
Ayoub Alata
Examiner (ID: 9523, Phone: (571)270-1474 , Office: P/2494 )
| Most Active Art Unit | 2494 |
| Art Unit(s) | 2494 |
| Total Applications | 592 |
| Issued Applications | 484 |
| Pending Applications | 39 |
| Abandoned Applications | 88 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17653510
[patent_doc_number] => 11356260
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-06-07
[patent_title] => Decentralized secure data sharing
[patent_app_type] => utility
[patent_app_number] => 16/752676
[patent_app_country] => US
[patent_app_date] => 2020-01-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 17756
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16752676
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/752676 | Decentralized secure data sharing | Jan 25, 2020 | Issued |
Array
(
[id] => 17972294
[patent_doc_number] => 11489850
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-01
[patent_title] => Apparatus and methods thereof for inspecting events in a computerized environment respective of a unified index for granular access control
[patent_app_type] => utility
[patent_app_number] => 16/746521
[patent_app_country] => US
[patent_app_date] => 2020-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4534
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16746521
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/746521 | Apparatus and methods thereof for inspecting events in a computerized environment respective of a unified index for granular access control | Jan 16, 2020 | Issued |
Array
(
[id] => 15903581
[patent_doc_number] => 20200151310
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-14
[patent_title] => METHOD AND APPARATUS FOR IDENTITY AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 16/740313
[patent_app_country] => US
[patent_app_date] => 2020-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6397
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16740313
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/740313 | Method and apparatus for identity authentication | Jan 9, 2020 | Issued |
Array
(
[id] => 15903685
[patent_doc_number] => 20200151362
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-14
[patent_title] => INTEGRITY AND DATA ENCRYPTION (IDE) OVER COMPUTER BUSES
[patent_app_type] => utility
[patent_app_number] => 16/740373
[patent_app_country] => US
[patent_app_date] => 2020-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 27311
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 56
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16740373
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/740373 | INTEGRITY AND DATA ENCRYPTION (IDE) OVER COMPUTER BUSES | Jan 9, 2020 | Abandoned |
Array
(
[id] => 16934985
[patent_doc_number] => 20210200874
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-01
[patent_title] => DOUBLE WRAPPING FOR VERIFICATION
[patent_app_type] => utility
[patent_app_number] => 16/731918
[patent_app_country] => US
[patent_app_date] => 2019-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8432
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16731918
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/731918 | Double wrapping for verification | Dec 30, 2019 | Issued |
Array
(
[id] => 18155097
[patent_doc_number] => 11568077
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-31
[patent_title] => Memory device data security based on content-addressable memory architecture
[patent_app_type] => utility
[patent_app_number] => 16/727682
[patent_app_country] => US
[patent_app_date] => 2019-12-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12074
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16727682
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/727682 | Memory device data security based on content-addressable memory architecture | Dec 25, 2019 | Issued |
Array
(
[id] => 15837851
[patent_doc_number] => 20200134208
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-30
[patent_title] => TRUSTED LOCAL MEMORY MANAGEMENT IN A VIRTUALIZED GPU
[patent_app_type] => utility
[patent_app_number] => 16/725267
[patent_app_country] => US
[patent_app_date] => 2019-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7465
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16725267
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/725267 | Trusted local memory management in a virtualized GPU | Dec 22, 2019 | Issued |
Array
(
[id] => 16037285
[patent_doc_number] => 10681083
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-09
[patent_title] => System and method for detecting replay attack
[patent_app_type] => utility
[patent_app_number] => 16/716970
[patent_app_country] => US
[patent_app_date] => 2019-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10362
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 329
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16716970
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/716970 | System and method for detecting replay attack | Dec 16, 2019 | Issued |
Array
(
[id] => 16066157
[patent_doc_number] => 10692033
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-23
[patent_title] => Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
[patent_app_type] => utility
[patent_app_number] => 16/714355
[patent_app_country] => US
[patent_app_date] => 2019-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 43
[patent_figures_cnt] => 44
[patent_no_of_words] => 36748
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 419
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16714355
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/714355 | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques | Dec 12, 2019 | Issued |
Array
(
[id] => 16023001
[patent_doc_number] => 20200186344
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-11
[patent_title] => CONTROLLING TRANSMISSION OF INFORMATION THROUGH A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/703851
[patent_app_country] => US
[patent_app_date] => 2019-12-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 39909
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -33
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16703851
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/703851 | Controlling transmission of information through a zero-knowledge data management network | Dec 3, 2019 | Issued |
Array
(
[id] => 16678558
[patent_doc_number] => 20210067324
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-04
[patent_title] => Access Sovereignty
[patent_app_type] => utility
[patent_app_number] => 16/694265
[patent_app_country] => US
[patent_app_date] => 2019-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9433
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16694265
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/694265 | Access sovereignty | Nov 24, 2019 | Issued |
Array
(
[id] => 16857194
[patent_doc_number] => 20210157939
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-27
[patent_title] => SECURE STORAGE OF PASSWORDS
[patent_app_type] => utility
[patent_app_number] => 16/691157
[patent_app_country] => US
[patent_app_date] => 2019-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6418
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16691157
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/691157 | Secure storage of passwords | Nov 20, 2019 | Issued |
Array
(
[id] => 15627675
[patent_doc_number] => 20200084242
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-12
[patent_title] => SYSTEMS AND METHODS FOR BLOCKCHAIN SECURITY DATA INTELLIGENCE
[patent_app_type] => utility
[patent_app_number] => 16/686438
[patent_app_country] => US
[patent_app_date] => 2019-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14352
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16686438
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/686438 | SYSTEMS AND METHODS FOR BLOCKCHAIN SECURITY DATA INTELLIGENCE | Nov 17, 2019 | Abandoned |
Array
(
[id] => 18131963
[patent_doc_number] => 11558182
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-17
[patent_title] => Method and system to facilitate assessment, authorization, and monitoring of policy documents related to an organization
[patent_app_type] => utility
[patent_app_number] => 16/685887
[patent_app_country] => US
[patent_app_date] => 2019-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 6556
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 303
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16685887
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/685887 | Method and system to facilitate assessment, authorization, and monitoring of policy documents related to an organization | Nov 14, 2019 | Issued |
Array
(
[id] => 17276791
[patent_doc_number] => 20210382989
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-09
[patent_title] => MULTILEVEL CONSISTENCY CHECK FOR A CYBER ATTACK DETECTION IN AN AUTOMATION AND CONTROL SYSTEM
[patent_app_type] => utility
[patent_app_number] => 17/284539
[patent_app_country] => US
[patent_app_date] => 2019-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11696
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17284539
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/284539 | MULTILEVEL CONSISTENCY CHECK FOR A CYBER ATTACK DETECTION IN AN AUTOMATION AND CONTROL SYSTEM | Nov 7, 2019 | Abandoned |
Array
(
[id] => 15715493
[patent_doc_number] => 20200104513
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-02
[patent_title] => SECURE PROCESSING SYSTEMS AND METHODS
[patent_app_type] => utility
[patent_app_number] => 16/676587
[patent_app_country] => US
[patent_app_date] => 2019-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6706
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16676587
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/676587 | Secure processing systems and methods | Nov 6, 2019 | Issued |
Array
(
[id] => 18041436
[patent_doc_number] => 20220385653
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-12-01
[patent_title] => METHODS AND DEVICES FOR GRANTING TEMPORARY REMOTE ACCESS VIA BIOMETRIC DATA
[patent_app_type] => utility
[patent_app_number] => 17/773691
[patent_app_country] => US
[patent_app_date] => 2019-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8445
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17773691
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/773691 | Methods and devices for granting temporary remote access via biometric data | Nov 3, 2019 | Issued |
Array
(
[id] => 17622223
[patent_doc_number] => 11341280
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-24
[patent_title] => Executing entity-specific cryptographic code in a cryptographic coprocessor
[patent_app_type] => utility
[patent_app_number] => 16/668973
[patent_app_country] => US
[patent_app_date] => 2019-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10806
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16668973
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/668973 | Executing entity-specific cryptographic code in a cryptographic coprocessor | Oct 29, 2019 | Issued |
Array
(
[id] => 15566957
[patent_doc_number] => 20200067890
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-27
[patent_title] => Communication Network With Rolling Encryption Keys and Data Exfiltration Control
[patent_app_type] => utility
[patent_app_number] => 16/666103
[patent_app_country] => US
[patent_app_date] => 2019-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7342
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16666103
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/666103 | Communication network with rolling encryption keys and data exfiltration control | Oct 27, 2019 | Issued |
Array
(
[id] => 15903697
[patent_doc_number] => 20200151368
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-14
[patent_title] => DEFENSIVE ROUTING AND RELATED TECHNIQUES
[patent_app_type] => utility
[patent_app_number] => 16/598293
[patent_app_country] => US
[patent_app_date] => 2019-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9128
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 49
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16598293
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/598293 | Defensive routing and related techniques | Oct 9, 2019 | Issued |