
May A. Abouelela
Examiner (ID: 10026, Phone: (571)270-7917 , Office: P/3736 )
| Most Active Art Unit | 3791 |
| Art Unit(s) | 3736, 3791 |
| Total Applications | 847 |
| Issued Applications | 564 |
| Pending Applications | 101 |
| Abandoned Applications | 203 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15377691
[patent_doc_number] => 10530581
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-07
[patent_title] => Authenticated broadcast encryption
[patent_app_type] => utility
[patent_app_number] => 15/699994
[patent_app_country] => US
[patent_app_date] => 2017-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8064
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15699994
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/699994 | Authenticated broadcast encryption | Sep 7, 2017 | Issued |
Array
(
[id] => 15111143
[patent_doc_number] => 10476913
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-12
[patent_title] => Intercepting calls for encryption handling in persistent access multi-key systems
[patent_app_type] => utility
[patent_app_number] => 15/699553
[patent_app_country] => US
[patent_app_date] => 2017-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 19841
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15699553
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/699553 | Intercepting calls for encryption handling in persistent access multi-key systems | Sep 7, 2017 | Issued |
Array
(
[id] => 12317445
[patent_doc_number] => 09942206
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-04-10
[patent_title] => System and method for privacy-preserving genomic data analysis
[patent_app_type] => utility
[patent_app_number] => 15/693546
[patent_app_country] => US
[patent_app_date] => 2017-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9251
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 244
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15693546
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/693546 | System and method for privacy-preserving genomic data analysis | Aug 31, 2017 | Issued |
Array
(
[id] => 13998399
[patent_doc_number] => 20190068357
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => FLOATING POINT COHORT BASED ENCRYPTION
[patent_app_type] => utility
[patent_app_number] => 15/693026
[patent_app_country] => US
[patent_app_date] => 2017-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3278
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 64
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15693026
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/693026 | Floating point cohort based encryption | Aug 30, 2017 | Issued |
Array
(
[id] => 13072965
[patent_doc_number] => 10057282
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-21
[patent_title] => Detecting and reacting to malicious activity in decrypted application data
[patent_app_type] => utility
[patent_app_number] => 15/658102
[patent_app_country] => US
[patent_app_date] => 2017-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 36
[patent_figures_cnt] => 36
[patent_no_of_words] => 34058
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 263
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15658102
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/658102 | Detecting and reacting to malicious activity in decrypted application data | Jul 23, 2017 | Issued |
Array
(
[id] => 12109882
[patent_doc_number] => 09866373
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-09
[patent_title] => 'Polymorphic encryption key allocation scheme'
[patent_app_type] => utility
[patent_app_number] => 15/644317
[patent_app_country] => US
[patent_app_date] => 2017-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5330
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15644317
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/644317 | Polymorphic encryption key allocation scheme | Jul 6, 2017 | Issued |
Array
(
[id] => 12556848
[patent_doc_number] => 10015183
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-07-03
[patent_title] => Using new edges for anomaly detection in computer networks
[patent_app_type] => utility
[patent_app_number] => 15/637475
[patent_app_country] => US
[patent_app_date] => 2017-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4612
[patent_no_of_claims] => 43
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15637475
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/637475 | Using new edges for anomaly detection in computer networks | Jun 28, 2017 | Issued |
Array
(
[id] => 12257904
[patent_doc_number] => 09930062
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-03-27
[patent_title] => 'Systems and methods for cyber security risk assessment'
[patent_app_type] => utility
[patent_app_number] => 15/633242
[patent_app_country] => US
[patent_app_date] => 2017-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 10927
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 252
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15633242
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/633242 | Systems and methods for cyber security risk assessment | Jun 25, 2017 | Issued |
Array
(
[id] => 13133729
[patent_doc_number] => 10084815
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-25
[patent_title] => Remediating computer security threats using distributed sensor computers
[patent_app_type] => utility
[patent_app_number] => 15/621975
[patent_app_country] => US
[patent_app_date] => 2017-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12825
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15621975
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/621975 | Remediating computer security threats using distributed sensor computers | Jun 12, 2017 | Issued |
Array
(
[id] => 13203547
[patent_doc_number] => 10116703
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-30
[patent_title] => System and method for software defined behavioral DDoS attack mitigation
[patent_app_type] => utility
[patent_app_number] => 15/609244
[patent_app_country] => US
[patent_app_date] => 2017-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4557
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 242
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15609244
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/609244 | System and method for software defined behavioral DDoS attack mitigation | May 30, 2017 | Issued |
Array
(
[id] => 11960486
[patent_doc_number] => 20170264638
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-14
[patent_title] => 'SYSTEM AND METHOD FOR SOFTWARE DEFINED BEHAVIORAL DDOS ATTACK MITIGATION'
[patent_app_type] => utility
[patent_app_number] => 15/609388
[patent_app_country] => US
[patent_app_date] => 2017-05-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4671
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15609388
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/609388 | System and method for software defined behavioral DDoS attack mitigation | May 30, 2017 | Issued |
Array
(
[id] => 13600795
[patent_doc_number] => 20180351946
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-06
[patent_title] => PRIVACY-ENHANCED BIOMETRIC AUTHENTICATED ACCESS REQUEST
[patent_app_type] => utility
[patent_app_number] => 15/608166
[patent_app_country] => US
[patent_app_date] => 2017-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3618
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15608166
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/608166 | PRIVACY-ENHANCED BIOMETRIC AUTHENTICATED ACCESS REQUEST | May 29, 2017 | Abandoned |
Array
(
[id] => 16821011
[patent_doc_number] => 11005864
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-11
[patent_title] => Feature-agnostic behavior profile based anomaly detection
[patent_app_type] => utility
[patent_app_number] => 15/600562
[patent_app_country] => US
[patent_app_date] => 2017-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6709
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 240
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15600562
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/600562 | Feature-agnostic behavior profile based anomaly detection | May 18, 2017 | Issued |
Array
(
[id] => 11933393
[patent_doc_number] => 09800402
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-24
[patent_title] => 'Secure and delegated distribution of private keys via domain name service'
[patent_app_type] => utility
[patent_app_number] => 15/594505
[patent_app_country] => US
[patent_app_date] => 2017-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8957
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15594505
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/594505 | Secure and delegated distribution of private keys via domain name service | May 11, 2017 | Issued |
Array
(
[id] => 15762495
[patent_doc_number] => 10623389
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-14
[patent_title] => Authenticating a device based on communication patterns in a group of devices
[patent_app_type] => utility
[patent_app_number] => 15/593164
[patent_app_country] => US
[patent_app_date] => 2017-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7841
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15593164
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/593164 | Authenticating a device based on communication patterns in a group of devices | May 10, 2017 | Issued |
Array
(
[id] => 12209198
[patent_doc_number] => 20180054424
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-22
[patent_title] => 'NON-TRANSITORY COMPUTER READABLE MEDIUM AND INFORMATION PROCESSING APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 15/591410
[patent_app_country] => US
[patent_app_date] => 2017-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6920
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15591410
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/591410 | User authentication | May 9, 2017 | Issued |
Array
(
[id] => 13021265
[patent_doc_number] => 10033762
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-24
[patent_title] => Threat engagement and deception escalation
[patent_app_type] => utility
[patent_app_number] => 15/496716
[patent_app_country] => US
[patent_app_date] => 2017-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 27
[patent_no_of_words] => 36790
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15496716
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/496716 | Threat engagement and deception escalation | Apr 24, 2017 | Issued |
Array
(
[id] => 15549805
[patent_doc_number] => 10574701
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-02-25
[patent_title] => Network security policies using custom attributes
[patent_app_type] => utility
[patent_app_number] => 15/484191
[patent_app_country] => US
[patent_app_date] => 2017-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7786
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15484191
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/484191 | Network security policies using custom attributes | Apr 10, 2017 | Issued |
Array
(
[id] => 16790248
[patent_doc_number] => 10992694
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-27
[patent_title] => Method and system to detect abnormal message transactions on a network
[patent_app_type] => utility
[patent_app_number] => 16/090141
[patent_app_country] => US
[patent_app_date] => 2017-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 5264
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16090141
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/090141 | Method and system to detect abnormal message transactions on a network | Apr 9, 2017 | Issued |
Array
(
[id] => 11855902
[patent_doc_number] => 20170230394
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-10
[patent_title] => 'PROTECTION SYSTEM INCLUDING MACHINE LEARNING SNAPSHOT EVALUATION'
[patent_app_type] => utility
[patent_app_number] => 15/479160
[patent_app_country] => US
[patent_app_date] => 2017-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8744
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15479160
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/479160 | Protection system including machine learning snapshot evaluation | Apr 3, 2017 | Issued |