
Ammar T. Hamid
Examiner (ID: 3030, Phone: (571)272-1953 , Office: P/2654 )
| Most Active Art Unit | 2654 |
| Art Unit(s) | 2654, 2695 |
| Total Applications | 921 |
| Issued Applications | 763 |
| Pending Applications | 63 |
| Abandoned Applications | 110 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16766512
[patent_doc_number] => 20210112094
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-15
[patent_title] => METHODS TO DETECT SPOOFING ATTACKS ON AUTOMATED DRIVING SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 16/653711
[patent_app_country] => US
[patent_app_date] => 2019-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9843
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16653711
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/653711 | Methods to detect spoofing attacks on automated driving systems | Oct 14, 2019 | Issued |
Array
(
[id] => 18053229
[patent_doc_number] => 11526614
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-12-13
[patent_title] => Continuous vulnerability management system for blockchain smart contract based digital asset using sandbox and artificial intelligence
[patent_app_type] => utility
[patent_app_number] => 16/653599
[patent_app_country] => US
[patent_app_date] => 2019-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 10454
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16653599
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/653599 | Continuous vulnerability management system for blockchain smart contract based digital asset using sandbox and artificial intelligence | Oct 14, 2019 | Issued |
Array
(
[id] => 16003423
[patent_doc_number] => 20200177582
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-04
[patent_title] => NETWORK SYSTEM, INFORMATION PROCESSING APPARATUS, AND AUTHENTICATION METHOD
[patent_app_type] => utility
[patent_app_number] => 16/599326
[patent_app_country] => US
[patent_app_date] => 2019-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9456
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16599326
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/599326 | NETWORK SYSTEM, INFORMATION PROCESSING APPARATUS, AND AUTHENTICATION METHOD | Oct 10, 2019 | Abandoned |
Array
(
[id] => 15505747
[patent_doc_number] => 20200053062
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-13
[patent_title] => CRYPTOGRAPHIC PROXY SERVICE
[patent_app_type] => utility
[patent_app_number] => 16/595818
[patent_app_country] => US
[patent_app_date] => 2019-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9604
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16595818
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/595818 | Cryptographic proxy service | Oct 7, 2019 | Issued |
Array
(
[id] => 15445051
[patent_doc_number] => 20200036709
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-30
[patent_title] => SECURE BIOMETRIC CREDENTIAL AUTHORIZATION METHODS AND APPARATUS
[patent_app_type] => utility
[patent_app_number] => 16/591362
[patent_app_country] => US
[patent_app_date] => 2019-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20505
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16591362
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/591362 | SECURE BIOMETRIC CREDENTIAL AUTHORIZATION METHODS AND APPARATUS | Oct 1, 2019 | Abandoned |
Array
(
[id] => 15445049
[patent_doc_number] => 20200036708
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-30
[patent_title] => BIOMETRIC CREDENTIAL IMPROVEMENT METHODS AND APPARATUS
[patent_app_type] => utility
[patent_app_number] => 16/591327
[patent_app_country] => US
[patent_app_date] => 2019-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20468
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16591327
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/591327 | BIOMETRIC CREDENTIAL IMPROVEMENT METHODS AND APPARATUS | Oct 1, 2019 | Abandoned |
Array
(
[id] => 19797090
[patent_doc_number] => 12238076
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-02-25
[patent_title] => In-line encryption of network data
[patent_app_type] => utility
[patent_app_number] => 16/590364
[patent_app_country] => US
[patent_app_date] => 2019-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 11
[patent_no_of_words] => 12315
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 316
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16590364
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/590364 | In-line encryption of network data | Sep 30, 2019 | Issued |
Array
(
[id] => 15417111
[patent_doc_number] => 20200028878
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-23
[patent_title] => SYSTEMS AND METHODS FOR MONITORING COMPUTER AUTHENTICATION PROCEDURES
[patent_app_type] => utility
[patent_app_number] => 16/588696
[patent_app_country] => US
[patent_app_date] => 2019-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11973
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16588696
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/588696 | Systems and methods for monitoring computer authentication procedures | Sep 29, 2019 | Issued |
Array
(
[id] => 18481799
[patent_doc_number] => 11695559
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-04
[patent_title] => Nested tenancy that permits a hierarchy having a plurality of levels
[patent_app_type] => utility
[patent_app_number] => 16/588550
[patent_app_country] => US
[patent_app_date] => 2019-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 7875
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 378
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16588550
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/588550 | Nested tenancy that permits a hierarchy having a plurality of levels | Sep 29, 2019 | Issued |
Array
(
[id] => 16732732
[patent_doc_number] => 20210099881
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-01
[patent_title] => PATTERN DRIVEN SELECTIVE SENSOR AUTHENTICATION FOR INTERNET OF THINGS
[patent_app_type] => utility
[patent_app_number] => 16/588984
[patent_app_country] => US
[patent_app_date] => 2019-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4475
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16588984
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/588984 | Pattern driven selective sensor authentication for internet of things | Sep 29, 2019 | Issued |
Array
(
[id] => 17064603
[patent_doc_number] => 11109229
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-31
[patent_title] => Security for network computing environment using centralized security system
[patent_app_type] => utility
[patent_app_number] => 16/506567
[patent_app_country] => US
[patent_app_date] => 2019-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12163
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 294
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16506567
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/506567 | Security for network computing environment using centralized security system | Jul 8, 2019 | Issued |
Array
(
[id] => 17012438
[patent_doc_number] => 20210243599
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-08-05
[patent_title] => USER AUTHENTICATION METHOD THROUGH BLUETOOTH DEVICE AND DEVICE THEREFOR
[patent_app_type] => utility
[patent_app_number] => 16/972263
[patent_app_country] => US
[patent_app_date] => 2019-07-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18928
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16972263
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/972263 | USER AUTHENTICATION METHOD THROUGH BLUETOOTH DEVICE AND DEVICE THEREFOR | Jul 3, 2019 | Abandoned |
Array
(
[id] => 19595870
[patent_doc_number] => 12153717
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-11-26
[patent_title] => Method and system for managing digital evidence using a blockchain
[patent_app_type] => utility
[patent_app_number] => 17/258895
[patent_app_country] => US
[patent_app_date] => 2019-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5584
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 353
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17258895
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/258895 | Method and system for managing digital evidence using a blockchain | Jun 27, 2019 | Issued |
Array
(
[id] => 14873421
[patent_doc_number] => 20190286952
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-19
[patent_title] => Icon Based Malware Detection
[patent_app_type] => utility
[patent_app_number] => 16/428449
[patent_app_country] => US
[patent_app_date] => 2019-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8444
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16428449
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/428449 | Icon based malware detection | May 30, 2019 | Issued |
Array
(
[id] => 16972601
[patent_doc_number] => 11068574
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-20
[patent_title] => Phone factor authentication
[patent_app_type] => utility
[patent_app_number] => 16/415996
[patent_app_country] => US
[patent_app_date] => 2019-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6467
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16415996
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/415996 | Phone factor authentication | May 16, 2019 | Issued |
Array
(
[id] => 16401251
[patent_doc_number] => 20200342109
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-29
[patent_title] => BASEBOARD MANAGEMENT CONTROLLER TO CONVEY DATA
[patent_app_type] => utility
[patent_app_number] => 16/397538
[patent_app_country] => US
[patent_app_date] => 2019-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7079
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16397538
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/397538 | BASEBOARD MANAGEMENT CONTROLLER TO CONVEY DATA | Apr 28, 2019 | Abandoned |
Array
(
[id] => 19080289
[patent_doc_number] => 11949677
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-04-02
[patent_title] => Resource access based on audio signal
[patent_app_type] => utility
[patent_app_number] => 16/392445
[patent_app_country] => US
[patent_app_date] => 2019-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 6955
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 285
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16392445
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/392445 | Resource access based on audio signal | Apr 22, 2019 | Issued |
Array
(
[id] => 19978957
[patent_doc_number] => 12346432
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-07-01
[patent_title] => Securing systems employing artificial intelligence
[patent_app_type] => utility
[patent_app_number] => 17/254235
[patent_app_country] => US
[patent_app_date] => 2019-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 70
[patent_figures_cnt] => 77
[patent_no_of_words] => 57800
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17254235
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/254235 | Securing systems employing artificial intelligence | Apr 22, 2019 | Issued |
Array
(
[id] => 16302192
[patent_doc_number] => 20200287915
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-09-10
[patent_title] => AUTOMATED GENERATION AND DEPLOYMENT OF HONEY TOKENS IN PROVISIONED RESOURCES ON A REMOTE COMPUTER RESOURCE PLATFORM
[patent_app_type] => utility
[patent_app_number] => 16/291963
[patent_app_country] => US
[patent_app_date] => 2019-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13459
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16291963
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/291963 | Automated generation and deployment of honey tokens in provisioned resources on a remote computer resource platform | Mar 3, 2019 | Issued |
Array
(
[id] => 16678721
[patent_doc_number] => 20210067487
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-04
[patent_title] => Hardware Control Logic Based Data Forwarding Control Method and System
[patent_app_type] => utility
[patent_app_number] => 16/978777
[patent_app_country] => US
[patent_app_date] => 2019-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6990
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16978777
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/978777 | Hardware control logic based data forwarding control method and system | Jan 15, 2019 | Issued |