Search

Ammar T. Hamid

Examiner (ID: 3030, Phone: (571)272-1953 , Office: P/2654 )

Most Active Art Unit
2654
Art Unit(s)
2654, 2695
Total Applications
921
Issued Applications
763
Pending Applications
63
Abandoned Applications
110

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 16766512 [patent_doc_number] => 20210112094 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-04-15 [patent_title] => METHODS TO DETECT SPOOFING ATTACKS ON AUTOMATED DRIVING SYSTEMS [patent_app_type] => utility [patent_app_number] => 16/653711 [patent_app_country] => US [patent_app_date] => 2019-10-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9843 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 138 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16653711 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/653711
Methods to detect spoofing attacks on automated driving systems Oct 14, 2019 Issued
Array ( [id] => 18053229 [patent_doc_number] => 11526614 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-12-13 [patent_title] => Continuous vulnerability management system for blockchain smart contract based digital asset using sandbox and artificial intelligence [patent_app_type] => utility [patent_app_number] => 16/653599 [patent_app_country] => US [patent_app_date] => 2019-10-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 10454 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 259 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16653599 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/653599
Continuous vulnerability management system for blockchain smart contract based digital asset using sandbox and artificial intelligence Oct 14, 2019 Issued
Array ( [id] => 16003423 [patent_doc_number] => 20200177582 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-06-04 [patent_title] => NETWORK SYSTEM, INFORMATION PROCESSING APPARATUS, AND AUTHENTICATION METHOD [patent_app_type] => utility [patent_app_number] => 16/599326 [patent_app_country] => US [patent_app_date] => 2019-10-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9456 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -4 [patent_words_short_claim] => 128 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16599326 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/599326
NETWORK SYSTEM, INFORMATION PROCESSING APPARATUS, AND AUTHENTICATION METHOD Oct 10, 2019 Abandoned
Array ( [id] => 15505747 [patent_doc_number] => 20200053062 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-02-13 [patent_title] => CRYPTOGRAPHIC PROXY SERVICE [patent_app_type] => utility [patent_app_number] => 16/595818 [patent_app_country] => US [patent_app_date] => 2019-10-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9604 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16595818 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/595818
Cryptographic proxy service Oct 7, 2019 Issued
Array ( [id] => 15445051 [patent_doc_number] => 20200036709 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-30 [patent_title] => SECURE BIOMETRIC CREDENTIAL AUTHORIZATION METHODS AND APPARATUS [patent_app_type] => utility [patent_app_number] => 16/591362 [patent_app_country] => US [patent_app_date] => 2019-10-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 20505 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 187 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16591362 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/591362
SECURE BIOMETRIC CREDENTIAL AUTHORIZATION METHODS AND APPARATUS Oct 1, 2019 Abandoned
Array ( [id] => 15445049 [patent_doc_number] => 20200036708 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-30 [patent_title] => BIOMETRIC CREDENTIAL IMPROVEMENT METHODS AND APPARATUS [patent_app_type] => utility [patent_app_number] => 16/591327 [patent_app_country] => US [patent_app_date] => 2019-10-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 20468 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 149 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16591327 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/591327
BIOMETRIC CREDENTIAL IMPROVEMENT METHODS AND APPARATUS Oct 1, 2019 Abandoned
Array ( [id] => 19797090 [patent_doc_number] => 12238076 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-02-25 [patent_title] => In-line encryption of network data [patent_app_type] => utility [patent_app_number] => 16/590364 [patent_app_country] => US [patent_app_date] => 2019-10-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 11 [patent_no_of_words] => 12315 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 316 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16590364 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/590364
In-line encryption of network data Sep 30, 2019 Issued
Array ( [id] => 15417111 [patent_doc_number] => 20200028878 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-23 [patent_title] => SYSTEMS AND METHODS FOR MONITORING COMPUTER AUTHENTICATION PROCEDURES [patent_app_type] => utility [patent_app_number] => 16/588696 [patent_app_country] => US [patent_app_date] => 2019-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11973 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16588696 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/588696
Systems and methods for monitoring computer authentication procedures Sep 29, 2019 Issued
Array ( [id] => 18481799 [patent_doc_number] => 11695559 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-07-04 [patent_title] => Nested tenancy that permits a hierarchy having a plurality of levels [patent_app_type] => utility [patent_app_number] => 16/588550 [patent_app_country] => US [patent_app_date] => 2019-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 10 [patent_no_of_words] => 7875 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 378 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16588550 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/588550
Nested tenancy that permits a hierarchy having a plurality of levels Sep 29, 2019 Issued
Array ( [id] => 16732732 [patent_doc_number] => 20210099881 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-04-01 [patent_title] => PATTERN DRIVEN SELECTIVE SENSOR AUTHENTICATION FOR INTERNET OF THINGS [patent_app_type] => utility [patent_app_number] => 16/588984 [patent_app_country] => US [patent_app_date] => 2019-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4475 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -15 [patent_words_short_claim] => 154 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16588984 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/588984
Pattern driven selective sensor authentication for internet of things Sep 29, 2019 Issued
Array ( [id] => 17064603 [patent_doc_number] => 11109229 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-08-31 [patent_title] => Security for network computing environment using centralized security system [patent_app_type] => utility [patent_app_number] => 16/506567 [patent_app_country] => US [patent_app_date] => 2019-07-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 12163 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 294 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16506567 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/506567
Security for network computing environment using centralized security system Jul 8, 2019 Issued
Array ( [id] => 17012438 [patent_doc_number] => 20210243599 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-08-05 [patent_title] => USER AUTHENTICATION METHOD THROUGH BLUETOOTH DEVICE AND DEVICE THEREFOR [patent_app_type] => utility [patent_app_number] => 16/972263 [patent_app_country] => US [patent_app_date] => 2019-07-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 18928 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -14 [patent_words_short_claim] => 172 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16972263 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/972263
USER AUTHENTICATION METHOD THROUGH BLUETOOTH DEVICE AND DEVICE THEREFOR Jul 3, 2019 Abandoned
Array ( [id] => 19595870 [patent_doc_number] => 12153717 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-11-26 [patent_title] => Method and system for managing digital evidence using a blockchain [patent_app_type] => utility [patent_app_number] => 17/258895 [patent_app_country] => US [patent_app_date] => 2019-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5584 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 353 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17258895 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/258895
Method and system for managing digital evidence using a blockchain Jun 27, 2019 Issued
Array ( [id] => 14873421 [patent_doc_number] => 20190286952 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-09-19 [patent_title] => Icon Based Malware Detection [patent_app_type] => utility [patent_app_number] => 16/428449 [patent_app_country] => US [patent_app_date] => 2019-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8444 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 100 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16428449 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/428449
Icon based malware detection May 30, 2019 Issued
Array ( [id] => 16972601 [patent_doc_number] => 11068574 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-07-20 [patent_title] => Phone factor authentication [patent_app_type] => utility [patent_app_number] => 16/415996 [patent_app_country] => US [patent_app_date] => 2019-05-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6467 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 224 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16415996 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/415996
Phone factor authentication May 16, 2019 Issued
Array ( [id] => 16401251 [patent_doc_number] => 20200342109 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-10-29 [patent_title] => BASEBOARD MANAGEMENT CONTROLLER TO CONVEY DATA [patent_app_type] => utility [patent_app_number] => 16/397538 [patent_app_country] => US [patent_app_date] => 2019-04-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7079 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 122 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16397538 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/397538
BASEBOARD MANAGEMENT CONTROLLER TO CONVEY DATA Apr 28, 2019 Abandoned
Array ( [id] => 19080289 [patent_doc_number] => 11949677 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-04-02 [patent_title] => Resource access based on audio signal [patent_app_type] => utility [patent_app_number] => 16/392445 [patent_app_country] => US [patent_app_date] => 2019-04-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 6955 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 285 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16392445 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/392445
Resource access based on audio signal Apr 22, 2019 Issued
Array ( [id] => 19978957 [patent_doc_number] => 12346432 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-07-01 [patent_title] => Securing systems employing artificial intelligence [patent_app_type] => utility [patent_app_number] => 17/254235 [patent_app_country] => US [patent_app_date] => 2019-04-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 70 [patent_figures_cnt] => 77 [patent_no_of_words] => 57800 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 221 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17254235 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/254235
Securing systems employing artificial intelligence Apr 22, 2019 Issued
Array ( [id] => 16302192 [patent_doc_number] => 20200287915 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-09-10 [patent_title] => AUTOMATED GENERATION AND DEPLOYMENT OF HONEY TOKENS IN PROVISIONED RESOURCES ON A REMOTE COMPUTER RESOURCE PLATFORM [patent_app_type] => utility [patent_app_number] => 16/291963 [patent_app_country] => US [patent_app_date] => 2019-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13459 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 96 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16291963 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/291963
Automated generation and deployment of honey tokens in provisioned resources on a remote computer resource platform Mar 3, 2019 Issued
Array ( [id] => 16678721 [patent_doc_number] => 20210067487 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-03-04 [patent_title] => Hardware Control Logic Based Data Forwarding Control Method and System [patent_app_type] => utility [patent_app_number] => 16/978777 [patent_app_country] => US [patent_app_date] => 2019-01-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6990 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -7 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16978777 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/978777
Hardware control logic based data forwarding control method and system Jan 15, 2019 Issued
Menu