Search

Ayoub Alata

Examiner (ID: 9523, Phone: (571)270-1474 , Office: P/2494 )

Most Active Art Unit
2494
Art Unit(s)
2494
Total Applications
592
Issued Applications
484
Pending Applications
39
Abandoned Applications
88

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11973732 [patent_doc_number] => 20170277886 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-09-28 [patent_title] => 'SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE BASED ON AT LEAST ONE INSTALLED PROFILE' [patent_app_type] => utility [patent_app_number] => 15/611690 [patent_app_country] => US [patent_app_date] => 2017-06-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9315 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15611690 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/611690
SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE BASED ON AT LEAST ONE INSTALLED PROFILE May 31, 2017 Abandoned
Array ( [id] => 16150409 [patent_doc_number] => 10708295 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-07-07 [patent_title] => Network route hijack protection [patent_app_type] => utility [patent_app_number] => 15/611074 [patent_app_country] => US [patent_app_date] => 2017-06-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6812 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 134 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15611074 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/611074
Network route hijack protection May 31, 2017 Issued
Array ( [id] => 13726287 [patent_doc_number] => 20170374099 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-12-28 [patent_title] => ATTACK CONTENT ANALYSIS PROGRAM, ATTACK CONTENT ANALYSIS METHOD, AND ATTACK CONTENT ANALYSIS APPARATUS [patent_app_type] => utility [patent_app_number] => 15/607808 [patent_app_country] => US [patent_app_date] => 2017-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9340 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -10 [patent_words_short_claim] => 87 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15607808 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/607808
Attack content analysis program, attack content analysis method, and attack content analysis apparatus May 29, 2017 Issued
Array ( [id] => 16187712 [patent_doc_number] => 10721059 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-07-21 [patent_title] => Apparatus and method for data encryption, apparatus and method for data decryption [patent_app_type] => utility [patent_app_number] => 15/606742 [patent_app_country] => US [patent_app_date] => 2017-05-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 30 [patent_figures_cnt] => 30 [patent_no_of_words] => 9663 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15606742 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/606742
Apparatus and method for data encryption, apparatus and method for data decryption May 25, 2017 Issued
Array ( [id] => 12062612 [patent_doc_number] => 20170338956 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-11-23 [patent_title] => 'METHOD FOR GENERATING A SECRET KEY FOR ENCRYPTED WIRELESS COMMUNICATIONS' [patent_app_type] => utility [patent_app_number] => 15/600680 [patent_app_country] => US [patent_app_date] => 2017-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4643 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15600680 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/600680
Method for generating a secret key for encrypted wireless communications May 18, 2017 Issued
Array ( [id] => 13572695 [patent_doc_number] => 20180337896 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-11-22 [patent_title] => Communication Network With Rolling Encryption Keys and Data Exfiltration Control [patent_app_type] => utility [patent_app_number] => 15/599278 [patent_app_country] => US [patent_app_date] => 2017-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7299 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 193 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15599278 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/599278
Communication network with rolling encryption keys and data exfiltration control May 17, 2017 Issued
Array ( [id] => 12123440 [patent_doc_number] => 20180007026 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-01-04 [patent_title] => 'NETWORK MONITORING METHOD AND DEVICE' [patent_app_type] => utility [patent_app_number] => 15/594926 [patent_app_country] => US [patent_app_date] => 2017-05-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 40 [patent_figures_cnt] => 40 [patent_no_of_words] => 15733 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15594926 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/594926
Network monitoring method and device May 14, 2017 Issued
Array ( [id] => 11868648 [patent_doc_number] => 20170235934 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-08-17 [patent_title] => 'METHOD AND APPARATUS FOR IDENTITY AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 15/581752 [patent_app_country] => US [patent_app_date] => 2017-04-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6486 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15581752 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/581752
Method and apparatus for identity authentication Apr 27, 2017 Issued
Array ( [id] => 13468011 [patent_doc_number] => 20180285548 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-10-04 [patent_title] => Information Handling System Display Security Access Through Totem Interactions [patent_app_type] => utility [patent_app_number] => 15/478315 [patent_app_country] => US [patent_app_date] => 2017-04-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2993 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15478315 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/478315
Information handling system display security access through totem interactions Apr 3, 2017 Issued
Array ( [id] => 13473079 [patent_doc_number] => 20180288082 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-10-04 [patent_title] => CAPTURING DATA [patent_app_type] => utility [patent_app_number] => 15/476456 [patent_app_country] => US [patent_app_date] => 2017-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14163 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 28 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15476456 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/476456
Capturing data Mar 30, 2017 Issued
Array ( [id] => 13472975 [patent_doc_number] => 20180288030 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-10-04 [patent_title] => SECURE IDENTITY SHARING USING A WEARABLE DEVICE [patent_app_type] => utility [patent_app_number] => 15/473473 [patent_app_country] => US [patent_app_date] => 2017-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5358 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 64 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15473473 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/473473
Secure identity sharing using a wearable device Mar 28, 2017 Issued
Array ( [id] => 13472927 [patent_doc_number] => 20180288006 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-10-04 [patent_title] => METHODS AND APPARATUS TO ESTABLISH A CONNECTION BETWEEN A SUPPLICANT AND A SECURED NETWORK [patent_app_type] => utility [patent_app_number] => 15/473009 [patent_app_country] => US [patent_app_date] => 2017-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8371 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 95 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15473009 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/473009
Methods and apparatus to establish a connection between a supplicant and a secured network Mar 28, 2017 Issued
Array ( [id] => 14674317 [patent_doc_number] => 10375090 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-08-06 [patent_title] => Machine learning-based traffic classification using compressed network telemetry data [patent_app_type] => utility [patent_app_number] => 15/469716 [patent_app_country] => US [patent_app_date] => 2017-03-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 6590 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 124 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15469716 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/469716
Machine learning-based traffic classification using compressed network telemetry data Mar 26, 2017 Issued
Array ( [id] => 14618259 [patent_doc_number] => 10361842 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-23 [patent_title] => Encryption function and decryption function generating method, encryption and decryption method and related apparatuses [patent_app_type] => utility [patent_app_number] => 15/462221 [patent_app_country] => US [patent_app_date] => 2017-03-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 24 [patent_no_of_words] => 19387 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 275 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15462221 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/462221
Encryption function and decryption function generating method, encryption and decryption method and related apparatuses Mar 16, 2017 Issued
Array ( [id] => 14674315 [patent_doc_number] => 10375089 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-08-06 [patent_title] => Multi-host threat tracking [patent_app_type] => utility [patent_app_number] => 15/457756 [patent_app_country] => US [patent_app_date] => 2017-03-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 9040 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 193 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15457756 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/457756
Multi-host threat tracking Mar 12, 2017 Issued
Array ( [id] => 13347815 [patent_doc_number] => 20180225447 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-08-09 [patent_title] => SYSTEM AND METHOD OF ANALYSIS OF FILES FOR MALICIOUSNESS IN A VIRTUAL MACHINE [patent_app_type] => utility [patent_app_number] => 15/451850 [patent_app_country] => US [patent_app_date] => 2017-03-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6621 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 193 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15451850 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/451850
System and method of analysis of files for maliciousness in a virtual machine Mar 6, 2017 Issued
Array ( [id] => 11953216 [patent_doc_number] => 20170257366 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-09-07 [patent_title] => 'OPTOELECTRONIC SYSTEMS AND METHOD FOR OPERATING THE SAME' [patent_app_type] => utility [patent_app_number] => 15/447341 [patent_app_country] => US [patent_app_date] => 2017-03-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5948 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15447341 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/447341
Optoelectronic systems and method for operating the same Mar 1, 2017 Issued
Array ( [id] => 13864303 [patent_doc_number] => 10193894 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-01-29 [patent_title] => Enabling access to restricted data using geofences [patent_app_type] => utility [patent_app_number] => 15/433411 [patent_app_country] => US [patent_app_date] => 2017-02-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 18279 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 237 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15433411 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/433411
Enabling access to restricted data using geofences Feb 14, 2017 Issued
Array ( [id] => 13351469 [patent_doc_number] => 20180227274 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-08-09 [patent_title] => IMAGING-BASED AUTOMATIC DATA EXTRACTION WITH SECURITY SCHEME [patent_app_type] => utility [patent_app_number] => 15/426162 [patent_app_country] => US [patent_app_date] => 2017-02-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 20424 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15426162 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/426162
Imaging-based automatic data extraction with security scheme Feb 6, 2017 Issued
Array ( [id] => 13059067 [patent_doc_number] => 10050945 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-08-14 [patent_title] => Apparatus and methods for content transfer protection [patent_app_type] => utility [patent_app_number] => 15/425880 [patent_app_country] => US [patent_app_date] => 2017-02-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 13 [patent_no_of_words] => 14722 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 270 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15425880 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/425880
Apparatus and methods for content transfer protection Feb 5, 2017 Issued
Menu