Mohammad J Rahman
Examiner (ID: 13690, Phone: (571)270-7190 , Office: P/2487 )
Most Active Art Unit | 2487 |
Art Unit(s) | 2487 |
Total Applications | 796 |
Issued Applications | 551 |
Pending Applications | 73 |
Abandoned Applications | 172 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 13361973
[patent_doc_number] => 20180232526
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-16
[patent_title] => SYSTEM AND METHOD FOR SECURELY STORING AND SHARING INFORMATION
[patent_app_type] => utility
[patent_app_number] => 15/952530
[patent_app_country] => US
[patent_app_date] => 2018-04-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 29528
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -51
[patent_words_short_claim] => 65
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15952530
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/952530 | System and method for securely storing and sharing information | Apr 12, 2018 | Issued |
Array
(
[id] => 16037271
[patent_doc_number] => 10681076
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-06-09
[patent_title] => Automated security analysis of software libraries
[patent_app_type] => utility
[patent_app_number] => 15/951949
[patent_app_country] => US
[patent_app_date] => 2018-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5365
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15951949
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/951949 | Automated security analysis of software libraries | Apr 11, 2018 | Issued |
Array
(
[id] => 14037909
[patent_doc_number] => 10230721
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-12
[patent_title] => Authentication server, authentication system and method
[patent_app_type] => utility
[patent_app_number] => 15/952231
[patent_app_country] => US
[patent_app_date] => 2018-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6734
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15952231
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/952231 | Authentication server, authentication system and method | Apr 11, 2018 | Issued |
Array
(
[id] => 13864233
[patent_doc_number] => 10193859
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-29
[patent_title] => Security apparatus, attack detection method, and storage medium
[patent_app_type] => utility
[patent_app_number] => 15/940200
[patent_app_country] => US
[patent_app_date] => 2018-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 23
[patent_no_of_words] => 18605
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15940200
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/940200 | Security apparatus, attack detection method, and storage medium | Mar 28, 2018 | Issued |
Array
(
[id] => 17108213
[patent_doc_number] => 11128445
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-21
[patent_title] => Method for creating and distributing cryptographic keys
[patent_app_type] => utility
[patent_app_number] => 16/603325
[patent_app_country] => US
[patent_app_date] => 2018-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 3324
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16603325
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/603325 | Method for creating and distributing cryptographic keys | Mar 12, 2018 | Issued |
Array
(
[id] => 15675065
[patent_doc_number] => 10601780
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-24
[patent_title] => Internet isolation for avoiding internet security threats
[patent_app_type] => utility
[patent_app_number] => 15/910734
[patent_app_country] => US
[patent_app_date] => 2018-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 7146
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15910734
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/910734 | Internet isolation for avoiding internet security threats | Mar 1, 2018 | Issued |
Array
(
[id] => 13365887
[patent_doc_number] => 20180234484
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-16
[patent_title] => MANAGED PEER-TO-PEER APPLICATIONS, SYSTEMS AND METHODS FOR DISTRIBUTED DATA ACCESS AND STORAGE
[patent_app_type] => utility
[patent_app_number] => 15/894648
[patent_app_country] => US
[patent_app_date] => 2018-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 32203
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15894648
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/894648 | Managed peer-to-peer applications, systems and methods for distributed data access and storage | Feb 11, 2018 | Issued |
Array
(
[id] => 14493827
[patent_doc_number] => 10333720
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-25
[patent_title] => Secure communication of IOT devices for vehicles
[patent_app_type] => utility
[patent_app_number] => 15/890140
[patent_app_country] => US
[patent_app_date] => 2018-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15229
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15890140
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/890140 | Secure communication of IOT devices for vehicles | Feb 5, 2018 | Issued |
Array
(
[id] => 16654435
[patent_doc_number] => 10931634
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-23
[patent_title] => Security apparatus, attack detection method, and storage medium
[patent_app_type] => utility
[patent_app_number] => 15/880769
[patent_app_country] => US
[patent_app_date] => 2018-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 23
[patent_no_of_words] => 18532
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15880769
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/880769 | Security apparatus, attack detection method, and storage medium | Jan 25, 2018 | Issued |
Array
(
[id] => 12775921
[patent_doc_number] => 20180150475
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-31
[patent_title] => VIRTUAL PRIVATE CLOUD THAT PROVIDES ENTERPRISE GRADE FUNCTIONALITY AND COMPLIANCE
[patent_app_type] => utility
[patent_app_number] => 15/881028
[patent_app_country] => US
[patent_app_date] => 2018-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5547
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15881028
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/881028 | Virtual private cloud that provides enterprise grade functionality and compliance | Jan 25, 2018 | Issued |
Array
(
[id] => 13801205
[patent_doc_number] => 20190014141
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-10
[patent_title] => Locally Detecting Phishing Weakness
[patent_app_type] => utility
[patent_app_number] => 15/879726
[patent_app_country] => US
[patent_app_date] => 2018-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 23297
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15879726
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/879726 | Locally detecting phishing weakness | Jan 24, 2018 | Issued |
Array
(
[id] => 12797905
[patent_doc_number] => 20180157804
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-07
[patent_title] => METHODS AND APPARATUSES FOR DIGITAL CONTENT PROTECTION
[patent_app_type] => utility
[patent_app_number] => 15/879381
[patent_app_country] => US
[patent_app_date] => 2018-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7103
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15879381
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/879381 | METHODS AND APPARATUSES FOR DIGITAL CONTENT PROTECTION | Jan 23, 2018 | Abandoned |
Array
(
[id] => 15126263
[patent_doc_number] => 20190349765
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-14
[patent_title] => FAKE GNB/ENB DETECTION USING IDENTITY-BASED AUTHENTICATION AND ENCRYPTION
[patent_app_type] => utility
[patent_app_number] => 16/479895
[patent_app_country] => US
[patent_app_date] => 2018-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10586
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16479895
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/479895 | FAKE GNB/ENB DETECTION USING IDENTITY-BASED AUTHENTICATION AND ENCRYPTION | Jan 3, 2018 | Abandoned |
Array
(
[id] => 15444701
[patent_doc_number] => 20200036534
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-30
[patent_title] => METHOD FOR SYNCHRONIZED SIGNATURE WITH ADDITIVE RSA KEY SPLITTING USING A SLIDING WINDOW
[patent_app_type] => utility
[patent_app_number] => 16/469301
[patent_app_country] => US
[patent_app_date] => 2017-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6333
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 422
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16469301
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/469301 | Method for synchronized signature with additive RSA key splitting using a sliding window | Dec 11, 2017 | Issued |
Array
(
[id] => 14448805
[patent_doc_number] => 20190182276
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-06-13
[patent_title] => TRACKING THE DYNAMICS OF APPLICATION-CENTRIC CLUSTERS IN A VIRTUALIZED DATACENTER
[patent_app_type] => utility
[patent_app_number] => 15/835865
[patent_app_country] => US
[patent_app_date] => 2017-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7270
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15835865
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/835865 | Tracking the dynamics of application-centric clusters in a virtualized datacenter | Dec 7, 2017 | Issued |
Array
(
[id] => 12617901
[patent_doc_number] => 20180097797
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-05
[patent_title] => METHOD, SYSTEM AND DEVICE FOR GENERATING, STORING, USING, AND VALIDATING NFC TAGS AND DATA
[patent_app_type] => utility
[patent_app_number] => 15/819799
[patent_app_country] => US
[patent_app_date] => 2017-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12118
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -25
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15819799
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/819799 | Method, system and device for generating, storing, using, and validating NFC tags and data | Nov 20, 2017 | Issued |
Array
(
[id] => 14826233
[patent_doc_number] => 10410127
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-10
[patent_title] => Identification and classification of web traffic inside encrypted network tunnels
[patent_app_type] => utility
[patent_app_number] => 15/790966
[patent_app_country] => US
[patent_app_date] => 2017-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4861
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15790966
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/790966 | Identification and classification of web traffic inside encrypted network tunnels | Oct 22, 2017 | Issued |
Array
(
[id] => 12163537
[patent_doc_number] => 20180034803
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'AUTHENTICATION ON A COMPUTING DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/730273
[patent_app_country] => US
[patent_app_date] => 2017-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4106
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15730273
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/730273 | Authentication on a computing device | Oct 10, 2017 | Issued |
Array
(
[id] => 12163369
[patent_doc_number] => 20180034635
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'GPRS System Key Enhancement Method, SGSN Device, UE, HLR/HSS, and GPRS System'
[patent_app_type] => utility
[patent_app_number] => 15/727027
[patent_app_country] => US
[patent_app_date] => 2017-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 37472
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15727027
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/727027 | GPRS System Key Enhancement Method, SGSN Device, UE, HLR/HSS, and GPRS System | Oct 5, 2017 | Abandoned |
Array
(
[id] => 13259331
[patent_doc_number] => 10142367
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-27
[patent_title] => System and method for creation, deployment and management of augmented attacker map
[patent_app_type] => utility
[patent_app_number] => 15/722351
[patent_app_country] => US
[patent_app_date] => 2017-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5578
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15722351
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/722351 | System and method for creation, deployment and management of augmented attacker map | Oct 1, 2017 | Issued |