
Sher A. Khan
Examiner (ID: 14823, Phone: (571)272-8574 , Office: P/2497 )
| Most Active Art Unit | 2497 |
| Art Unit(s) | 2497 |
| Total Applications | 496 |
| Issued Applications | 428 |
| Pending Applications | 32 |
| Abandoned Applications | 51 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16685079
[patent_doc_number] => 10944577
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-09
[patent_title] => Certificate verification
[patent_app_type] => utility
[patent_app_number] => 15/566741
[patent_app_country] => US
[patent_app_date] => 2015-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6552
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15566741
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/566741 | Certificate verification | Apr 20, 2015 | Issued |
Array
(
[id] => 12020510
[patent_doc_number] => 09813232
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-07
[patent_title] => 'Device and method for resisting non-invasive attacks'
[patent_app_type] => utility
[patent_app_number] => 14/659924
[patent_app_country] => US
[patent_app_date] => 2015-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 17
[patent_no_of_words] => 5516
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14659924
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/659924 | Device and method for resisting non-invasive attacks | Mar 16, 2015 | Issued |
Array
(
[id] => 11253819
[patent_doc_number] => 09479338
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-25
[patent_title] => 'Method and system for certificate discovery and ranking certificate authorities'
[patent_app_type] => utility
[patent_app_number] => 14/659889
[patent_app_country] => US
[patent_app_date] => 2015-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 4188
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14659889
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/659889 | Method and system for certificate discovery and ranking certificate authorities | Mar 16, 2015 | Issued |
Array
(
[id] => 15017449
[patent_doc_number] => 10454899
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-10-22
[patent_title] => Controlling firewall ports in virtualized environments through public key cryptography
[patent_app_type] => utility
[patent_app_number] => 14/659367
[patent_app_country] => US
[patent_app_date] => 2015-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 15369
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14659367
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/659367 | Controlling firewall ports in virtualized environments through public key cryptography | Mar 15, 2015 | Issued |
Array
(
[id] => 12956725
[patent_doc_number] => 09838418
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-12-05
[patent_title] => Detecting malware in mixed content files
[patent_app_type] => utility
[patent_app_number] => 14/659385
[patent_app_country] => US
[patent_app_date] => 2015-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 10804
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14659385
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/659385 | Detecting malware in mixed content files | Mar 15, 2015 | Issued |
Array
(
[id] => 11686755
[patent_doc_number] => 09684802
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-20
[patent_title] => 'Verification and access control for industry-specific solution package'
[patent_app_type] => utility
[patent_app_number] => 14/659333
[patent_app_country] => US
[patent_app_date] => 2015-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 46
[patent_figures_cnt] => 46
[patent_no_of_words] => 18471
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14659333
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/659333 | Verification and access control for industry-specific solution package | Mar 15, 2015 | Issued |
Array
(
[id] => 12337827
[patent_doc_number] => 09948615
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-04-17
[patent_title] => Increased storage unit encryption based on loss of trust
[patent_app_type] => utility
[patent_app_number] => 14/659459
[patent_app_country] => US
[patent_app_date] => 2015-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 10442
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14659459
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/659459 | Increased storage unit encryption based on loss of trust | Mar 15, 2015 | Issued |
Array
(
[id] => 11391236
[patent_doc_number] => 09552481
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-01-24
[patent_title] => 'Systems and methods for monitoring programs'
[patent_app_type] => utility
[patent_app_number] => 14/585233
[patent_app_country] => US
[patent_app_date] => 2014-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9090
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 244
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14585233
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/585233 | Systems and methods for monitoring programs | Dec 29, 2014 | Issued |
Array
(
[id] => 11287592
[patent_doc_number] => 09503461
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-22
[patent_title] => 'Authentication based on proximate devices'
[patent_app_type] => utility
[patent_app_number] => 14/585237
[patent_app_country] => US
[patent_app_date] => 2014-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9080
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 303
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14585237
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/585237 | Authentication based on proximate devices | Dec 29, 2014 | Issued |
Array
(
[id] => 11552707
[patent_doc_number] => 09621575
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-04-11
[patent_title] => 'Context aware threat protection'
[patent_app_type] => utility
[patent_app_number] => 14/584987
[patent_app_country] => US
[patent_app_date] => 2014-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4720
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14584987
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/584987 | Context aware threat protection | Dec 28, 2014 | Issued |
Array
(
[id] => 10425200
[patent_doc_number] => 20150310211
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-29
[patent_title] => 'METHOD, APPARATUS AND SYSTEM FOR DETECTING MALICIOUS PROCESS BEHAVIOR'
[patent_app_type] => utility
[patent_app_number] => 14/585080
[patent_app_country] => US
[patent_app_date] => 2014-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 7874
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14585080
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/585080 | Method, apparatus and system for detecting malicious process behavior | Dec 28, 2014 | Issued |
Array
(
[id] => 10704065
[patent_doc_number] => 20160050211
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-18
[patent_title] => 'ACCESS MANAGEMENT USING ELECTRONIC IMAGES'
[patent_app_type] => utility
[patent_app_number] => 14/585039
[patent_app_country] => US
[patent_app_date] => 2014-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 22629
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14585039
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/585039 | Access management using electronic images | Dec 28, 2014 | Issued |
Array
(
[id] => 9894672
[patent_doc_number] => 20150049870
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-19
[patent_title] => 'INSTRUCTION FOR PERFORMING A PSEUDORANDOM NUMBER GENERATE OPERATION'
[patent_app_type] => utility
[patent_app_number] => 14/519621
[patent_app_country] => US
[patent_app_date] => 2014-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 17971
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14519621
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/519621 | Instruction for performing a pseudorandom number generate operation | Oct 20, 2014 | Issued |
Array
(
[id] => 11050022
[patent_doc_number] => 20160246981
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-25
[patent_title] => 'DATA SECRECY STATISTICAL PROCESSING SYSTEM, SERVER DEVICE FOR PRESENTING STATISTICAL PROCESSING RESULT, DATA INPUT DEVICE, AND PROGRAM AND METHOD THEREFOR'
[patent_app_type] => utility
[patent_app_number] => 15/030106
[patent_app_country] => US
[patent_app_date] => 2014-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 21467
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15030106
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/030106 | DATA SECRECY STATISTICAL PROCESSING SYSTEM, SERVER DEVICE FOR PRESENTING STATISTICAL PROCESSING RESULT, DATA INPUT DEVICE, AND PROGRAM AND METHOD THEREFOR | Oct 20, 2014 | Abandoned |
Array
(
[id] => 9814877
[patent_doc_number] => 20150026822
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-22
[patent_title] => 'PROTECTION OF PROPRIETARY EMBEDDED INSTRUMENTS'
[patent_app_type] => utility
[patent_app_number] => 14/508002
[patent_app_country] => US
[patent_app_date] => 2014-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 14942
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14508002
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/508002 | Protection of proprietary embedded instruments | Oct 6, 2014 | Issued |
Array
(
[id] => 10697894
[patent_doc_number] => 20160044041
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-11
[patent_title] => 'VERIFYING CALLER AUTHORIZATION USING SECRET DATA EMBEDDED IN CODE'
[patent_app_type] => utility
[patent_app_number] => 14/500779
[patent_app_country] => US
[patent_app_date] => 2014-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6780
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14500779
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/500779 | Verifying caller authorization using secret data embedded in code | Sep 28, 2014 | Issued |
Array
(
[id] => 11903678
[patent_doc_number] => 09773112
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-09-26
[patent_title] => 'Exploit detection of malware and malware families'
[patent_app_type] => utility
[patent_app_number] => 14/500594
[patent_app_country] => US
[patent_app_date] => 2014-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 14548
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 313
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14500594
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/500594 | Exploit detection of malware and malware families | Sep 28, 2014 | Issued |
Array
(
[id] => 11903678
[patent_doc_number] => 09773112
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-09-26
[patent_title] => 'Exploit detection of malware and malware families'
[patent_app_type] => utility
[patent_app_number] => 14/500594
[patent_app_country] => US
[patent_app_date] => 2014-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 14548
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 313
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14500594
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/500594 | Exploit detection of malware and malware families | Sep 28, 2014 | Issued |
Array
(
[id] => 11247460
[patent_doc_number] => 09473516
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-10-18
[patent_title] => 'Detecting network attacks based on a hash'
[patent_app_type] => utility
[patent_app_number] => 14/500649
[patent_app_country] => US
[patent_app_date] => 2014-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 16215
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 263
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14500649
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/500649 | Detecting network attacks based on a hash | Sep 28, 2014 | Issued |
Array
(
[id] => 11903678
[patent_doc_number] => 09773112
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-09-26
[patent_title] => 'Exploit detection of malware and malware families'
[patent_app_type] => utility
[patent_app_number] => 14/500594
[patent_app_country] => US
[patent_app_date] => 2014-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 14548
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 313
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14500594
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/500594 | Exploit detection of malware and malware families | Sep 28, 2014 | Issued |