Search

Mounir Moutaouakil

Examiner (ID: 18675, Phone: (571)270-1416 , Office: P/2476 )

Most Active Art Unit
2476
Art Unit(s)
2619, 2616, 2419, 2476
Total Applications
872
Issued Applications
682
Pending Applications
71
Abandoned Applications
134

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 17354358 [patent_doc_number] => 11229023 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-01-18 [patent_title] => Secure communication in network access points [patent_app_type] => utility [patent_app_number] => 15/842609 [patent_app_country] => US [patent_app_date] => 2017-12-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6731 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15842609 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/842609
Secure communication in network access points Dec 13, 2017 Issued
Array ( [id] => 12241995 [patent_doc_number] => 20180074858 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-15 [patent_title] => 'MULTI-LAYER DISTRIBUTION OF A COMPUTING TASK IN A DISPERSED STORAGE NETWORK' [patent_app_type] => utility [patent_app_number] => 15/822333 [patent_app_country] => US [patent_app_date] => 2017-11-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9911 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15822333 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/822333
MULTI-LAYER DISTRIBUTION OF A COMPUTING TASK IN A DISPERSED STORAGE NETWORK Nov 26, 2017 Abandoned
Array ( [id] => 16522369 [patent_doc_number] => 10873597 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-12-22 [patent_title] => Cyber attack early warning system [patent_app_type] => utility [patent_app_number] => 15/817006 [patent_app_country] => US [patent_app_date] => 2017-11-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6604 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 227 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15817006 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/817006
Cyber attack early warning system Nov 16, 2017 Issued
Array ( [id] => 12236979 [patent_doc_number] => 20180069841 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-08 [patent_title] => 'COMPUTER-IMPLEMENTED CRYPTOGRAPHIC METHOD FOR IMPROVING A COMPUTER NETWORK, AND TERMINAL, SYSTEM AND COMPUTER-READABLE MEDIUM FOR THE SAME' [patent_app_type] => utility [patent_app_number] => 15/694929 [patent_app_country] => US [patent_app_date] => 2017-09-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 14711 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15694929 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/694929
COMPUTER-IMPLEMENTED CRYPTOGRAPHIC METHOD FOR IMPROVING A COMPUTER NETWORK, AND TERMINAL, SYSTEM AND COMPUTER-READABLE MEDIUM FOR THE SAME Sep 3, 2017 Abandoned
Array ( [id] => 15258259 [patent_doc_number] => 20190377863 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-12-12 [patent_title] => PASSWORD INPUT METHOD, COMPUTER DEVICE AND STORAGE MEDIUM [patent_app_type] => utility [patent_app_number] => 16/463530 [patent_app_country] => US [patent_app_date] => 2017-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7754 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16463530 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/463530
PASSWORD INPUT METHOD, COMPUTER DEVICE AND STORAGE MEDIUM Aug 29, 2017 Abandoned
Array ( [id] => 13692521 [patent_doc_number] => 20170357215 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-12-14 [patent_title] => REVERSE BATTERY PROTECTION DEVICE AND OPERATING METHOD THEREOF [patent_app_type] => utility [patent_app_number] => 15/670804 [patent_app_country] => US [patent_app_date] => 2017-08-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 27289 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 237 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15670804 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/670804
Reverse battery protection device and operating method thereof Aug 6, 2017 Issued
Array ( [id] => 12161478 [patent_doc_number] => 20180032744 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-02-01 [patent_title] => 'METHODS OF DYNAMICALLY SECURING ELECTRONIC DEVICES AND OTHER COMMUNICATIONS THROUGH ENVIRONMENTAL AND SYSTEM MEASUREMENTS LEVERAGING TAILORED TRUSTWORTHY SPACES AND CONTINUOUS AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 15/664091 [patent_app_country] => US [patent_app_date] => 2017-07-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 19096 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15664091 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/664091
Methods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces and continuous authentication Jul 30, 2017 Issued
Array ( [id] => 12034622 [patent_doc_number] => 20170324721 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-11-09 [patent_title] => 'Methods, Systems, and Products for Authenticating Users' [patent_app_type] => utility [patent_app_number] => 15/656130 [patent_app_country] => US [patent_app_date] => 2017-07-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 9804 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15656130 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/656130
Methods, systems, and products for authenticating users Jul 20, 2017 Issued
Array ( [id] => 16033023 [patent_doc_number] => 10678935 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-06-09 [patent_title] => Identifying container file events for providing container security [patent_app_type] => utility [patent_app_number] => 15/647269 [patent_app_country] => US [patent_app_date] => 2017-07-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7036 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 202 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15647269 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/647269
Identifying container file events for providing container security Jul 11, 2017 Issued
Array ( [id] => 13801133 [patent_doc_number] => 20190014105 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-01-10 [patent_title] => Certification System [patent_app_type] => utility [patent_app_number] => 15/644787 [patent_app_country] => US [patent_app_date] => 2017-07-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6729 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -7 [patent_words_short_claim] => 51 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15644787 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/644787
Certification system Jul 8, 2017 Issued
Array ( [id] => 12719674 [patent_doc_number] => 20180131725 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-05-10 [patent_title] => METHOD AND APPARATUS FOR MOBILE TERMINAL MANAGEMENT SUPPORTING SECURITY POLICY [patent_app_type] => utility [patent_app_number] => 15/642450 [patent_app_country] => US [patent_app_date] => 2017-07-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6662 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -15 [patent_words_short_claim] => 83 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15642450 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/642450
METHOD AND APPARATUS FOR MOBILE TERMINAL MANAGEMENT SUPPORTING SECURITY POLICY Jul 5, 2017 Abandoned
Array ( [id] => 12576576 [patent_doc_number] => 10021132 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-07-10 [patent_title] => Limiting the efficacy of a denial of service attack by increasing client resource demands [patent_app_type] => utility [patent_app_number] => 15/640744 [patent_app_country] => US [patent_app_date] => 2017-07-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8531 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 224 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15640744 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/640744
Limiting the efficacy of a denial of service attack by increasing client resource demands Jul 2, 2017 Issued
Array ( [id] => 16480732 [patent_doc_number] => 10855697 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-12-01 [patent_title] => Threat intelligence system [patent_app_type] => utility [patent_app_number] => 15/640031 [patent_app_country] => US [patent_app_date] => 2017-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 8920 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 319 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15640031 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/640031
Threat intelligence system Jun 29, 2017 Issued
Array ( [id] => 16608232 [patent_doc_number] => 10909239 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-02-02 [patent_title] => Advanced file modification heuristics [patent_app_type] => utility [patent_app_number] => 15/637455 [patent_app_country] => US [patent_app_date] => 2017-06-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6232 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 145 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15637455 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/637455
Advanced file modification heuristics Jun 28, 2017 Issued
Array ( [id] => 15168191 [patent_doc_number] => 10489593 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-11-26 [patent_title] => Mitigation of malicious actions associated with graphical user interface elements [patent_app_type] => utility [patent_app_number] => 15/635047 [patent_app_country] => US [patent_app_date] => 2017-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4016 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 187 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15635047 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/635047
Mitigation of malicious actions associated with graphical user interface elements Jun 26, 2017 Issued
Array ( [id] => 16708730 [patent_doc_number] => 10958679 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-03-23 [patent_title] => Techniques for cloud security monitoring and threat intelligence [patent_app_type] => utility [patent_app_number] => 15/632174 [patent_app_country] => US [patent_app_date] => 2017-06-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 10807 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 201 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15632174 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/632174
Techniques for cloud security monitoring and threat intelligence Jun 22, 2017 Issued
Array ( [id] => 13726221 [patent_doc_number] => 20170374066 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-12-28 [patent_title] => SERVER, IC CARD PROCESSING APPARATUS, AND IC CARD PROCESSING SYSTEM [patent_app_type] => utility [patent_app_number] => 15/630288 [patent_app_country] => US [patent_app_date] => 2017-06-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6881 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -5 [patent_words_short_claim] => 167 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15630288 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/630288
Server, IC card processing apparatus, and IC card processing system Jun 21, 2017 Issued
Array ( [id] => 17457039 [patent_doc_number] => 11271914 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-03-08 [patent_title] => External contact connections to authenticate and contextualize entity [patent_app_type] => utility [patent_app_number] => 15/625556 [patent_app_country] => US [patent_app_date] => 2017-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 10586 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 401 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15625556 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/625556
External contact connections to authenticate and contextualize entity Jun 15, 2017 Issued
Array ( [id] => 16594945 [patent_doc_number] => 10904233 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-01-26 [patent_title] => Protection from data security threats [patent_app_type] => utility [patent_app_number] => 15/601914 [patent_app_country] => US [patent_app_date] => 2017-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 13331 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 281 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15601914 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/601914
Protection from data security threats May 21, 2017 Issued
Array ( [id] => 13526581 [patent_doc_number] => 20180314833 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-11-01 [patent_title] => RISK ANALYSIS TO IDENTIFY AND RETROSPECT CYBER SECURITY THREATS [patent_app_type] => utility [patent_app_number] => 15/581352 [patent_app_country] => US [patent_app_date] => 2017-04-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6239 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 99 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15581352 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/581352
RISK ANALYSIS TO IDENTIFY AND RETROSPECT CYBER SECURITY THREATS Apr 27, 2017 Abandoned
Menu