
Abdullah Almamun
Examiner (ID: 6118, Phone: (571)270-3392 , Office: P/2431 )
| Most Active Art Unit | 2431 |
| Art Unit(s) | 2431 |
| Total Applications | 486 |
| Issued Applications | 364 |
| Pending Applications | 42 |
| Abandoned Applications | 91 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11411037
[patent_doc_number] => 09558343
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-31
[patent_title] => 'Methods and systems for controlling access to resources and privileges per process'
[patent_app_type] => utility
[patent_app_number] => 14/502845
[patent_app_country] => US
[patent_app_date] => 2014-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 31
[patent_no_of_words] => 14256
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14502845
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/502845 | Methods and systems for controlling access to resources and privileges per process | Sep 29, 2014 | Issued |
Array
(
[id] => 11460831
[patent_doc_number] => 20170054738
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-23
[patent_title] => 'DATA MINING ALGORITHMS ADOPTED FOR TRUSTED EXECUTION ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/498266
[patent_app_country] => US
[patent_app_date] => 2014-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5476
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14498266
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/498266 | Data mining algorithms adopted for trusted execution environment | Sep 25, 2014 | Issued |
Array
(
[id] => 9794455
[patent_doc_number] => 20150006399
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-01
[patent_title] => 'Social Media Based Identity Verification'
[patent_app_type] => utility
[patent_app_number] => 14/487681
[patent_app_country] => US
[patent_app_date] => 2014-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11366
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14487681
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/487681 | Social Media Based Identity Verification | Sep 15, 2014 | Abandoned |
Array
(
[id] => 12501426
[patent_doc_number] => 09998440
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-12
[patent_title] => System and processing method for electronic authentication client, and system and method for electronic authentication
[patent_app_type] => utility
[patent_app_number] => 14/484644
[patent_app_country] => US
[patent_app_date] => 2014-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4984
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14484644
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/484644 | System and processing method for electronic authentication client, and system and method for electronic authentication | Sep 11, 2014 | Issued |
Array
(
[id] => 10928270
[patent_doc_number] => 20140331290
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-06
[patent_title] => 'Managing Secure Sharing of Private Information Across Security Domains by Individuals Having a Service Authorization'
[patent_app_type] => utility
[patent_app_number] => 14/332681
[patent_app_country] => US
[patent_app_date] => 2014-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 30
[patent_no_of_words] => 15096
[patent_no_of_claims] => 54
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14332681
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/332681 | Managing secure sharing of private information across security domains by individuals having a service authorization | Jul 15, 2014 | Issued |
Array
(
[id] => 10660582
[patent_doc_number] => 20160006726
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-07
[patent_title] => 'USING COOKIES TO IDENTIFY SECURITY CONTEXTS FOR CONNECTIONLESS SERVICE'
[patent_app_type] => utility
[patent_app_number] => 14/324811
[patent_app_country] => US
[patent_app_date] => 2014-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7039
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14324811
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/324811 | Using cookies to identify security contexts for connectionless service | Jul 6, 2014 | Issued |
Array
(
[id] => 9795394
[patent_doc_number] => 20150007338
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-01
[patent_title] => 'SIMPLE NON-AUTONOMOUS PEERING ENVIRONMENT WATERMARKING, AUTHENTICATION AND BINDING'
[patent_app_type] => utility
[patent_app_number] => 14/325180
[patent_app_country] => US
[patent_app_date] => 2014-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 8839
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14325180
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/325180 | SIMPLE NON-AUTONOMOUS PEERING ENVIRONMENT WATERMARKING, AUTHENTICATION AND BINDING | Jul 6, 2014 | Abandoned |
Array
(
[id] => 10660862
[patent_doc_number] => 20160007007
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-07
[patent_title] => 'SECURABLE WEARABLE COMPUTER INTERFACE'
[patent_app_type] => utility
[patent_app_number] => 14/322927
[patent_app_country] => US
[patent_app_date] => 2014-07-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6703
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14322927
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/322927 | Secure wearable computer interface | Jul 2, 2014 | Issued |
Array
(
[id] => 11884851
[patent_doc_number] => 09756046
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-05
[patent_title] => 'Network system and communication device therein'
[patent_app_type] => utility
[patent_app_number] => 14/322359
[patent_app_country] => US
[patent_app_date] => 2014-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4320
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14322359
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/322359 | Network system and communication device therein | Jul 1, 2014 | Issued |
Array
(
[id] => 16248525
[patent_doc_number] => 10747888
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-18
[patent_title] => Method and apparatus for differently encrypting data messages for different logical networks
[patent_app_type] => utility
[patent_app_number] => 14/320576
[patent_app_country] => US
[patent_app_date] => 2014-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 28
[patent_no_of_words] => 24271
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14320576
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/320576 | Method and apparatus for differently encrypting data messages for different logical networks | Jun 29, 2014 | Issued |
Array
(
[id] => 10496341
[patent_doc_number] => 20150381364
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'METHOD FOR SECURING SCALAR MULTIPLICATION AGAINST POWER ANALYSIS ATTACKS USING REFERENCE POINTS'
[patent_app_type] => utility
[patent_app_number] => 14/319449
[patent_app_country] => US
[patent_app_date] => 2014-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3141
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14319449
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/319449 | METHOD FOR SECURING SCALAR MULTIPLICATION AGAINST POWER ANALYSIS ATTACKS USING REFERENCE POINTS | Jun 29, 2014 | Abandoned |
Array
(
[id] => 11924863
[patent_doc_number] => 09792447
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-17
[patent_title] => 'Method and apparatus for differently encrypting different flows'
[patent_app_type] => utility
[patent_app_number] => 14/320578
[patent_app_country] => US
[patent_app_date] => 2014-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 28
[patent_no_of_words] => 24972
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14320578
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/320578 | Method and apparatus for differently encrypting different flows | Jun 29, 2014 | Issued |
Array
(
[id] => 10494260
[patent_doc_number] => 20150379282
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'Encryption System in a Virtualized Environment'
[patent_app_type] => utility
[patent_app_number] => 14/320584
[patent_app_country] => US
[patent_app_date] => 2014-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 25004
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14320584
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/320584 | Encryption system in a virtualized environment | Jun 29, 2014 | Issued |
Array
(
[id] => 14983183
[patent_doc_number] => 10445509
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-15
[patent_title] => Encryption architecture
[patent_app_type] => utility
[patent_app_number] => 14/320573
[patent_app_country] => US
[patent_app_date] => 2014-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 28
[patent_no_of_words] => 24272
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14320573
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/320573 | Encryption architecture | Jun 29, 2014 | Issued |
Array
(
[id] => 10494258
[patent_doc_number] => 20150379280
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'Method and Apparatus for Dynamically Creating Encryption Rules'
[patent_app_type] => utility
[patent_app_number] => 14/320581
[patent_app_country] => US
[patent_app_date] => 2014-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 25005
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14320581
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/320581 | Method and Apparatus for Dynamically Creating Encryption Rules | Jun 29, 2014 | Abandoned |
Array
(
[id] => 10496612
[patent_doc_number] => 20150381634
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'TRUSTED TIME SERVICE FOR OFFLINE MODE'
[patent_app_type] => utility
[patent_app_number] => 14/317579
[patent_app_country] => US
[patent_app_date] => 2014-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 14961
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14317579
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/317579 | Trusted time service for offline mode | Jun 26, 2014 | Issued |
Array
(
[id] => 14527629
[patent_doc_number] => 10341088
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-02
[patent_title] => Authentic encryption device, authenticated encryption method, and program for authenticated encryption
[patent_app_type] => utility
[patent_app_number] => 14/908212
[patent_app_country] => US
[patent_app_date] => 2014-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 20
[patent_no_of_words] => 20668
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 586
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14908212
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/908212 | Authentic encryption device, authenticated encryption method, and program for authenticated encryption | Jun 23, 2014 | Issued |
Array
(
[id] => 10016941
[patent_doc_number] => 09059966
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-16
[patent_title] => 'Systems and methods for proxying cookies for SSL VPN clientless sessions'
[patent_app_type] => utility
[patent_app_number] => 14/306354
[patent_app_country] => US
[patent_app_date] => 2014-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 33509
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14306354
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/306354 | Systems and methods for proxying cookies for SSL VPN clientless sessions | Jun 16, 2014 | Issued |
Array
(
[id] => 13244779
[patent_doc_number] => 10135610
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-20
[patent_title] => Method and apparatus for ciphering packet units in wireless communications
[patent_app_type] => utility
[patent_app_number] => 14/302070
[patent_app_country] => US
[patent_app_date] => 2014-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 35
[patent_no_of_words] => 7626
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14302070
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/302070 | Method and apparatus for ciphering packet units in wireless communications | Jun 10, 2014 | Issued |
Array
(
[id] => 9700834
[patent_doc_number] => 20140250519
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-04
[patent_title] => 'CLOUD COMPUTING METHOD AND SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/274301
[patent_app_country] => US
[patent_app_date] => 2014-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4455
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14274301
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/274301 | Cloud computing method and system | May 8, 2014 | Issued |