
Sher A. Khan
Examiner (ID: 6400, Phone: (571)272-8574 , Office: P/2497 )
| Most Active Art Unit | 2497 |
| Art Unit(s) | 2497 |
| Total Applications | 494 |
| Issued Applications | 426 |
| Pending Applications | 32 |
| Abandoned Applications | 51 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14694121
[patent_doc_number] => 20190246176
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-08
[patent_title] => Methods, Systems, and Devices for Securing Content
[patent_app_type] => utility
[patent_app_number] => 16/387611
[patent_app_country] => US
[patent_app_date] => 2019-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5113
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16387611
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/387611 | Methods, Systems, and Devices for Securing Content | Apr 17, 2019 | Abandoned |
Array
(
[id] => 16395365
[patent_doc_number] => 20200336306
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-22
[patent_title] => SYSTEM AND METHOD FOR STORAGE AND MANAGEMENT OF CONFIDENTIAL INFORMATION
[patent_app_type] => utility
[patent_app_number] => 16/386572
[patent_app_country] => US
[patent_app_date] => 2019-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9814
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -30
[patent_words_short_claim] => 65
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16386572
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/386572 | System and method for storage and management of confidential information | Apr 16, 2019 | Issued |
Array
(
[id] => 14658319
[patent_doc_number] => 20190236288
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-01
[patent_title] => Tamper-proof storage using signatures based on threshold voltage distributions
[patent_app_type] => utility
[patent_app_number] => 16/379817
[patent_app_country] => US
[patent_app_date] => 2019-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5935
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16379817
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/379817 | Tamper-proof storage using signatures based on threshold voltage distributions | Apr 9, 2019 | Issued |
Array
(
[id] => 16349416
[patent_doc_number] => 20200314067
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-01
[patent_title] => CLIENT-ONLY VIRTUAL PRIVATE NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/369438
[patent_app_country] => US
[patent_app_date] => 2019-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16263
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 43
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16369438
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/369438 | Client-only virtual private network | Mar 28, 2019 | Issued |
Array
(
[id] => 14970509
[patent_doc_number] => 20190312733
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-10
[patent_title] => RECURSIVE TOKEN BINDING FOR CASCADED SERVICE CALLS
[patent_app_type] => utility
[patent_app_number] => 16/366340
[patent_app_country] => US
[patent_app_date] => 2019-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9448
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16366340
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/366340 | Recursive token binding for cascaded service calls | Mar 26, 2019 | Issued |
Array
(
[id] => 17108242
[patent_doc_number] => 11128474
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-21
[patent_title] => Secure device communication
[patent_app_type] => utility
[patent_app_number] => 16/362772
[patent_app_country] => US
[patent_app_date] => 2019-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 17
[patent_no_of_words] => 21942
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16362772
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/362772 | Secure device communication | Mar 24, 2019 | Issued |
Array
(
[id] => 17019350
[patent_doc_number] => 11089006
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-10
[patent_title] => System and method of blocking network connections
[patent_app_type] => utility
[patent_app_number] => 16/359417
[patent_app_country] => US
[patent_app_date] => 2019-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7230
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16359417
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/359417 | System and method of blocking network connections | Mar 19, 2019 | Issued |
Array
(
[id] => 16333333
[patent_doc_number] => 20200304299
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-24
[patent_title] => SECURE DISTRIBUTION OF DEVICE KEY SETS OVER A NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/358821
[patent_app_country] => US
[patent_app_date] => 2019-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11094
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16358821
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/358821 | Secure distribution of device key sets over a network | Mar 19, 2019 | Issued |
Array
(
[id] => 15521637
[patent_doc_number] => 10567429
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-18
[patent_title] => Defense against NXDOMAIN hijacking in domain name systems
[patent_app_type] => utility
[patent_app_number] => 16/352929
[patent_app_country] => US
[patent_app_date] => 2019-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 14
[patent_no_of_words] => 6829
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16352929
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/352929 | Defense against NXDOMAIN hijacking in domain name systems | Mar 13, 2019 | Issued |
Array
(
[id] => 17078965
[patent_doc_number] => 11115392
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-09-07
[patent_title] => Consumer-authorized controlled distribution of trusted source data
[patent_app_type] => utility
[patent_app_number] => 16/294725
[patent_app_country] => US
[patent_app_date] => 2019-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7298
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16294725
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/294725 | Consumer-authorized controlled distribution of trusted source data | Mar 5, 2019 | Issued |
Array
(
[id] => 17248008
[patent_doc_number] => 20210367753
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-25
[patent_title] => TRUSTED MEASUREMENT AND CONTROL NETWORK AUTHENTICATION METHOD BASED ON DOUBLE CRYPTOGRAPHIC VALUES AND CHAOTIC ENCRYPTION
[patent_app_type] => utility
[patent_app_number] => 16/636727
[patent_app_country] => US
[patent_app_date] => 2019-02-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5156
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16636727
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/636727 | TRUSTED MEASUREMENT AND CONTROL NETWORK AUTHENTICATION METHOD BASED ON DOUBLE CRYPTOGRAPHIC VALUES AND CHAOTIC ENCRYPTION | Feb 20, 2019 | Abandoned |
Array
(
[id] => 15172187
[patent_doc_number] => 10491613
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-11-26
[patent_title] => Systems and methods for secure communication in cloud computing environments
[patent_app_type] => utility
[patent_app_number] => 16/253427
[patent_app_country] => US
[patent_app_date] => 2019-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7875
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16253427
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/253427 | Systems and methods for secure communication in cloud computing environments | Jan 21, 2019 | Issued |
Array
(
[id] => 16652382
[patent_doc_number] => 10929563
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-23
[patent_title] => Electronic device and method for protecting users privacy
[patent_app_type] => utility
[patent_app_number] => 16/222276
[patent_app_country] => US
[patent_app_date] => 2018-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 11
[patent_no_of_words] => 8032
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16222276
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/222276 | Electronic device and method for protecting users privacy | Dec 16, 2018 | Issued |
Array
(
[id] => 15186853
[patent_doc_number] => 20190364018
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-28
[patent_title] => SYSTEM ON CHIP FIREWALL MEMORY ARCHITECTURE
[patent_app_type] => utility
[patent_app_number] => 16/221318
[patent_app_country] => US
[patent_app_date] => 2018-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2891
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16221318
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/221318 | System on chip firewall memory architecture | Dec 13, 2018 | Issued |
Array
(
[id] => 16834218
[patent_doc_number] => 11010473
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-18
[patent_title] => Method of detecting malware in a sandbox environment
[patent_app_type] => utility
[patent_app_number] => 16/220063
[patent_app_country] => US
[patent_app_date] => 2018-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4879
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16220063
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/220063 | Method of detecting malware in a sandbox environment | Dec 13, 2018 | Issued |
Array
(
[id] => 17166962
[patent_doc_number] => 11153077
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-19
[patent_title] => Secure vehicle to vehicle communication
[patent_app_type] => utility
[patent_app_number] => 16/220959
[patent_app_country] => US
[patent_app_date] => 2018-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11862
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16220959
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/220959 | Secure vehicle to vehicle communication | Dec 13, 2018 | Issued |
Array
(
[id] => 17729823
[patent_doc_number] => 11386214
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-12
[patent_title] => Web application execution with secure element extension
[patent_app_type] => utility
[patent_app_number] => 16/218781
[patent_app_country] => US
[patent_app_date] => 2018-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 11318
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16218781
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/218781 | Web application execution with secure element extension | Dec 12, 2018 | Issued |
Array
(
[id] => 16416874
[patent_doc_number] => 10824770
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-03
[patent_title] => Web application execution with secure elements
[patent_app_type] => utility
[patent_app_number] => 16/218761
[patent_app_country] => US
[patent_app_date] => 2018-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10786
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16218761
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/218761 | Web application execution with secure elements | Dec 12, 2018 | Issued |
Array
(
[id] => 16018527
[patent_doc_number] => 20200184107
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-11
[patent_title] => MEMORY DATA SECURITY
[patent_app_type] => utility
[patent_app_number] => 16/216532
[patent_app_country] => US
[patent_app_date] => 2018-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7612
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 79
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16216532
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/216532 | Memory data security | Dec 10, 2018 | Issued |
Array
(
[id] => 16023439
[patent_doc_number] => 20200186563
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-11
[patent_title] => METHODS FOR DETECTING AND MITIGATING MALICIOUS NETWORK ACTIVITY BASED ON DYNAMIC APPLICATION CONTEXT AND DEVICES THEREOF
[patent_app_type] => utility
[patent_app_number] => 16/216937
[patent_app_country] => US
[patent_app_date] => 2018-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9354
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -28
[patent_words_short_claim] => 131
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16216937
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/216937 | Methods for detecting and mitigating malicious network activity based on dynamic application context and devices thereof | Dec 10, 2018 | Issued |