
Monjur Rahim
Examiner (ID: 12040)
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2434, 2492, 2134, 2436 |
| Total Applications | 1034 |
| Issued Applications | 836 |
| Pending Applications | 76 |
| Abandoned Applications | 140 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13258803
[patent_doc_number] => 10142102
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-27
[patent_title] => Secure physically unclonable function (PUF) error correction
[patent_app_type] => utility
[patent_app_number] => 15/633572
[patent_app_country] => US
[patent_app_date] => 2017-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 3860
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15633572
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/633572 | Secure physically unclonable function (PUF) error correction | Jun 25, 2017 | Issued |
Array
(
[id] => 13304929
[patent_doc_number] => 20180204001
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-19
[patent_title] => MOBILE DEVICE FOR ANALYZING MALICIOUS CODE USING A CONTAINER PLATFORM, SYSTEM FOR ANALYZING MALICIOUS CODE IN A MOBILE DEVICE USING THE SAME, AND METHOD FOR ANALYZING MALICIOUS CODE USING THE SAME
[patent_app_type] => utility
[patent_app_number] => 15/631780
[patent_app_country] => US
[patent_app_date] => 2017-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4351
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15631780
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/631780 | Mobile device for analyzing malicious code using a container platform, system for analyzing malicious code in a mobile device using the same, and method for analyzing malicious code using the same | Jun 22, 2017 | Issued |
Array
(
[id] => 11966153
[patent_doc_number] => 20170270306
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-21
[patent_title] => 'REDUCING TIME TO FIRST ENCRYPTED FRAME IN A CONTENT STREAM'
[patent_app_type] => utility
[patent_app_number] => 15/616417
[patent_app_country] => US
[patent_app_date] => 2017-06-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12073
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15616417
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/616417 | Reducing time to first encrypted frame in a content stream | Jun 6, 2017 | Issued |
Array
(
[id] => 15758481
[patent_doc_number] => 10621356
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-14
[patent_title] => System and method of controlling file access of applications based on vulnerabilities of applications
[patent_app_type] => utility
[patent_app_number] => 15/607742
[patent_app_country] => US
[patent_app_date] => 2017-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5874
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15607742
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/607742 | System and method of controlling file access of applications based on vulnerabilities of applications | May 29, 2017 | Issued |
Array
(
[id] => 11951619
[patent_doc_number] => 20170255769
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-07
[patent_title] => 'DIGITAL IDENTITY'
[patent_app_type] => utility
[patent_app_number] => 15/603242
[patent_app_country] => US
[patent_app_date] => 2017-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 24938
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15603242
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/603242 | Digital identity | May 22, 2017 | Issued |
Array
(
[id] => 11951625
[patent_doc_number] => 20170255776
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-07
[patent_title] => 'DISCOVERY OF MALICIOUS STRINGS'
[patent_app_type] => utility
[patent_app_number] => 15/601534
[patent_app_country] => US
[patent_app_date] => 2017-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7999
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15601534
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/601534 | DISCOVERY OF MALICIOUS STRINGS | May 21, 2017 | Abandoned |
Array
(
[id] => 16349488
[patent_doc_number] => 20200314139
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-01
[patent_title] => SYSTEM AND METHOD FOR SECURITY SERVICE COLLABORATION
[patent_app_type] => utility
[patent_app_number] => 16/300953
[patent_app_country] => US
[patent_app_date] => 2017-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12458
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16300953
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/300953 | System and method for security service collaboration | May 14, 2017 | Issued |
Array
(
[id] => 11940560
[patent_doc_number] => 20170244711
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-24
[patent_title] => 'SYSTEM AND METHOD FOR EVALUATING A REVERSE QUERY'
[patent_app_type] => utility
[patent_app_number] => 15/589296
[patent_app_country] => US
[patent_app_date] => 2017-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9624
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15589296
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/589296 | System and method for evaluating a reverse query | May 7, 2017 | Issued |
Array
(
[id] => 12055470
[patent_doc_number] => 20170331814
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-16
[patent_title] => 'DATA SECURITY'
[patent_app_type] => utility
[patent_app_number] => 15/585670
[patent_app_country] => US
[patent_app_date] => 2017-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7026
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15585670
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/585670 | Data security | May 2, 2017 | Issued |
Array
(
[id] => 14771145
[patent_doc_number] => 10396985
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-08-27
[patent_title] => Federated identity management based on biometric data
[patent_app_type] => utility
[patent_app_number] => 15/584641
[patent_app_country] => US
[patent_app_date] => 2017-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11321
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 243
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15584641
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/584641 | Federated identity management based on biometric data | May 1, 2017 | Issued |
Array
(
[id] => 13530323
[patent_doc_number] => 20180316704
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-01
[patent_title] => LATERAL MOVEMENT DETECTION THROUGH GRAPH-BASED CANDIDATE SELECTION
[patent_app_type] => utility
[patent_app_number] => 15/582645
[patent_app_country] => US
[patent_app_date] => 2017-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14161
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15582645
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/582645 | Lateral movement detection through graph-based candidate selection | Apr 28, 2017 | Issued |
Array
(
[id] => 11868640
[patent_doc_number] => 20170235925
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-17
[patent_title] => 'SYSTEM AND METHODS FOR SECURE COLLABORATIVE COMMUNICATION'
[patent_app_type] => utility
[patent_app_number] => 15/582029
[patent_app_country] => US
[patent_app_date] => 2017-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9391
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15582029
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/582029 | System and methods for secure collaborative communication | Apr 27, 2017 | Issued |
Array
(
[id] => 12028359
[patent_doc_number] => 20170318458
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-02
[patent_title] => 'Security Key Usage Across Handover That Keeps The Same Wireless Termination'
[patent_app_type] => utility
[patent_app_number] => 15/491014
[patent_app_country] => US
[patent_app_date] => 2017-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8566
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15491014
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/491014 | Security key usage across handover that keeps the same wireless termination | Apr 18, 2017 | Issued |
Array
(
[id] => 12611559
[patent_doc_number] => 20180095683
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-05
[patent_title] => COPY METHOD OF COPYING INFORMATION BETWEEN FIRST PROCESSING APPARATUS AND SECOND PROCESSING APPARATUS, THE FIRST PROCESSING APPARATUS, AND THE SECOND PROCESSING APPARATUS
[patent_app_type] => utility
[patent_app_number] => 15/472770
[patent_app_country] => US
[patent_app_date] => 2017-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8433
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15472770
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/472770 | Copy method of copying information between first processing apparatus and second processing apparatus, the first processing apparatus, and the second processing apparatus | Mar 28, 2017 | Issued |
Array
(
[id] => 11711865
[patent_doc_number] => 20170180363
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-22
[patent_title] => 'USER PROFILE SELECTION USING CONTEXTUAL AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 15/449568
[patent_app_country] => US
[patent_app_date] => 2017-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9157
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15449568
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/449568 | USER PROFILE SELECTION USING CONTEXTUAL AUTHENTICATION | Mar 2, 2017 | Abandoned |
Array
(
[id] => 11868673
[patent_doc_number] => 20170235958
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-17
[patent_title] => 'METHODS, SYSTEMS AND APPARATUS TO INITIALIZE A PLATFORM'
[patent_app_type] => utility
[patent_app_number] => 15/443831
[patent_app_country] => US
[patent_app_date] => 2017-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10190
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15443831
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/443831 | METHODS, SYSTEMS AND APPARATUS TO INITIALIZE A PLATFORM | Feb 26, 2017 | Abandoned |
Array
(
[id] => 12041401
[patent_doc_number] => 09819645
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-14
[patent_title] => 'Firewall policy management'
[patent_app_type] => utility
[patent_app_number] => 15/436834
[patent_app_country] => US
[patent_app_date] => 2017-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 8645
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 335
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15436834
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/436834 | Firewall policy management | Feb 18, 2017 | Issued |
Array
(
[id] => 13351151
[patent_doc_number] => 20180227115
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-09
[patent_title] => TECHNOLOGIES FOR ELLIPTIC CURVE CRYPTOGRAPHY HARDWARE ACCELERATION
[patent_app_type] => utility
[patent_app_number] => 15/428773
[patent_app_country] => US
[patent_app_date] => 2017-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11748
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15428773
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/428773 | Technologies for elliptic curve cryptography hardware acceleration | Feb 8, 2017 | Issued |
Array
(
[id] => 11839104
[patent_doc_number] => 20170220824
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-03
[patent_title] => 'USB MEDIA STORAGE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/423577
[patent_app_country] => US
[patent_app_date] => 2017-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 1302
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15423577
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/423577 | USB media storage device | Feb 1, 2017 | Issued |
Array
(
[id] => 12020718
[patent_doc_number] => 09813442
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-07
[patent_title] => 'Server grouping system'
[patent_app_type] => utility
[patent_app_number] => 15/421447
[patent_app_country] => US
[patent_app_date] => 2017-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 4986
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 247
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15421447
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/421447 | Server grouping system | Jan 31, 2017 | Issued |