
Suhail Khan
Examiner (ID: 4428, Phone: (571)270-7187 , Office: P/2642 )
| Most Active Art Unit | 2642 |
| Art Unit(s) | 2642, 2686, 2617, 4153 |
| Total Applications | 892 |
| Issued Applications | 690 |
| Pending Applications | 90 |
| Abandoned Applications | 138 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11314035
[patent_doc_number] => 20160350145
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-01
[patent_title] => 'VIRTUAL MACHINE LOCKING'
[patent_app_type] => utility
[patent_app_number] => 14/723374
[patent_app_country] => US
[patent_app_date] => 2015-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4833
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14723374
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/723374 | Virtual machine locking | May 26, 2015 | Issued |
Array
(
[id] => 11919446
[patent_doc_number] => 09787645
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-10
[patent_title] => 'User privacy protection method and system'
[patent_app_type] => utility
[patent_app_number] => 14/720007
[patent_app_country] => US
[patent_app_date] => 2015-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 6821
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14720007
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/720007 | User privacy protection method and system | May 21, 2015 | Issued |
Array
(
[id] => 10441378
[patent_doc_number] => 20150326390
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'METHOD OF MANAGING KEYS AND ELECTRONIC DEVICE ADAPTED TO THE SAME'
[patent_app_type] => utility
[patent_app_number] => 14/707590
[patent_app_country] => US
[patent_app_date] => 2015-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9697
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14707590
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/707590 | Method of managing keys and electronic device adapted to the same | May 7, 2015 | Issued |
Array
(
[id] => 11616605
[patent_doc_number] => 09654477
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-05-16
[patent_title] => 'Adaptive authentication'
[patent_app_type] => utility
[patent_app_number] => 14/704457
[patent_app_country] => US
[patent_app_date] => 2015-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8933
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14704457
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/704457 | Adaptive authentication | May 4, 2015 | Issued |
Array
(
[id] => 11110005
[patent_doc_number] => 20160306976
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-20
[patent_title] => 'SECURE SOFTWARE AUTHENTICATION AND VERIFICATION'
[patent_app_type] => utility
[patent_app_number] => 14/687783
[patent_app_country] => US
[patent_app_date] => 2015-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7612
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14687783
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/687783 | Secure software authentication and verification | Apr 14, 2015 | Issued |
Array
(
[id] => 10746550
[patent_doc_number] => 20160092701
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-31
[patent_title] => 'METHODS AND APPARATUS TO ENABLE RUNTIME CHECKSUM VERIFICATION OF BLOCK DEVICE IMAGES'
[patent_app_type] => utility
[patent_app_number] => 14/683658
[patent_app_country] => US
[patent_app_date] => 2015-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7430
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14683658
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/683658 | Methods and apparatus to enable runtime checksum verification of block device images | Apr 9, 2015 | Issued |
| 14/681924 | Dynamic Watch-Based CAPTCHA | Apr 7, 2015 | Abandoned |
Array
(
[id] => 10328260
[patent_doc_number] => 20150213264
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-30
[patent_title] => 'SYSTEMS AND METHODS INVOLVING FEATURES OF HARDWARE VIRTUALIZATION SUCH AS SEPARATION KERNEL HYPERVISORS, HYPERVISORS, HYPERVISOR GUEST CONTEXT, HYPERVISOR CONTEXT, ROOTKIT DETECTION/PREVENTION, AND/OR OTHER FEATURES'
[patent_app_type] => utility
[patent_app_number] => 14/583585
[patent_app_country] => US
[patent_app_date] => 2014-12-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 14743
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14583585
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/583585 | Systems and methods involving features of hardware virtualization such as separation kernel hypervisors, hypervisors, hypervisor guest context, hypervisor context, rootkit detection/prevention, and/or other features | Dec 25, 2014 | Issued |
Array
(
[id] => 11301682
[patent_doc_number] => 09509703
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-11-29
[patent_title] => 'Proximity based digital rights management'
[patent_app_type] => utility
[patent_app_number] => 14/555298
[patent_app_country] => US
[patent_app_date] => 2014-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5154
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14555298
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/555298 | Proximity based digital rights management | Nov 25, 2014 | Issued |
Array
(
[id] => 11027822
[patent_doc_number] => 20160224779
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-04
[patent_title] => 'PORTABLE KEY DEVICE AND DEVICE CONTROL METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/021014
[patent_app_country] => US
[patent_app_date] => 2014-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5489
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15021014
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/021014 | PORTABLE KEY DEVICE AND DEVICE CONTROL METHOD | Nov 20, 2014 | Abandoned |
Array
(
[id] => 10250279
[patent_doc_number] => 20150135275
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-14
[patent_title] => 'AUTHORIZATION SERVER SYSTEM, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 14/536470
[patent_app_country] => US
[patent_app_date] => 2014-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 15000
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14536470
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/536470 | AUTHORIZATION SERVER SYSTEM, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM | Nov 6, 2014 | Abandoned |
Array
(
[id] => 11661675
[patent_doc_number] => 09674700
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-06
[patent_title] => 'Distributing biometric authentication between devices in an ad hoc network'
[patent_app_type] => utility
[patent_app_number] => 14/532608
[patent_app_country] => US
[patent_app_date] => 2014-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 22
[patent_no_of_words] => 14031
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14532608
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/532608 | Distributing biometric authentication between devices in an ad hoc network | Nov 3, 2014 | Issued |
Array
(
[id] => 11301641
[patent_doc_number] => 09509661
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-29
[patent_title] => 'Method and apparatus for displaying HTTPS block page without SSL inspection'
[patent_app_type] => utility
[patent_app_number] => 14/527245
[patent_app_country] => US
[patent_app_date] => 2014-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 6388
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 265
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14527245
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/527245 | Method and apparatus for displaying HTTPS block page without SSL inspection | Oct 28, 2014 | Issued |
Array
(
[id] => 10265123
[patent_doc_number] => 20150150120
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-28
[patent_title] => 'SYSTEM AND METHOD FOR UNLOCKING TOUCH SCREEN AND TOUCH INPUT ELECTRONIC DEVICE THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/524522
[patent_app_country] => US
[patent_app_date] => 2014-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 1743
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14524522
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/524522 | SYSTEM AND METHOD FOR UNLOCKING TOUCH SCREEN AND TOUCH INPUT ELECTRONIC DEVICE THEREOF | Oct 26, 2014 | Abandoned |
Array
(
[id] => 11525570
[patent_doc_number] => 09608994
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-28
[patent_title] => 'Controlling administration rights'
[patent_app_type] => utility
[patent_app_number] => 14/521131
[patent_app_country] => US
[patent_app_date] => 2014-10-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 5127
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14521131
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/521131 | Controlling administration rights | Oct 21, 2014 | Issued |
Array
(
[id] => 11796064
[patent_doc_number] => 09405895
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-02
[patent_title] => 'Method of generating authentication patterns and authenticating system employing the same'
[patent_app_type] => utility
[patent_app_number] => 14/507306
[patent_app_country] => US
[patent_app_date] => 2014-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 10
[patent_no_of_words] => 7843
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14507306
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/507306 | Method of generating authentication patterns and authenticating system employing the same | Oct 5, 2014 | Issued |
Array
(
[id] => 11924840
[patent_doc_number] => 09792424
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-10-17
[patent_title] => 'Chained authentication using musical transforms'
[patent_app_type] => utility
[patent_app_number] => 14/490497
[patent_app_country] => US
[patent_app_date] => 2014-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 13725
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14490497
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/490497 | Chained authentication using musical transforms | Sep 17, 2014 | Issued |
Array
(
[id] => 11240779
[patent_doc_number] => 09467440
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-11
[patent_title] => 'Method and apparatus for providing an authentication context-based session'
[patent_app_type] => utility
[patent_app_number] => 14/453243
[patent_app_country] => US
[patent_app_date] => 2014-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 10747
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14453243
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/453243 | Method and apparatus for providing an authentication context-based session | Aug 5, 2014 | Issued |
Array
(
[id] => 10941918
[patent_doc_number] => 20140344940
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-20
[patent_title] => 'Security countermeasure management platform'
[patent_app_type] => utility
[patent_app_number] => 14/450509
[patent_app_country] => US
[patent_app_date] => 2014-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5903
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14450509
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/450509 | Security countermeasure management platform | Aug 3, 2014 | Issued |
Array
(
[id] => 9903784
[patent_doc_number] => 20150058984
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-26
[patent_title] => 'COMPUTER-IMPLEMENTED METHOD FOR DISTILLING A MALWARE PROGRAM IN A SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/329527
[patent_app_country] => US
[patent_app_date] => 2014-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10065
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14329527
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/329527 | Computer-implemented method for distilling a malware program in a system | Jul 10, 2014 | Issued |