Search

Mohammed Waliullah

Examiner (ID: 12097)

Most Active Art Unit
2498
Art Unit(s)
2498, 2496
Total Applications
821
Issued Applications
696
Pending Applications
58
Abandoned Applications
93

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 20617008 [patent_doc_number] => 20260087107 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-03-26 [patent_title] => MARKING ATTRIBUTION DATA IN GENERATED CONTENT [patent_app_type] => utility [patent_app_number] => 19/406759 [patent_app_country] => US [patent_app_date] => 2025-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 39321 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19406759 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/406759
MARKING ATTRIBUTION DATA IN GENERATED CONTENT Dec 1, 2025 Pending
Array ( [id] => 20154312 [patent_doc_number] => 20250254150 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-08-07 [patent_title] => METHODS TO STRENGTHEN CYBER-SECURITY AND PRIVACY IN A DETERMINISTIC INTERNET OF THINGS [patent_app_type] => utility [patent_app_number] => 19/038470 [patent_app_country] => US [patent_app_date] => 2025-01-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11150 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19038470 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/038470
METHODS TO STRENGTHEN CYBER-SECURITY AND PRIVACY IN A DETERMINISTIC INTERNET OF THINGS Jan 26, 2025 Pending
Array ( [id] => 20018271 [patent_doc_number] => 20250156493 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-05-15 [patent_title] => SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR INFORMATION MANAGEMENT ACROSS DISPARATE INFORMATION SYSTEMS [patent_app_type] => utility [patent_app_number] => 19/023257 [patent_app_country] => US [patent_app_date] => 2025-01-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11867 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 199 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19023257 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/023257
SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR INFORMATION MANAGEMENT ACROSS DISPARATE INFORMATION SYSTEMS Jan 14, 2025 Pending
Array ( [id] => 20195690 [patent_doc_number] => 20250272400 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-08-28 [patent_title] => SYSTEMS AND METHODS FOR DETECTING AND ENFORCING COMPUTER RUNTIME SECURITY [patent_app_type] => utility [patent_app_number] => 19/007587 [patent_app_country] => US [patent_app_date] => 2025-01-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3625 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19007587 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/007587
SYSTEMS AND METHODS FOR DETECTING AND ENFORCING COMPUTER RUNTIME SECURITY Jan 1, 2025 Pending
Array ( [id] => 20045906 [patent_doc_number] => 20250184128 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-05 [patent_title] => METHODS AND APPARATUS FOR KEY REGENERATION [patent_app_type] => utility [patent_app_number] => 19/005177 [patent_app_country] => US [patent_app_date] => 2024-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 1209 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19005177 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/005177
METHODS AND APPARATUS FOR KEY REGENERATION Dec 29, 2024 Pending
Array ( [id] => 19867419 [patent_doc_number] => 20250106205 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-03-27 [patent_title] => AS PAIR VERIFICATION METHOD, APPARATUS, AND DEVICE [patent_app_type] => utility [patent_app_number] => 18/971074 [patent_app_country] => US [patent_app_date] => 2024-12-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 21255 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18971074 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/971074
AS PAIR VERIFICATION METHOD, APPARATUS, AND DEVICE Dec 5, 2024 Pending
Array ( [id] => 20055442 [patent_doc_number] => 20250193664 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-12 [patent_title] => ACCESS POINT OR ROUTER-BASED ROTATION AND EXCHANGE OF DATA ENCRYPTION/DECRYPTION KEYS [patent_app_type] => utility [patent_app_number] => 18/965272 [patent_app_country] => US [patent_app_date] => 2024-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10122 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 142 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18965272 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/965272
ACCESS POINT OR ROUTER-BASED ROTATION AND EXCHANGE OF DATA ENCRYPTION/DECRYPTION KEYS Dec 1, 2024 Pending
Array ( [id] => 19759110 [patent_doc_number] => 20250047675 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-02-06 [patent_title] => CLOSED-LOOP NETWORK PROVISIONING BASED ON NETWORK ACCESS CONTROL FINGERPRINTING [patent_app_type] => utility [patent_app_number] => 18/927424 [patent_app_country] => US [patent_app_date] => 2024-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14115 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 114 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18927424 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/927424
CLOSED-LOOP NETWORK PROVISIONING BASED ON NETWORK ACCESS CONTROL FINGERPRINTING Oct 24, 2024 Pending
Array ( [id] => 19994674 [patent_doc_number] => 20250132896 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-04-24 [patent_title] => LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING [patent_app_type] => utility [patent_app_number] => 18/913605 [patent_app_country] => US [patent_app_date] => 2024-10-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11359 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -24 [patent_words_short_claim] => 118 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18913605 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/913605
LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING Oct 10, 2024 Pending
Array ( [id] => 19994675 [patent_doc_number] => 20250132897 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-04-24 [patent_title] => LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING [patent_app_type] => utility [patent_app_number] => 18/913618 [patent_app_country] => US [patent_app_date] => 2024-10-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11335 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18913618 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/913618
LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING Oct 10, 2024 Pending
Array ( [id] => 20629503 [patent_doc_number] => 20260093790 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-04-02 [patent_title] => System and method to reconciliate and synchronize multi-level data tokens [patent_app_type] => utility [patent_app_number] => 18/900155 [patent_app_country] => US [patent_app_date] => 2024-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6936 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 397 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18900155 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/900155
System and method to reconciliate and synchronize multi-level data tokens Sep 26, 2024 Pending
Array ( [id] => 20589454 [patent_doc_number] => 20260075052 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-03-12 [patent_title] => SYSTEMS AND METHODS FOR CONTROLLING SHARED ACCOUNT ACCESS [patent_app_type] => utility [patent_app_number] => 18/883764 [patent_app_country] => US [patent_app_date] => 2024-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4641 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 352 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18883764 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/883764
SYSTEMS AND METHODS FOR CONTROLLING SHARED ACCOUNT ACCESS Sep 11, 2024 Pending
Array ( [id] => 20234600 [patent_doc_number] => 20250291919 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-09-18 [patent_title] => MALWARE ANALYSIS CONTINUATION SYSTEM AND MALWARE ANALYSIS CONTINUATION METHOD [patent_app_type] => utility [patent_app_number] => 18/830111 [patent_app_country] => US [patent_app_date] => 2024-09-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 982 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -13 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18830111 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/830111
MALWARE ANALYSIS CONTINUATION SYSTEM AND MALWARE ANALYSIS CONTINUATION METHOD Sep 9, 2024 Pending
Array ( [id] => 19645292 [patent_doc_number] => 20240419812 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-19 [patent_title] => EXPLOIT PREDICTION BASED ON MACHINE LEARNING [patent_app_type] => utility [patent_app_number] => 18/817448 [patent_app_country] => US [patent_app_date] => 2024-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6967 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18817448 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/817448
EXPLOIT PREDICTION BASED ON MACHINE LEARNING Aug 27, 2024 Pending
Array ( [id] => 19713593 [patent_doc_number] => 20250023735 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-16 [patent_title] => HARDWARE VIRTUALIZED TPM INTO VIRTUAL MACHINES [patent_app_type] => utility [patent_app_number] => 18/813160 [patent_app_country] => US [patent_app_date] => 2024-08-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12265 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18813160 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/813160
HARDWARE VIRTUALIZED TPM INTO VIRTUAL MACHINES Aug 22, 2024 Pending
Array ( [id] => 19924881 [patent_doc_number] => 12299162 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2025-05-13 [patent_title] => Systems and methods for end point integration and mapping [patent_app_type] => utility [patent_app_number] => 18/808778 [patent_app_country] => US [patent_app_date] => 2024-08-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 23 [patent_figures_cnt] => 23 [patent_no_of_words] => 40732 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 235 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18808778 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/808778
Systems and methods for end point integration and mapping Aug 18, 2024 Issued
Array ( [id] => 19942280 [patent_doc_number] => 12314409 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-05-27 [patent_title] => Remote ownership and content control of media files on untrusted systems [patent_app_type] => utility [patent_app_number] => 18/806828 [patent_app_country] => US [patent_app_date] => 2024-08-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6997 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18806828 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/806828
Remote ownership and content control of media files on untrusted systems Aug 15, 2024 Issued
Array ( [id] => 20462923 [patent_doc_number] => 20260012353 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-01-08 [patent_title] => Utilizing Digital Certificates Generated Based On Security Tokens To Establish Trust For Initiating Secure Connections [patent_app_type] => utility [patent_app_number] => 18/763974 [patent_app_country] => US [patent_app_date] => 2024-07-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13851 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 258 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18763974 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/763974
Utilizing Digital Certificates Generated Based On Security Tokens To Establish Trust For Initiating Secure Connections Jul 2, 2024 Pending
Array ( [id] => 19748238 [patent_doc_number] => 20250036803 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-30 [patent_title] => Machine Learning Training with Enforced Differential Privacy Using Secure Multi-Party Computation [patent_app_type] => utility [patent_app_number] => 18/760772 [patent_app_country] => US [patent_app_date] => 2024-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7598 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 64 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18760772 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/760772
Machine Learning Training with Enforced Differential Privacy Using Secure Multi-Party Computation Jun 30, 2024 Pending
Array ( [id] => 19532837 [patent_doc_number] => 20240356739 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-24 [patent_title] => RANGE CONSTRAINED DEVICE CONFIGURATION [patent_app_type] => utility [patent_app_number] => 18/759366 [patent_app_country] => US [patent_app_date] => 2024-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6671 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 137 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18759366 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/759366
RANGE CONSTRAINED DEVICE CONFIGURATION Jun 27, 2024 Pending
Menu