
Ayoub Alata
Examiner (ID: 9523, Phone: (571)270-1474 , Office: P/2494 )
| Most Active Art Unit | 2494 |
| Art Unit(s) | 2494 |
| Total Applications | 592 |
| Issued Applications | 484 |
| Pending Applications | 39 |
| Abandoned Applications | 88 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11973732
[patent_doc_number] => 20170277886
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-28
[patent_title] => 'SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE BASED ON AT LEAST ONE INSTALLED PROFILE'
[patent_app_type] => utility
[patent_app_number] => 15/611690
[patent_app_country] => US
[patent_app_date] => 2017-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9315
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15611690
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/611690 | SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE BASED ON AT LEAST ONE INSTALLED PROFILE | May 31, 2017 | Abandoned |
Array
(
[id] => 16150409
[patent_doc_number] => 10708295
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-07-07
[patent_title] => Network route hijack protection
[patent_app_type] => utility
[patent_app_number] => 15/611074
[patent_app_country] => US
[patent_app_date] => 2017-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6812
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15611074
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/611074 | Network route hijack protection | May 31, 2017 | Issued |
Array
(
[id] => 13726287
[patent_doc_number] => 20170374099
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-28
[patent_title] => ATTACK CONTENT ANALYSIS PROGRAM, ATTACK CONTENT ANALYSIS METHOD, AND ATTACK CONTENT ANALYSIS APPARATUS
[patent_app_type] => utility
[patent_app_number] => 15/607808
[patent_app_country] => US
[patent_app_date] => 2017-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9340
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15607808
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/607808 | Attack content analysis program, attack content analysis method, and attack content analysis apparatus | May 29, 2017 | Issued |
Array
(
[id] => 16187712
[patent_doc_number] => 10721059
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-21
[patent_title] => Apparatus and method for data encryption, apparatus and method for data decryption
[patent_app_type] => utility
[patent_app_number] => 15/606742
[patent_app_country] => US
[patent_app_date] => 2017-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 30
[patent_no_of_words] => 9663
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15606742
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/606742 | Apparatus and method for data encryption, apparatus and method for data decryption | May 25, 2017 | Issued |
Array
(
[id] => 12062612
[patent_doc_number] => 20170338956
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-23
[patent_title] => 'METHOD FOR GENERATING A SECRET KEY FOR ENCRYPTED WIRELESS COMMUNICATIONS'
[patent_app_type] => utility
[patent_app_number] => 15/600680
[patent_app_country] => US
[patent_app_date] => 2017-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4643
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15600680
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/600680 | Method for generating a secret key for encrypted wireless communications | May 18, 2017 | Issued |
Array
(
[id] => 13572695
[patent_doc_number] => 20180337896
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-22
[patent_title] => Communication Network With Rolling Encryption Keys and Data Exfiltration Control
[patent_app_type] => utility
[patent_app_number] => 15/599278
[patent_app_country] => US
[patent_app_date] => 2017-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7299
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15599278
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/599278 | Communication network with rolling encryption keys and data exfiltration control | May 17, 2017 | Issued |
Array
(
[id] => 12123440
[patent_doc_number] => 20180007026
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-04
[patent_title] => 'NETWORK MONITORING METHOD AND DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/594926
[patent_app_country] => US
[patent_app_date] => 2017-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 40
[patent_figures_cnt] => 40
[patent_no_of_words] => 15733
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15594926
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/594926 | Network monitoring method and device | May 14, 2017 | Issued |
Array
(
[id] => 11868648
[patent_doc_number] => 20170235934
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-17
[patent_title] => 'METHOD AND APPARATUS FOR IDENTITY AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 15/581752
[patent_app_country] => US
[patent_app_date] => 2017-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6486
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15581752
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/581752 | Method and apparatus for identity authentication | Apr 27, 2017 | Issued |
Array
(
[id] => 13468011
[patent_doc_number] => 20180285548
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-04
[patent_title] => Information Handling System Display Security Access Through Totem Interactions
[patent_app_type] => utility
[patent_app_number] => 15/478315
[patent_app_country] => US
[patent_app_date] => 2017-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2993
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15478315
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/478315 | Information handling system display security access through totem interactions | Apr 3, 2017 | Issued |
Array
(
[id] => 13473079
[patent_doc_number] => 20180288082
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-04
[patent_title] => CAPTURING DATA
[patent_app_type] => utility
[patent_app_number] => 15/476456
[patent_app_country] => US
[patent_app_date] => 2017-03-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14163
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 28
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15476456
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/476456 | Capturing data | Mar 30, 2017 | Issued |
Array
(
[id] => 13472975
[patent_doc_number] => 20180288030
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-04
[patent_title] => SECURE IDENTITY SHARING USING A WEARABLE DEVICE
[patent_app_type] => utility
[patent_app_number] => 15/473473
[patent_app_country] => US
[patent_app_date] => 2017-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5358
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15473473
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/473473 | Secure identity sharing using a wearable device | Mar 28, 2017 | Issued |
Array
(
[id] => 13472927
[patent_doc_number] => 20180288006
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-04
[patent_title] => METHODS AND APPARATUS TO ESTABLISH A CONNECTION BETWEEN A SUPPLICANT AND A SECURED NETWORK
[patent_app_type] => utility
[patent_app_number] => 15/473009
[patent_app_country] => US
[patent_app_date] => 2017-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8371
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15473009
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/473009 | Methods and apparatus to establish a connection between a supplicant and a secured network | Mar 28, 2017 | Issued |
Array
(
[id] => 14674317
[patent_doc_number] => 10375090
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-06
[patent_title] => Machine learning-based traffic classification using compressed network telemetry data
[patent_app_type] => utility
[patent_app_number] => 15/469716
[patent_app_country] => US
[patent_app_date] => 2017-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 6590
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15469716
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/469716 | Machine learning-based traffic classification using compressed network telemetry data | Mar 26, 2017 | Issued |
Array
(
[id] => 14618259
[patent_doc_number] => 10361842
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-23
[patent_title] => Encryption function and decryption function generating method, encryption and decryption method and related apparatuses
[patent_app_type] => utility
[patent_app_number] => 15/462221
[patent_app_country] => US
[patent_app_date] => 2017-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 24
[patent_no_of_words] => 19387
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 275
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15462221
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/462221 | Encryption function and decryption function generating method, encryption and decryption method and related apparatuses | Mar 16, 2017 | Issued |
Array
(
[id] => 14674315
[patent_doc_number] => 10375089
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-06
[patent_title] => Multi-host threat tracking
[patent_app_type] => utility
[patent_app_number] => 15/457756
[patent_app_country] => US
[patent_app_date] => 2017-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 9040
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15457756
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/457756 | Multi-host threat tracking | Mar 12, 2017 | Issued |
Array
(
[id] => 13347815
[patent_doc_number] => 20180225447
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-09
[patent_title] => SYSTEM AND METHOD OF ANALYSIS OF FILES FOR MALICIOUSNESS IN A VIRTUAL MACHINE
[patent_app_type] => utility
[patent_app_number] => 15/451850
[patent_app_country] => US
[patent_app_date] => 2017-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6621
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15451850
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/451850 | System and method of analysis of files for maliciousness in a virtual machine | Mar 6, 2017 | Issued |
Array
(
[id] => 11953216
[patent_doc_number] => 20170257366
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-07
[patent_title] => 'OPTOELECTRONIC SYSTEMS AND METHOD FOR OPERATING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 15/447341
[patent_app_country] => US
[patent_app_date] => 2017-03-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5948
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15447341
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/447341 | Optoelectronic systems and method for operating the same | Mar 1, 2017 | Issued |
Array
(
[id] => 13864303
[patent_doc_number] => 10193894
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-29
[patent_title] => Enabling access to restricted data using geofences
[patent_app_type] => utility
[patent_app_number] => 15/433411
[patent_app_country] => US
[patent_app_date] => 2017-02-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 18279
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15433411
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/433411 | Enabling access to restricted data using geofences | Feb 14, 2017 | Issued |
Array
(
[id] => 13351469
[patent_doc_number] => 20180227274
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-09
[patent_title] => IMAGING-BASED AUTOMATIC DATA EXTRACTION WITH SECURITY SCHEME
[patent_app_type] => utility
[patent_app_number] => 15/426162
[patent_app_country] => US
[patent_app_date] => 2017-02-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20424
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15426162
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/426162 | Imaging-based automatic data extraction with security scheme | Feb 6, 2017 | Issued |
Array
(
[id] => 13059067
[patent_doc_number] => 10050945
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-14
[patent_title] => Apparatus and methods for content transfer protection
[patent_app_type] => utility
[patent_app_number] => 15/425880
[patent_app_country] => US
[patent_app_date] => 2017-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 13
[patent_no_of_words] => 14722
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 270
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15425880
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/425880 | Apparatus and methods for content transfer protection | Feb 5, 2017 | Issued |