
Monjur Rahim
Examiner (ID: 13026, Phone: (571)270-3890 , Office: P/2436 )
| Most Active Art Unit | 2436 |
| Art Unit(s) | 2492, 2434, 2134, 2436 |
| Total Applications | 1026 |
| Issued Applications | 835 |
| Pending Applications | 72 |
| Abandoned Applications | 139 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10434166
[patent_doc_number] => 20150319178
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-05
[patent_title] => 'REMOTE ASSISTANCE FOR MANAGED MOBILE DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/702954
[patent_app_country] => US
[patent_app_date] => 2015-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13944
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702954
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/702954 | Remote assistance for managed mobile devices | May 3, 2015 | Issued |
Array
(
[id] => 14037525
[patent_doc_number] => 10230528
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-12
[patent_title] => Tree-less integrity and replay memory protection for trusted execution environment
[patent_app_type] => utility
[patent_app_number] => 14/703420
[patent_app_country] => US
[patent_app_date] => 2015-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 15
[patent_no_of_words] => 14091
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14703420
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/703420 | Tree-less integrity and replay memory protection for trusted execution environment | May 3, 2015 | Issued |
Array
(
[id] => 12018948
[patent_doc_number] => 09811655
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-07
[patent_title] => 'Method, apparatus, and system for managing user accounts'
[patent_app_type] => utility
[patent_app_number] => 14/703604
[patent_app_country] => US
[patent_app_date] => 2015-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 18077
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14703604
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/703604 | Method, apparatus, and system for managing user accounts | May 3, 2015 | Issued |
Array
(
[id] => 10752427
[patent_doc_number] => 20160098580
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-07
[patent_title] => 'BUS PROTECTION WITH IMPROVED KEY ENTROPY'
[patent_app_type] => utility
[patent_app_number] => 14/702791
[patent_app_country] => US
[patent_app_date] => 2015-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4135
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702791
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/702791 | Bus protection with improved key entropy | May 3, 2015 | Issued |
Array
(
[id] => 18402990
[patent_doc_number] => 11665145
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-05-30
[patent_title] => Method of providing end to end encryption with auditability
[patent_app_type] => utility
[patent_app_number] => 14/702713
[patent_app_country] => US
[patent_app_date] => 2015-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9796
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 335
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702713
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/702713 | Method of providing end to end encryption with auditability | May 1, 2015 | Issued |
Array
(
[id] => 11126268
[patent_doc_number] => 20160323243
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-03
[patent_title] => 'DATA LEAK PROTECTION SYSTEM AND PROCESSING METHODS THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/702504
[patent_app_country] => US
[patent_app_date] => 2015-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 14904
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702504
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/702504 | Data leak protection system and processing methods thereof | Apr 30, 2015 | Issued |
Array
(
[id] => 10432478
[patent_doc_number] => 20150317490
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-05
[patent_title] => 'SECURE COMPUTING SYSTEMS AND METHODS'
[patent_app_type] => utility
[patent_app_number] => 14/702632
[patent_app_country] => US
[patent_app_date] => 2015-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 14003
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702632
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/702632 | Secure computing systems and methods | Apr 30, 2015 | Issued |
Array
(
[id] => 11126269
[patent_doc_number] => 20160323244
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-03
[patent_title] => 'SECURE REPORTING OF EVENTS'
[patent_app_type] => utility
[patent_app_number] => 14/702519
[patent_app_country] => US
[patent_app_date] => 2015-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7317
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702519
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/702519 | SECURE REPORTING OF EVENTS | Apr 30, 2015 | Abandoned |
Array
(
[id] => 14857459
[patent_doc_number] => 10417459
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-17
[patent_title] => Physical barrier to inhibit a penetration attack
[patent_app_type] => utility
[patent_app_number] => 15/507697
[patent_app_country] => US
[patent_app_date] => 2015-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 5155
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15507697
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/507697 | Physical barrier to inhibit a penetration attack | Apr 28, 2015 | Issued |
Array
(
[id] => 10342742
[patent_doc_number] => 20150227748
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-13
[patent_title] => 'Method and System for Securing Data'
[patent_app_type] => utility
[patent_app_number] => 14/696708
[patent_app_country] => US
[patent_app_date] => 2015-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5125
[patent_no_of_claims] => 41
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14696708
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/696708 | Method and system for securing data | Apr 26, 2015 | Issued |
Array
(
[id] => 12011884
[patent_doc_number] => 09805203
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-31
[patent_title] => 'Cooperative static and dynamic analysis of web application code for finding security vulnerabilities'
[patent_app_type] => utility
[patent_app_number] => 14/692003
[patent_app_country] => US
[patent_app_date] => 2015-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9955
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14692003
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/692003 | Cooperative static and dynamic analysis of web application code for finding security vulnerabilities | Apr 20, 2015 | Issued |
Array
(
[id] => 12018961
[patent_doc_number] => 09811668
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-07
[patent_title] => 'Multi-context exploit test management'
[patent_app_type] => utility
[patent_app_number] => 14/692203
[patent_app_country] => US
[patent_app_date] => 2015-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8406
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14692203
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/692203 | Multi-context exploit test management | Apr 20, 2015 | Issued |
Array
(
[id] => 13655259
[patent_doc_number] => 09853960
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-12-26
[patent_title] => Peer applications trust center
[patent_app_type] => utility
[patent_app_number] => 14/665218
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9319
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14665218
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/665218 | Peer applications trust center | Mar 22, 2015 | Issued |
Array
(
[id] => 11903686
[patent_doc_number] => 09773120
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-09-26
[patent_title] => 'Forensic investigation tool'
[patent_app_type] => utility
[patent_app_number] => 14/665011
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6224
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14665011
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/665011 | Forensic investigation tool | Mar 22, 2015 | Issued |
Array
(
[id] => 11905120
[patent_doc_number] => 09774571
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-26
[patent_title] => 'Automatic provisioning of meeting room device'
[patent_app_type] => utility
[patent_app_number] => 14/643941
[patent_app_country] => US
[patent_app_date] => 2015-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6088
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14643941
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/643941 | Automatic provisioning of meeting room device | Mar 9, 2015 | Issued |
Array
(
[id] => 12039726
[patent_doc_number] => 09817960
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-14
[patent_title] => 'Message sender security in messaging system'
[patent_app_type] => utility
[patent_app_number] => 14/643800
[patent_app_country] => US
[patent_app_date] => 2015-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6919
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14643800
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/643800 | Message sender security in messaging system | Mar 9, 2015 | Issued |
Array
(
[id] => 11072400
[patent_doc_number] => 20160269365
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-15
[patent_title] => 'Recording Encrypted Media Session'
[patent_app_type] => utility
[patent_app_number] => 14/643802
[patent_app_country] => US
[patent_app_date] => 2015-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5466
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14643802
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/643802 | Recording encrypted media session | Mar 9, 2015 | Issued |
Array
(
[id] => 11064439
[patent_doc_number] => 20160261403
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-08
[patent_title] => 'SIDE CHANNEL ANALYSIS RESISTANT ARCHITECTURE'
[patent_app_type] => utility
[patent_app_number] => 14/641119
[patent_app_country] => US
[patent_app_date] => 2015-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 16733
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14641119
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/641119 | Side channel analysis resistant architecture | Mar 5, 2015 | Issued |
Array
(
[id] => 11050008
[patent_doc_number] => 20160246966
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-25
[patent_title] => 'METHOD AND SYSTEM OF ASSESSING RISK ASSOCIATED WITH USERS BASED AT LEAST IN PART ON ONLINE PRESENCE OF THE USER'
[patent_app_type] => utility
[patent_app_number] => 14/630509
[patent_app_country] => US
[patent_app_date] => 2015-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 14898
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14630509
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/630509 | METHOD AND SYSTEM OF ASSESSING RISK ASSOCIATED WITH USERS BASED AT LEAST IN PART ON ONLINE PRESENCE OF THE USER | Feb 23, 2015 | Abandoned |
Array
(
[id] => 11042701
[patent_doc_number] => 20160239657
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-18
[patent_title] => 'DIGITAL IDENTITY SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/622709
[patent_app_country] => US
[patent_app_date] => 2015-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 24702
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14622709
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/622709 | Digital identity system | Feb 12, 2015 | Issued |