
Ali S. Abyaneh
Examiner (ID: 10306, Phone: (571)272-7961 , Office: P/2437 )
| Most Active Art Unit | 2437 |
| Art Unit(s) | 2137, 2437 |
| Total Applications | 866 |
| Issued Applications | 638 |
| Pending Applications | 73 |
| Abandoned Applications | 181 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11072218
[patent_doc_number] => 20160269182
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-15
[patent_title] => 'METHOD AND APPARATUS FOR PROVIDING A UNIVERSAL DETERMINISTICALLY REPRODUCIBLE CRYPTOGRAPHIC KEY-PAIR REPRESENTATION FOR ALL SKUs, SHIPPING CARTONS, AND ITEMS'
[patent_app_type] => utility
[patent_app_number] => 14/656445
[patent_app_country] => US
[patent_app_date] => 2015-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5285
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14656445
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/656445 | Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items | Mar 11, 2015 | Issued |
Array
(
[id] => 11392608
[patent_doc_number] => 09553864
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-24
[patent_title] => 'Dual code authentication system'
[patent_app_type] => utility
[patent_app_number] => 14/634520
[patent_app_country] => US
[patent_app_date] => 2015-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5335
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14634520
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/634520 | Dual code authentication system | Feb 26, 2015 | Issued |
Array
(
[id] => 14431971
[patent_doc_number] => 10320807
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-11
[patent_title] => Systems and methods relating to the authenticity and verification of photographic identity documents
[patent_app_type] => utility
[patent_app_number] => 14/630728
[patent_app_country] => US
[patent_app_date] => 2015-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 16347
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 507
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14630728
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/630728 | Systems and methods relating to the authenticity and verification of photographic identity documents | Feb 24, 2015 | Issued |
Array
(
[id] => 11050010
[patent_doc_number] => 20160246969
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-25
[patent_title] => 'ADAPTIVE SYSTEM PROFILE'
[patent_app_type] => utility
[patent_app_number] => 14/626279
[patent_app_country] => US
[patent_app_date] => 2015-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3888
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14626279
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/626279 | Adaptive system profile | Feb 18, 2015 | Issued |
Array
(
[id] => 13087027
[patent_doc_number] => 10063591
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-08-28
[patent_title] => Implementing and optimizing secure socket layer intercept
[patent_app_type] => utility
[patent_app_number] => 14/622840
[patent_app_country] => US
[patent_app_date] => 2015-02-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6197
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 278
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14622840
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/622840 | Implementing and optimizing secure socket layer intercept | Feb 13, 2015 | Issued |
Array
(
[id] => 12020719
[patent_doc_number] => 09813443
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-11-07
[patent_title] => 'Systems and methods for remediating the effects of malware'
[patent_app_type] => utility
[patent_app_number] => 14/621416
[patent_app_country] => US
[patent_app_date] => 2015-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9981
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14621416
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/621416 | Systems and methods for remediating the effects of malware | Feb 12, 2015 | Issued |
Array
(
[id] => 11812014
[patent_doc_number] => 09716593
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-25
[patent_title] => 'Leveraging multiple biometrics for enabling user access to security metadata'
[patent_app_type] => utility
[patent_app_number] => 14/620032
[patent_app_country] => US
[patent_app_date] => 2015-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3757
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14620032
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/620032 | Leveraging multiple biometrics for enabling user access to security metadata | Feb 10, 2015 | Issued |
Array
(
[id] => 15671197
[patent_doc_number] => 10599831
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-24
[patent_title] => Increased security method for hardware-tool-based authentication
[patent_app_type] => utility
[patent_app_number] => 14/617818
[patent_app_country] => US
[patent_app_date] => 2015-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 3407
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14617818
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/617818 | Increased security method for hardware-tool-based authentication | Feb 8, 2015 | Issued |
Array
(
[id] => 10009603
[patent_doc_number] => 09053124
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-06-09
[patent_title] => 'System for a distributed file system element collection'
[patent_app_type] => utility
[patent_app_number] => 14/587168
[patent_app_country] => US
[patent_app_date] => 2014-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 35
[patent_figures_cnt] => 41
[patent_no_of_words] => 33437
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 384
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14587168
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/587168 | System for a distributed file system element collection | Dec 30, 2014 | Issued |
Array
(
[id] => 10994566
[patent_doc_number] => 20160191512
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-30
[patent_title] => 'PREDICTIVE USER AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/583646
[patent_app_country] => US
[patent_app_date] => 2014-12-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11516
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14583646
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/583646 | PREDICTIVE USER AUTHENTICATION | Dec 26, 2014 | Abandoned |
Array
(
[id] => 12475683
[patent_doc_number] => 09990479
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-05
[patent_title] => Technologies for authenticating a user of a computing device based on authentication context state
[patent_app_type] => utility
[patent_app_number] => 14/583671
[patent_app_country] => US
[patent_app_date] => 2014-12-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 10
[patent_no_of_words] => 10980
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14583671
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/583671 | Technologies for authenticating a user of a computing device based on authentication context state | Dec 26, 2014 | Issued |
Array
(
[id] => 12115817
[patent_doc_number] => 09871820
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-16
[patent_title] => 'Technologies for managing network privileges based on physical presence'
[patent_app_type] => utility
[patent_app_number] => 14/583686
[patent_app_country] => US
[patent_app_date] => 2014-12-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 8035
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14583686
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/583686 | Technologies for managing network privileges based on physical presence | Dec 26, 2014 | Issued |
Array
(
[id] => 10985530
[patent_doc_number] => 20160182475
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-23
[patent_title] => 'LOW-COST AUTHENTICATED SIGNING DELEGATION IN CONTENT CENTRIC NETWORKING'
[patent_app_type] => utility
[patent_app_number] => 14/579674
[patent_app_country] => US
[patent_app_date] => 2014-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4813
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14579674
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/579674 | Low-cost authenticated signing delegation in content centric networking | Dec 21, 2014 | Issued |
Array
(
[id] => 16387638
[patent_doc_number] => 10812494
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-20
[patent_title] => Systems and methods for secure location-based document viewing
[patent_app_type] => utility
[patent_app_number] => 14/580175
[patent_app_country] => US
[patent_app_date] => 2014-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7268
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 364
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14580175
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/580175 | Systems and methods for secure location-based document viewing | Dec 21, 2014 | Issued |
Array
(
[id] => 11361212
[patent_doc_number] => 09537883
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-03
[patent_title] => 'Process security validation'
[patent_app_type] => utility
[patent_app_number] => 14/578530
[patent_app_country] => US
[patent_app_date] => 2014-12-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7481
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14578530
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/578530 | Process security validation | Dec 21, 2014 | Issued |
Array
(
[id] => 13864371
[patent_doc_number] => 10193928
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-29
[patent_title] => Master security policy server
[patent_app_type] => utility
[patent_app_number] => 14/572167
[patent_app_country] => US
[patent_app_date] => 2014-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4038
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14572167
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/572167 | Master security policy server | Dec 15, 2014 | Issued |
Array
(
[id] => 10216023
[patent_doc_number] => 20150101015
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-09
[patent_title] => 'MASTER SECURITY POLICY SERVER'
[patent_app_type] => utility
[patent_app_number] => 14/572328
[patent_app_country] => US
[patent_app_date] => 2014-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3990
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14572328
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/572328 | Master security policy server | Dec 15, 2014 | Issued |
Array
(
[id] => 11354509
[patent_doc_number] => 20160373250
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'INSTRUCTION AND LOGIC TO PROVIDE SIMD SECURE HASHING ROUND SLICE FUNCTIONALITY'
[patent_app_type] => utility
[patent_app_number] => 14/568101
[patent_app_country] => US
[patent_app_date] => 2014-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 26
[patent_no_of_words] => 20937
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14568101
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/568101 | Instruction and logic to provide SIMD secure hashing round slice functionality | Dec 10, 2014 | Issued |
Array
(
[id] => 10668310
[patent_doc_number] => 20160014456
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-14
[patent_title] => 'ADAPTABLE ENCRYPTION DEVICE AND METHODS FOR USE THEREWITH'
[patent_app_type] => utility
[patent_app_number] => 14/546413
[patent_app_country] => US
[patent_app_date] => 2014-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7697
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14546413
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/546413 | ADAPTABLE ENCRYPTION DEVICE AND METHODS FOR USE THEREWITH | Nov 17, 2014 | Abandoned |
Array
(
[id] => 11433185
[patent_doc_number] => 09571517
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-02-14
[patent_title] => 'Synthetic cyber-risk model for vulnerability determination'
[patent_app_type] => utility
[patent_app_number] => 14/538193
[patent_app_country] => US
[patent_app_date] => 2014-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7861
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 339
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14538193
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/538193 | Synthetic cyber-risk model for vulnerability determination | Nov 10, 2014 | Issued |