Search

Mohammed Waliullah

Examiner (ID: 18990, Phone: (571)270-7987 , Office: P/2498 )

Most Active Art Unit
2498
Art Unit(s)
2498, 2496
Total Applications
815
Issued Applications
691
Pending Applications
58
Abandoned Applications
94

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 20617008 [patent_doc_number] => 20260087107 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-03-26 [patent_title] => MARKING ATTRIBUTION DATA IN GENERATED CONTENT [patent_app_type] => utility [patent_app_number] => 19/406759 [patent_app_country] => US [patent_app_date] => 2025-12-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 39321 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19406759 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/406759
MARKING ATTRIBUTION DATA IN GENERATED CONTENT Dec 1, 2025 Pending
Array ( [id] => 20045906 [patent_doc_number] => 20250184128 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-05 [patent_title] => METHODS AND APPARATUS FOR KEY REGENERATION [patent_app_type] => utility [patent_app_number] => 19/005177 [patent_app_country] => US [patent_app_date] => 2024-12-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 1209 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 19005177 [rel_patent_id] =>[rel_patent_doc_number] =>)
19/005177
METHODS AND APPARATUS FOR KEY REGENERATION Dec 29, 2024 Pending
Array ( [id] => 19759110 [patent_doc_number] => 20250047675 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-02-06 [patent_title] => CLOSED-LOOP NETWORK PROVISIONING BASED ON NETWORK ACCESS CONTROL FINGERPRINTING [patent_app_type] => utility [patent_app_number] => 18/927424 [patent_app_country] => US [patent_app_date] => 2024-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14115 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 114 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18927424 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/927424
CLOSED-LOOP NETWORK PROVISIONING BASED ON NETWORK ACCESS CONTROL FINGERPRINTING Oct 24, 2024 Pending
Array ( [id] => 19994675 [patent_doc_number] => 20250132897 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-04-24 [patent_title] => LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING [patent_app_type] => utility [patent_app_number] => 18/913618 [patent_app_country] => US [patent_app_date] => 2024-10-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11335 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18913618 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/913618
LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING Oct 10, 2024 Pending
Array ( [id] => 19994674 [patent_doc_number] => 20250132896 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-04-24 [patent_title] => LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING [patent_app_type] => utility [patent_app_number] => 18/913605 [patent_app_country] => US [patent_app_date] => 2024-10-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11359 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -24 [patent_words_short_claim] => 118 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18913605 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/913605
LOW-COMPUTE, PRIVACY PRESERVING HASH CRACKING Oct 10, 2024 Pending
Array ( [id] => 20589454 [patent_doc_number] => 20260075052 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-03-12 [patent_title] => SYSTEMS AND METHODS FOR CONTROLLING SHARED ACCOUNT ACCESS [patent_app_type] => utility [patent_app_number] => 18/883764 [patent_app_country] => US [patent_app_date] => 2024-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4641 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 352 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18883764 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/883764
SYSTEMS AND METHODS FOR CONTROLLING SHARED ACCOUNT ACCESS Sep 11, 2024 Pending
Array ( [id] => 20234600 [patent_doc_number] => 20250291919 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-09-18 [patent_title] => MALWARE ANALYSIS CONTINUATION SYSTEM AND MALWARE ANALYSIS CONTINUATION METHOD [patent_app_type] => utility [patent_app_number] => 18/830111 [patent_app_country] => US [patent_app_date] => 2024-09-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 982 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -13 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18830111 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/830111
MALWARE ANALYSIS CONTINUATION SYSTEM AND MALWARE ANALYSIS CONTINUATION METHOD Sep 9, 2024 Pending
Array ( [id] => 19645292 [patent_doc_number] => 20240419812 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-19 [patent_title] => EXPLOIT PREDICTION BASED ON MACHINE LEARNING [patent_app_type] => utility [patent_app_number] => 18/817448 [patent_app_country] => US [patent_app_date] => 2024-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6967 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18817448 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/817448
EXPLOIT PREDICTION BASED ON MACHINE LEARNING Aug 27, 2024 Pending
Array ( [id] => 19713593 [patent_doc_number] => 20250023735 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-16 [patent_title] => HARDWARE VIRTUALIZED TPM INTO VIRTUAL MACHINES [patent_app_type] => utility [patent_app_number] => 18/813160 [patent_app_country] => US [patent_app_date] => 2024-08-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12265 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18813160 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/813160
HARDWARE VIRTUALIZED TPM INTO VIRTUAL MACHINES Aug 22, 2024 Pending
Array ( [id] => 19924881 [patent_doc_number] => 12299162 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2025-05-13 [patent_title] => Systems and methods for end point integration and mapping [patent_app_type] => utility [patent_app_number] => 18/808778 [patent_app_country] => US [patent_app_date] => 2024-08-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 23 [patent_figures_cnt] => 23 [patent_no_of_words] => 40732 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 235 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18808778 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/808778
Systems and methods for end point integration and mapping Aug 18, 2024 Issued
Array ( [id] => 19942280 [patent_doc_number] => 12314409 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-05-27 [patent_title] => Remote ownership and content control of media files on untrusted systems [patent_app_type] => utility [patent_app_number] => 18/806828 [patent_app_country] => US [patent_app_date] => 2024-08-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6997 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18806828 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/806828
Remote ownership and content control of media files on untrusted systems Aug 15, 2024 Issued
Array ( [id] => 20462923 [patent_doc_number] => 20260012353 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-01-08 [patent_title] => Utilizing Digital Certificates Generated Based On Security Tokens To Establish Trust For Initiating Secure Connections [patent_app_type] => utility [patent_app_number] => 18/763974 [patent_app_country] => US [patent_app_date] => 2024-07-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13851 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 258 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18763974 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/763974
Utilizing Digital Certificates Generated Based On Security Tokens To Establish Trust For Initiating Secure Connections Jul 2, 2024 Pending
Array ( [id] => 19748238 [patent_doc_number] => 20250036803 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-30 [patent_title] => Machine Learning Training with Enforced Differential Privacy Using Secure Multi-Party Computation [patent_app_type] => utility [patent_app_number] => 18/760772 [patent_app_country] => US [patent_app_date] => 2024-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7598 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 64 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18760772 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/760772
Machine Learning Training with Enforced Differential Privacy Using Secure Multi-Party Computation Jun 30, 2024 Pending
Array ( [id] => 19532837 [patent_doc_number] => 20240356739 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-24 [patent_title] => RANGE CONSTRAINED DEVICE CONFIGURATION [patent_app_type] => utility [patent_app_number] => 18/759366 [patent_app_country] => US [patent_app_date] => 2024-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6671 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 137 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18759366 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/759366
RANGE CONSTRAINED DEVICE CONFIGURATION Jun 27, 2024 Pending
Array ( [id] => 20204945 [patent_doc_number] => 12407736 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-09-02 [patent_title] => Dynamically enforcing security policies on client devices using a device identity entity and a security policy enforcement entity [patent_app_type] => utility [patent_app_number] => 18/753432 [patent_app_country] => US [patent_app_date] => 2024-06-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2282 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 219 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18753432 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/753432
Dynamically enforcing security policies on client devices using a device identity entity and a security policy enforcement entity Jun 24, 2024 Issued
Array ( [id] => 19499428 [patent_doc_number] => 20240338446 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-10 [patent_title] => Attribute-based detection of malicious software and code packers [patent_app_type] => utility [patent_app_number] => 18/744788 [patent_app_country] => US [patent_app_date] => 2024-06-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4465 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 168 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18744788 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/744788
Attribute-based detection of malicious software and code packers Jun 16, 2024 Abandoned
Array ( [id] => 19485712 [patent_doc_number] => 20240333754 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-03 [patent_title] => SOFTWARE RELEASE TRACKING AND LOGGING [patent_app_type] => utility [patent_app_number] => 18/742570 [patent_app_country] => US [patent_app_date] => 2024-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 19807 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 122 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18742570 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/742570
Software release tracking and logging Jun 12, 2024 Issued
Array ( [id] => 19617791 [patent_doc_number] => 20240403471 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-05 [patent_title] => SECURE CREDENTIALING SYSTEMS AND METHODS [patent_app_type] => utility [patent_app_number] => 18/738422 [patent_app_country] => US [patent_app_date] => 2024-06-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7142 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -19 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18738422 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/738422
Secure credentialing systems and methods Jun 9, 2024 Issued
Array ( [id] => 19482275 [patent_doc_number] => 20240330317 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-03 [patent_title] => Import and Export in Blockchain Environments [patent_app_type] => utility [patent_app_number] => 18/737643 [patent_app_country] => US [patent_app_date] => 2024-06-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9214 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18737643 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/737643
Import and Export in Blockchain Environments Jun 6, 2024 Pending
Array ( [id] => 20079533 [patent_doc_number] => 12353601 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-07-08 [patent_title] => Synthesizing user transactional data for de-identifying sensitive information [patent_app_type] => utility [patent_app_number] => 18/732294 [patent_app_country] => US [patent_app_date] => 2024-06-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 0 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18732294 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/732294
Synthesizing user transactional data for de-identifying sensitive information Jun 2, 2024 Issued
Menu