[patent_app_country] => US
[patent_app_date] => 2004-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9799
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/929/07929689.pdf
[firstpage_image] =>[orig_patent_app_number] => 10882079
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/882079 | Call signs | Jun 29, 2004 | Issued |
Array
(
[id] => 7047273
[patent_doc_number] => 20050251868
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-11-10
[patent_title] => 'Theft deterrence method and system'
[patent_app_type] => utility
[patent_app_number] => 10/840467
[patent_app_country] => US
[patent_app_date] => 2004-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3157
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0251/20050251868.pdf
[firstpage_image] =>[orig_patent_app_number] => 10840467
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/840467 | Theft deterrence method and system | May 4, 2004 | Abandoned |
Array
(
[id] => 7069847
[patent_doc_number] => 20050245232
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-11-03
[patent_title] => 'Emergency response mission support platform'
[patent_app_type] => utility
[patent_app_number] => 10/836370
[patent_app_country] => US
[patent_app_date] => 2004-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6324
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0245/20050245232.pdf
[firstpage_image] =>[orig_patent_app_number] => 10836370
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/836370 | Emergency response mission support platform | Apr 29, 2004 | Abandoned |
Array
(
[id] => 7242931
[patent_doc_number] => 20050257268
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-11-17
[patent_title] => 'Security center'
[patent_app_type] => utility
[patent_app_number] => 10/836391
[patent_app_country] => US
[patent_app_date] => 2004-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 7648
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0257/20050257268.pdf
[firstpage_image] =>[orig_patent_app_number] => 10836391
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/836391 | Security center | Apr 28, 2004 | Abandoned |
Array
(
[id] => 7746966
[patent_doc_number] => 08108937
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-01-31
[patent_title] => 'Robustly regulating access to executable class registry entries'
[patent_app_type] => utility
[patent_app_number] => 10/832788
[patent_app_country] => US
[patent_app_date] => 2004-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2840
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/108/08108937.pdf
[firstpage_image] =>[orig_patent_app_number] => 10832788
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/832788 | Robustly regulating access to executable class registry entries | Apr 25, 2004 | Issued |
Array
(
[id] => 6952575
[patent_doc_number] => 20050227670
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-10-13
[patent_title] => 'Methods and systems for providing voice over internet protocol communications via an intranet'
[patent_app_type] => utility
[patent_app_number] => 10/819175
[patent_app_country] => US
[patent_app_date] => 2004-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2269
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0227/20050227670.pdf
[firstpage_image] =>[orig_patent_app_number] => 10819175
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/819175 | Methods and systems for providing voice over internet protocol communications via an intranet | Apr 6, 2004 | Abandoned |
Array
(
[id] => 7112832
[patent_doc_number] => 20050210288
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-09-22
[patent_title] => 'Method and apparatus for eliminating dual authentication for enterprise access via wireless LAN services'
[patent_app_type] => utility
[patent_app_number] => 10/805889
[patent_app_country] => US
[patent_app_date] => 2004-03-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6171
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0210/20050210288.pdf
[firstpage_image] =>[orig_patent_app_number] => 10805889
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/805889 | Method and apparatus for eliminating dual authentication for enterprise access via wireless LAN services | Mar 21, 2004 | Abandoned |
Array
(
[id] => 7457348
[patent_doc_number] => 20040187009
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-09-23
[patent_title] => 'Information providing device, method, program and recording medium, and user authentication device, method, program and recording medium'
[patent_app_type] => new
[patent_app_number] => 10/803896
[patent_app_country] => US
[patent_app_date] => 2004-03-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 17027
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 109
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0187/20040187009.pdf
[firstpage_image] =>[orig_patent_app_number] => 10803896
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/803896 | Information providing device, method, program and recording medium, and user authentication device, method, program and recording medium | Mar 18, 2004 | Issued |
Array
(
[id] => 6992130
[patent_doc_number] => 20050091167
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-04-28
[patent_title] => 'Interdiction of unauthorized copying in a decentralized network'
[patent_app_type] => utility
[patent_app_number] => 10/803784
[patent_app_country] => US
[patent_app_date] => 2004-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5848
[patent_no_of_claims] => 70
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0091/20050091167.pdf
[firstpage_image] =>[orig_patent_app_number] => 10803784
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/803784 | Interdiction of unauthorized copying in a decentralized network | Mar 17, 2004 | Abandoned |
Array
(
[id] => 7381781
[patent_doc_number] => 20040179686
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-09-16
[patent_title] => 'Method of reconstructing a secret, shared secret reconstruction apparatus, and secret reconstruction system'
[patent_app_type] => new
[patent_app_number] => 10/798578
[patent_app_country] => US
[patent_app_date] => 2004-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 23874
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0179/20040179686.pdf
[firstpage_image] =>[orig_patent_app_number] => 10798578
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/798578 | Method of reconstructing a secret, shared secret reconstruction apparatus, and secret reconstruction system | Mar 11, 2004 | Issued |
Array
(
[id] => 7177931
[patent_doc_number] => 20050204139
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-09-15
[patent_title] => 'Service broker security'
[patent_app_type] => utility
[patent_app_number] => 10/797767
[patent_app_country] => US
[patent_app_date] => 2004-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 7358
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0204/20050204139.pdf
[firstpage_image] =>[orig_patent_app_number] => 10797767
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/797767 | Service broker security | Mar 9, 2004 | Abandoned |
Array
(
[id] => 6913996
[patent_doc_number] => 20050177754
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-08-11
[patent_title] => 'Password management peripheral system and method'
[patent_app_type] => utility
[patent_app_number] => 10/774878
[patent_app_country] => US
[patent_app_date] => 2004-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2899
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0177/20050177754.pdf
[firstpage_image] =>[orig_patent_app_number] => 10774878
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/774878 | Password management peripheral system and method | Feb 8, 2004 | Abandoned |
Array
(
[id] => 8285934
[patent_doc_number] => 08220055
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-07-10
[patent_title] => 'Behavior blocking utilizing positive behavior system and method'
[patent_app_type] => utility
[patent_app_number] => 10/774177
[patent_app_country] => US
[patent_app_date] => 2004-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4266
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 10774177
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/774177 | Behavior blocking utilizing positive behavior system and method | Feb 5, 2004 | Issued |
Array
(
[id] => 7431916
[patent_doc_number] => 20040184602
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2004-09-23
[patent_title] => 'Implementations of AES algorithm for reducing hardware with improved efficiency'
[patent_app_type] => new
[patent_app_number] => 10/764504
[patent_app_country] => US
[patent_app_date] => 2004-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 10545
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0184/20040184602.pdf
[firstpage_image] =>[orig_patent_app_number] => 10764504
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/764504 | Implementations of AES algorithm for reducing hardware with improved efficiency | Jan 26, 2004 | Issued |
Array
(
[id] => 6992467
[patent_doc_number] => 20050091504
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-04-28
[patent_title] => 'Storage apparatus and access management method therefor'
[patent_app_type] => utility
[patent_app_number] => 10/765289
[patent_app_country] => US
[patent_app_date] => 2004-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7927
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0091/20050091504.pdf
[firstpage_image] =>[orig_patent_app_number] => 10765289
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/765289 | Storage apparatus and access management method therefor | Jan 25, 2004 | Abandoned |
Array
(
[id] => 213529
[patent_doc_number] => 07624449
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2009-11-24
[patent_title] => 'Countering polymorphic malicious computer code through code optimization'
[patent_app_type] => utility
[patent_app_number] => 10/763673
[patent_app_country] => US
[patent_app_date] => 2004-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 12130
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/624/07624449.pdf
[firstpage_image] =>[orig_patent_app_number] => 10763673
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/763673 | Countering polymorphic malicious computer code through code optimization | Jan 21, 2004 | Issued |
Array
(
[id] => 6999512
[patent_doc_number] => 20050138263
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2005-06-23
[patent_title] => 'Method and apparatus to retain system control when a buffer overflow attack occurs'
[patent_app_type] => utility
[patent_app_number] => 10/746667
[patent_app_country] => US
[patent_app_date] => 2003-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2489
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0138/20050138263.pdf
[firstpage_image] =>[orig_patent_app_number] => 10746667
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/746667 | Method and apparatus to retain system control when a buffer overflow attack occurs | Dec 22, 2003 | Abandoned |